Skip to content

Commit

Permalink
Adds agentless options to CSPM docs
Browse files Browse the repository at this point in the history
  • Loading branch information
benironside committed Oct 11, 2024
1 parent fbcda4b commit 75a273f
Show file tree
Hide file tree
Showing 5 changed files with 49 additions and 4 deletions.
18 changes: 15 additions & 3 deletions docs/cloud-native-security/cspm-get-started-aws.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,21 @@ This page explains how to get started monitoring the security posture of your cl

You can set up CSPM for AWS either by enrolling a single cloud account, or by enrolling an organization containing multiple accounts. Either way, first you will add the CSPM integration, then enable cloud account access.

[discrete]
[[cspm-aws-agentless]]
== Agentless deployment option
beta::[]

The steps to create an agentless deployment are similar to those to create an agent-based deployment. To deploy using agentless technology, follow the instructions below with the following modifications:

. On the **Add Cloud Security Posture Management (CSPM) integration** page, after you name your integration and give it a description, click **Advanced options** then select **Agentless (BETA)**.
. Once you've selected **Agentless (BETA)**, you'll need to authenticate to AWS. Agentless AWS deployments support authentication via <<cspm-set-up-cloudformation, CloudFormation>>, and by two manual authentication methods: <<cspm-use-temp-credentials, temporary keys>> and <<cspm-use-keys-directly, direct access keys>>.
. Once you've selected an authentication method and provided any necessary credentials, click **Save and continue** to finish deployment.

[discrete]
[[cspm-aws-agent-based]]
== Agent-based deployment

[discrete]
[[cspm-add-and-name-integration]]
== Add the CSPM integration
Expand All @@ -38,8 +53,6 @@ You can set up CSPM for AWS either by enrolling a single cloud account, or by en
. Click *Add Cloud Security Posture Management (CSPM)*.
. Select *AWS*, then either *AWS Organization* to onboard multiple accounts, or *Single Account* to onboard an individual account.
. Give your integration a name that matches the purpose or team of the AWS account/organization you want to monitor, for example, `dev-aws-account`.
. beta:[] (Optional) Click **Advanced settings** to deploy the integration using agentless technology.



[discrete]
Expand All @@ -49,7 +62,6 @@ The CSPM integration requires access to AWS's built-in https://docs.aws.amazon.c

For most use cases, the simplest option is to use AWS CloudFormation to automatically provision the necessary resources and permissions in your AWS account. This method, as well as several manual options, are described below.

NOTE: beta:[] Agentless deployments support two authentication methods: <<cspm-use-temp-credentials, temporary keys>> and <<cspm-use-keys-directly, direct access keys>>.

[discrete]
[[cspm-set-up-cloudformation]]
Expand Down
12 changes: 12 additions & 0 deletions docs/cloud-native-security/cspm-get-started-azure.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,18 @@ This page explains how to get started monitoring the security posture of your cl
You can set up CSPM for Azure by by enrolling an Azure organization (management group) containing multiple subscriptions, or by enrolling a single subscription. Either way, first add the CSPM integration, then enable cloud account access.


[discrete]
[[cspm-azure-agentless]]
== Agentless deployment option
beta::[]

The steps to create an agentless deployment are similar to those to create an agent-based deployment. To deploy using agentless technology, follow the instructions below with the following modifications:

. On the **Add Cloud Security Posture Management (CSPM) integration** page, after you name your integration and give it a description, click **Advanced options** then select **Agentless (BETA)**.
. Once you've selected **Agentless (BETA)**, you'll need to authenticate to Azure. Agentless Azure deployments support authentication via the <<cspm-azure-client-secret, Service principal with client secret>> method described below.
. Once you've selected an authentication method and provided any necessary credentials, click **Save and continue** to finish deployment.


[discrete]
[[cspm-add-and-name-integration-azure]]
=== Add your CSPM integration
Expand Down
14 changes: 14 additions & 0 deletions docs/cloud-native-security/cspm-get-started-gcp.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,20 @@ This page explains how to get started monitoring the security posture of your GC

You can set up CSPM for GCP either by enrolling a single project, or by enrolling an organization containing multiple projects. Either way, you need to first add the CSPM integration, then enable cloud account access.

[discrete]
[[cspm-gcp-agentless]]
== Agentless deployment option
beta::[]

The steps to create an agentless deployment are similar to those to create an agent-based deployment. To deploy using agentless technology, follow the instructions below with the following modifications:

. On the **Add Cloud Security Posture Management (CSPM) integration** page, after you name your integration and give it a description, click **Advanced options** then select **Agentless (BETA)**.
. Once you've selected **Agentless (BETA)**, click **Steps to Generate GCP Account Credentials** under **Setup Access**. Follow the instructions that appear to generate the necessary GCP credentials.
. Once you've entered your credentials under **Credentials json**, click **Save and continue** to deploy your integration.

[discrete]
[[cspm-gcp-agent-based]]
== Agent-based deployment

[discrete]
[[cspm-add-and-name-integration-gcp]]
Expand Down
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@

The Cloud Security Posture Management (CSPM) feature discovers and evaluates the services in your cloud environment — like storage, compute, IAM, and more — against configuration security guidelines defined by the https://www.cisecurity.org/[Center for Internet Security] (CIS) to help you identify and remediate risks that could undermine the confidentiality, integrity, and availability of your cloud data.

This feature currently supports Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. For step-by-step getting started guides, refer to <<cspm-get-started,Get started with CSPM for AWS>>, <<cspm-get-started-gcp, Get started with CSPM for GCP>>, or <<cspm-get-started-azure, Get started with CSPM for Azure>>.
This feature currently supports agentless and agent-based deployments on Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. For step-by-step getting started guides, refer to <<cspm-get-started,Get started with CSPM for AWS>>, <<cspm-get-started-gcp, Get started with CSPM for GCP>>, or <<cspm-get-started-azure, Get started with CSPM for Azure>>.

.Requirements
[sidebar]
Expand Down
7 changes: 7 additions & 0 deletions docs/getting-started/agentless-integrations.asciidoc
Original file line number Diff line number Diff line change
@@ -1,3 +1,10 @@
[[agentless-integrations]]
= Agentless integrations

beta::[]

Agentless integrations provide a means to ingest data while avoiding the orchestration, management, and maintenance needs associated with standard ingest infrastructure. Using agentless integrations makes manual agent deployment unnecessary, allowing you to focus on your data instead of the agent that collects it.

We currently support one agentless integration: cloud security posture management (CSPM). Using this integration's agentless deployment option, you can enable Elastic's CSPM capabilities just by providing the necessary credentials. Agentless CSPM deployments support AWS, Azure, and GCP accounts.

To learn more about agentless CSPM deployments, refer to the getting started guides for CSPM on <<cspm-get-started, AWS>>, <<cspm-get-started-azure, Azure>>, or <<cspm-get-started-gcp, GCP>>.

0 comments on commit 75a273f

Please sign in to comment.