-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security] user with access to indexes documented in the public docs can't access CSPM Findings and Dashboard #181896
Comments
@CohenIdo please make sure we have an FTR that reproduce this issue and passes once this is fixed |
@CohenIdo since there's no workaround to this issue. It means that any user that isn't an admin can't use cloud security. |
The problem was resolved by linking the permissions for the cloud security feature to 'cloud-security-posture-settings' saved object. My.Movie.2.mp4I will create a follow-up task for having FTRs. |
Thanks for the quick fix! @CohenIdo we can keep the same task open for the FTRs, if that helps Can this be backported for 8.13 as well? |
This morning, I encountered an unexpected issue. I anticipated that the fix would be included in the backport on Friday, and I confirmed this expectation with the Kibana release owner, who agreed with me. However, this morning, when I checked the latest BC, I was surprised to find it missing. |
@kfirpeled, I've initiated a follow-up task to manage prioritization alongside another higher-priority task in this sprint. |
8.14 backport PR merged: |
Verified on 8.14.0 SNAPSHOT auth-verify.mp4 |
Kibana version:
8.13.2
Elasticsearch version:
8.13.2
Server OS version:
Browser version:
Browser OS version:
Original install method (e.g. download page, yum, from source, etc.):
ESS
Describe the bug:
A user with access to Kibana Security and read privileges for ES indexes described in https://www.elastic.co/guide/en/security/8.12/cspm-get-started.html don't have access to the Misconfiguration Findings and to CSP dashboard
Steps to reproduce:
logs-cloud_security_posture.findings-*
and in thelogs-cloud_security_posture.findings_latest-*
indexesall
privileges for all spaces in Kibana and withread
privileges forlogs-cloud_security_posture.findings-*
,logs-cloud_security_posture.findings_latest-*
andlogs-cloud_security_posture.scores-*
indexes/data streamsOn the dashboard you will see
Internal Server Error 500: An error occurred while trying to fetch csp settings: Unable to get cloud-security-posture-settings, 403
erorrExpected behavior:
no error, dashboard and findings page should display the data
Screenshots (if relevant):

Errors in browser console (if relevant):
Provide logs and/or server output (if relevant):
Any additional context:
This most likely is due to the changes introduced in 8.13 around benchmark rules with a new Saved Objected implemented to store the rules settings
More context from @kfirpeled
@elastic/kibana-cloud-security-posture
The text was updated successfully, but these errors were encountered: