Skip to content

Commit

Permalink
Add csp-rule-template asset type (#276)
Browse files Browse the repository at this point in the history
  • Loading branch information
eyalkraft authored Feb 10, 2022
1 parent 83d1e16 commit 1cd07c6
Show file tree
Hide file tree
Showing 4 changed files with 35 additions and 0 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,7 @@ For a quick overview, these are the assets typically found in an Elastic Package
* Map
* Search
* Security rules
* CSP (cloud security posture) rule templates
* Other
* fields.yml

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"attributes": {
"benchmark_rule_id": "1.1.1",
"rego_rule_id": "cis_k8s.cis_1_1_1",
"name": "Ensure that the API server pod specification file permissions are set to 644 or more restrictive (Automated)",
"description": "'Disable anonymous requests to the API server",
"rationale": "When enabled, requests that are not rejected by other configured authentication methods\nare treated as anonymous requests. These requests are then served by the API server. You\nshould rely on authentication to authorize access and disallow anonymous requests.\nIf you are using RBAC authorization, it is generally considered reasonable to allow\nanonymous access to the API Server for health checks and discovery purposes, and hence\nthis recommendation is not scored. However, you should consider whether anonymous\ndiscovery is an acceptable risk for your purposes.",
"impact": "Anonymous requests will be rejected.",
"default_value": "By default, anonymous access is enabled.",
"remediation": "Edit the API server pod specification file /etc/kubernetes/manifests/kubeapiserver.yaml on the master node and set the below parameter.\n--anonymous-auth=false",
"enabled": true,
"muted": false,
"tags": [
"Kubernetes",
"Containers"
],
"benchmark": { "name": "CIS Kubernetes", "version": "1.4.1" },
"severity": "low"
},
"id": "good-csp-rule-template-abc-1",
"type": "csp-rule-template"
}
3 changes: 3 additions & 0 deletions versions/1/changelog.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,9 @@
- description: Prepare for next version
type: enhancement
link: https://github.com/elastic/package-spec/pull/275
- description: Add kibana/csp-rule-template asset
type: enhancement
link: https://github.com/elastic/package-spec/pull/276
- version: 1.4.1
changes:
- description: ML model file name now matches the id of the model.
Expand Down
9 changes: 9 additions & 0 deletions versions/1/kibana/spec.yml
Original file line number Diff line number Diff line change
Expand Up @@ -74,6 +74,15 @@
type: file
contentMediaType: "application/json"
pattern: '^.+\.json$'
- description: Folder containing CSP rule templates
type: folder
name: "csp_rule_template"
required: false
contents:
- description: An individual CSP rule template file for the cloud security posture management solution
type: file
contentMediaType: "application/json"
pattern: '^.+\.json$'
- description: Folder containing ML module assets
type: folder
name: ml_module
Expand Down

0 comments on commit 1cd07c6

Please sign in to comment.