-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RAC] - Integrating RBAC with rules that query alerts indices #102951
Comments
Pinging @elastic/security-solution (Team: SecuritySolution) |
Sounds like we'd need to pass in a scoped service, like we already for for ES and SO, which such rules can use. Does that make sense @mikecote ? |
Is there a requirement to query alert indices + other indices? If so, I'm not sure @gmmorris' approach will work. |
Pinging @elastic/security-detections-response (Team:Detections and Resp) |
@mikecote not sure about requirements for 7.14, but it's an existing use case in security solution. I think @dhurley14 is checking to see if it's possible to do in the observability workflow right now. |
Thanks, @yctercero! I think the proposals and approach will vary depending on this requirement. Keep me posted 🙂 |
It seems like if a user wants to create alerts over alert-as-data indices, they're going to want that user to have access to the alerts-as-data indices for read access in any case. Is it reasonable to create an alert over data you can't read? Perhaps for something super-generic, like "generate an alert if there are > 3 errors executing alerts over an hour". I'd guess most of these meta-alerts will be more data-y specific than that. So, seems to me like there's not really a problem here. The user will have to have ES privs to be able to read the indices, so they can use Discover/Dashboards, at which point they'll have enough privs to be able to run a query with an API key built from their privs in an alert. I'm curious if a user would even "see" an alerts-as-data access they weren't given privs to; would the indices even show up in an "index picker" UI prompt? |
We have several use cases for 'alerts on the alerts' in Infosec and an issue I ran into was that we use spaces and originally I created the alert on the index pattern |
For context here are some examples of 'alerts on alerts' that we use in Infosec. These are all threshold alerts
We also have a watcher that looks at the |
Security rules continue to use the current user permissions in the RAC implementation so this issue is resolved. |
When a user creates a rule, they are able to specify which indices they would like searched. One possible index that a user can search is the alerts indices. With RBAC a users permissions are managed through the Kibana feature privileges, which is an abstraction layer - that is, a user is not ever given explicit ES permissions, because theoretically, all calls will be going through Kibana --> ES.
In the current security solution implementation of rules/alerts, a user is granted ES level privileges for the index where alerts are stored (
.siem-signals*
). If a rule queries.siem-signals*
we’re able to easily check permissions as we run our queries usingcurrentUser
. However, with the RBAC implementation, users no longer receive ES level privileges, so querying ES ascurrentUser
will not work, but querying withinternalUser
is very risky as each index contains numerous rule type alerts all of which the user may not have permissions to. So it is not just a matter of what alert index a user can access, but what documents (alerts) within that index a user can access.The outstanding questions would be:
The text was updated successfully, but these errors were encountered: