Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

[Epic] Road to Agentless + Security Integrations Release (Phase I) #11810

Open
2 of 5 tasks
qcorporation opened this issue Nov 21, 2024 · 4 comments
Open
2 of 5 tasks
Assignees
Labels
Epic Team:Security-Deployment and Devices Deployment and Devices Security team [elastic/sec-deployment-and-devices] Team:Security-Service Integrations Security Service Integrations Team [elastic/security-service-integrations]

Comments

@qcorporation
Copy link
Collaborator

qcorporation commented Nov 21, 2024

Topic

The Epic describes the Development efforts to release the first initial Security Integrations under the Agentless deployment model.
Product Ticket is defined here

What are we releasing?

Security Integrations targeted for the initial release for the 8.18 release, are:

  1. Office 365
  2. Okta
  3. AWS Security Hub
  4. SentinelOne
  5. AbuseCH
  6. Microsoft Defender Cloud
  7. Microsoft 365 Defender
  8. Microsoft Defender for Endpoint
  9. Google Security Command Center
  10. Google Workspace
  11. Tenable IO
  12. Wiz
  13. Qualys VMDR
  14. Microsoft Sentinel
  15. Google SecOps
  16. Splunk

What is required for the release?

  • Enabling the integrations listed above within the integration manifest.yml template policy to have an agentless deployment mode
  • Providing important Agentless information within the integration documentation
  • End-to-end testing for each integration (require account/permission to vendors)

Dependencies

State Storage for Filebeat: PR: elastic/beats#41446
Disable Agentless in UI for on-prem users: elastic/kibana#201217
Hide unsupported inputs and outputs elastic/package-spec#805 (all listed integrations have been vetted for supported inputs)

Breakdown

Tasks

Preview Give feedback
  1. Team:Security-Deployment and Devices
    qcorporation
  2. Team:Security-Deployment and Devices Team:Service-Integrations
    narph
  3. Team:Security-Deployment and Devices
    qcorporation
@qcorporation qcorporation self-assigned this Nov 21, 2024
@qcorporation qcorporation changed the title [Epic] Road to Agentless + Integrations Release (Phase I) [Epic] SIT: Road to Agentless + Integrations Release (Phase I) Nov 21, 2024
@qcorporation qcorporation changed the title [Epic] SIT: Road to Agentless + Integrations Release (Phase I) [Epic] Road to Agentless + Integrations Release (Phase I) Nov 21, 2024
@qcorporation qcorporation changed the title [Epic] Road to Agentless + Integrations Release (Phase I) [Epic] Road to Agentless + Security Integrations Release (Phase I) Nov 21, 2024
@qcorporation qcorporation added the Team:Security-Deployment and Devices Deployment and Devices Security team [elastic/sec-deployment-and-devices] label Nov 27, 2024
@elasticmachine
Copy link

Pinging @elastic/sec-deployment-and-devices (Team:Security-Deployment and Devices)

@qcorporation qcorporation added the Team:Security-Service Integrations Security Service Integrations Team [elastic/security-service-integrations] label Nov 27, 2024
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

@smriti0321
Copy link

@qcorporation 2 dependencies (elastic/kibana#202091 and elastic/kibana#202090) on the Fleet team are closed now, FYI- this will enable us restrict the inputs which are supported for agentless.

@smriti0321
Copy link

@qcorporation The dependency related to the state store has been resolved with the merge of this pull request. Since the CSPM integration does not use this capability by design, we want to see this new capability utilized in Okta or any other integration that stores state.

As discussed during out sync on agentless integration yesterday, with the public release of 9.0 Beta approaching on February 18th, we need to gain more confidence in these changes. Please keep us updated on your agentless support progress for these SaaS integrations and report any issues you encounter. cc @oren-zohar @norrietaylor @snehsach19 @tehilashn

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
Epic Team:Security-Deployment and Devices Deployment and Devices Security team [elastic/sec-deployment-and-devices] Team:Security-Service Integrations Security Service Integrations Team [elastic/security-service-integrations]
Projects
None yet
Development

No branches or pull requests

3 participants