-
Notifications
You must be signed in to change notification settings - Fork 515
Description
As part of effort to leverage Cloud Detection and Response (CDR) workflows such as Elastic CSPM and CNVM for 3rd party integrations, both misconfigurations findings data from Elastic AWS Config integration needs to be enriched just like previous enhancements for AWS SecurityHub.
For this work, the aws.config data stream which ingests misconfigurations findings must be enriched to support Elastic CSPM workflow.
Tasks:
-
AWS Config: Implement mappings for Cloud Security Workflows #15232
-
AWS Config: Implement transform for Cloud Security Workflows #15233
Success Criteria
The misconfigurations findings from AWS Config integration should be part of the data view suggested and mapped to the ECS schema supported by Cloud Security features.
To develop ES and Kibana assets (transforms, ingest pipelines, data views, etc.) required to make the data from AWS Config integration available in the Cloud Security features.