elastic / kibana

Your window into the Elastic Stack
https://www.elastic.co/products/kibana
Other
19.57k stars 8.09k forks source link

[Cloud Security] [Tech Debt] Improve Cloud Security integration architecture #164639

Open opauloh opened 12 months ago

opauloh commented 12 months ago

Summary

Context: CSPM, KSPM, and CNVM are template policies under the same integration called Security Posture Management, the code located here, and the entry point is the policy_template_form.tsx file.

As we have specific use cases and UI elements for each template policy, we have separate code for each cloud provider or use case (aws_credentials_form.tsx, gcp_credential_form.tsx, eks_credentials_form.tsx, policy_template_form.tsx). However, at the same time that we have different use cases, there are also common behaviors we would like to exist across all template policies, such as the ability to save the integration with only the credentials fields needed and clean other fields, have the same naming convention and be able to reuse the deployment instructions for CloudFormation and Google Shell which currently is shown on the integration page and on the install Agent Flyout.

The current architecture doesn't provide much room for such logic reuses, so this ticket is about brainstorming a solution to improve the Frontend architecture and data model of the Cloud Security integration.

elasticmachine commented 12 months ago

Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security)