elastic / integrations

Elastic Integrations
https://www.elastic.co/integrations
Other
200 stars 429 forks source link

proposal: define minimal interface for a firewall dashboard's data #3850

Open efd6 opened 2 years ago

efd6 commented 2 years ago

In #3102 there has been the suggestion that we add a vendor/product-agnostic firewall dashboard. In order to do this we should define a minimal or near-minimal set of fields that can be expected to be non-empty in a firewall integration's documents.

This will help harmonise the firewall integrations, provide a working direction for a generic firewall dashboard and also help provide a basis for designing and implementing new vendor/product-specific dashboards.

Initial strawman suggestions:

It's not expected that all fields will be provided by all packages, but that only a minimal number of visualisations would show "No results found' in normal use. The observer.{name,product,vendor} are intended to allow the user to hone in on specific hosts in their system if they are running a diverse set and so be able to move to the product-specific dashboards when the generic dashboard shows something interesting that needs more detail.

elasticmachine commented 2 years ago

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

jamiehynds commented 2 years ago

FYI @paulewing - this is the issue for the firewall dashboard I mentioned. Is there someone in UX responsible for these top-level dashboards, that we could discuss with?

@dainperkins feel free to chime in with thoughts/feedback :)

dainperkins commented 2 years ago

I suspect source/dest (ip, port, geo, as) will be more ubiquitous than client/server... I would consider breaking the 1 dashboard up into a couple

dainperkins commented 2 years ago

@jamiehynds @paulewing @efd6. Would love to help anyway I can btw, happy to chat, help plan/design, poke SAs for thoughts, herd cats, etc.

efd6 commented 2 years ago

Thanks @dainperkins, I've added cloud.* (at least provider and service.name are likely to be informative in context as well) to the list. I missed the server tree, so I'll add that so it's not forgotten (it can be resolved later).

The issue here is for defining what data we can expect to be present in the majority of cases rather than how we will split the presentation.

dainperkins commented 2 years ago

@efd6 this may be me being too caught up in the details, but I wonder if further slicing into dashboard themes as the top cut would make this easier to work thru, so the focus can be not be on ECS fields available, but on fields expected in a specific context from the users perspective. if there's missing pieces that gives teams a good priority list for specific integration ERs to ensure good normalization across the board

Hi level FW (or even Network Security*) Dashboards:

*Would it be worth it to transition to more of a Network Security (as opposed to "Firewall Overview") paradigm? theres the potential to provide a central place to show anything that is blocking connections (e.g. Meraki allows l3 rules on Access points) from a network security standpoint, and allow drill down into more specifics...

Event.[catgories] source. destination. observer. network. [protocols]. (e.g. dns, http, tls) url.

efd6 commented 2 years ago

@efd6 this may be me being too caught up in the details, but I wonder if further slicing into dashboard themes as the top cut would make this easier to work thru, so the focus can be not be on ECS fields available, but on fields expected in a specific context from the users perspective.

The intention was that that would be a separate issue.