-
**Describe the bug:**
I noticed that we store all the values filled in the Cloud Security Posture form, even the ones not used. For example I added a random secret access key for cspm aws and kspm e…
-
**Motivation**
When accessing Cloud Security pages with a role that lacks the required privileges:
- On the dashboard page, nothing appears until one of the tabs (Cloud / Kubernetes) is clicked.
- …
-
**Describe the Issue**
Full CSPM connection to AWS Live environment - Evaluation of Data
**Additional Context**
Add any other context, attachments or screenshots
**Acceptance Criteria**
- Continue f…
-
VERSION: 8.15.0
BUILD: 76030
COMMIT: https://github.com/elastic/kibana/commit/17bf446e73a8403d67b7945ab79f95c7dd1eefdf
**Describe the bug:**
Grouped by Cloud account shows an incorrect number …
-
Hello,
Recently I've added the KSPM integration to one of our policies.
Later, when monitoring the execution of security rules I found some rules with warnings due to the fact that the index `logs-c…
-
Create a Feature Adoption Dashboard using the `gold_cloud_security_feature_adoption` and [Wireframe](https://miro.com/app/board/uXjVM2xi1Tk=/?moveToWidget=3458764566981298569&cot=14)
**Definition of…
-
### 👟 Reproduction steps
First time user, when I hit find unused it is working perfectly.
However the other options recommend_groups and terraform are throwing errors
$ sudo airiam recommen…
-
After the changes introduced in CIS AWS, a `finding` can have different fields based on its posture type.
We should rewrite the type for `CspFinding` as a discriminating union that uses the `rule.ben…
-
**Describe the bug:**
The snippet inside the CSP Add Agent drawer is editable
**Kibana/Elasticsearch Stack version:**
8.12.0
**Steps to reproduce:**
1. Add a new CSP integration (I added …
-
## Description
AWS Config provides configurations and compliance statuses of AWS resources within an account. It records configuration changes and generates snapshots of the current configuration sta…