[Security solution] Endpoint exception RBAC in ESS siemV4 for 9.2#233433
Merged
tomsonpl merged 55 commits intoelastic:mainfrom Sep 26, 2025
Merged
[Security solution] Endpoint exception RBAC in ESS siemV4 for 9.2#233433tomsonpl merged 55 commits intoelastic:mainfrom
siemV4 for 9.2#233433tomsonpl merged 55 commits intoelastic:mainfrom
Conversation
469173e to
a3bf7b9
Compare
similarly to other endpoint artifacts
a3bf7b9 to
dc991df
Compare
logeekal
approved these changes
Sep 19, 2025
Contributor
logeekal
left a comment
There was a problem hiding this comment.
PR looks LGTM from investigations perspective. Thanks for detailed PR description. It helped in better understanding and testing.
andrew-goldstein
approved these changes
Sep 22, 2025
jloleysens
approved these changes
Sep 23, 2025
Contributor
jloleysens
left a comment
There was a problem hiding this comment.
Focused my review on serverless.security.yml. Based on the description for siemv4 this makes sense.
Contributor
|
@elasticmachine merge upstream |
Contributor
|
@elasticmachine merge upstream |
Contributor
💔 Build Failed
Failed CI StepsTest Failures
Metrics [docs]Async chunks
Unknown metric groupsReferences to deprecated APIs
History
|
niros1
pushed a commit
that referenced
this pull request
Sep 30, 2025
rylnd
pushed a commit
to rylnd/kibana
that referenced
this pull request
Oct 17, 2025
gergoabraham
added a commit
that referenced
this pull request
Oct 30, 2025
## Summary Update `security` roles used in local serverless instance and in tests: - switch from `siemV3` to `siemV4` - apply the migration from the following Kibana PR: - #233433 - rules: - security ALL -> endpoint exceptions ALL - security READ -> endpoint exceptions READ - **BUGFIX**: t1/t2 analyst roles lose their endpoint exceptions READ access, as intended PR in `elasticsearch-controller`: - elastic/elasticsearch-controller#1223
sbelastic
pushed a commit
to sbelastic/kibana
that referenced
this pull request
Oct 30, 2025
## Summary Update `security` roles used in local serverless instance and in tests: - switch from `siemV3` to `siemV4` - apply the migration from the following Kibana PR: - elastic#233433 - rules: - security ALL -> endpoint exceptions ALL - security READ -> endpoint exceptions READ - **BUGFIX**: t1/t2 analyst roles lose their endpoint exceptions READ access, as intended PR in `elasticsearch-controller`: - elastic/elasticsearch-controller#1223
ana-davydova
pushed a commit
to ana-davydova/kibana
that referenced
this pull request
Nov 3, 2025
## Summary Update `security` roles used in local serverless instance and in tests: - switch from `siemV3` to `siemV4` - apply the migration from the following Kibana PR: - elastic#233433 - rules: - security ALL -> endpoint exceptions ALL - security READ -> endpoint exceptions READ - **BUGFIX**: t1/t2 analyst roles lose their endpoint exceptions READ access, as intended PR in `elasticsearch-controller`: - elastic/elasticsearch-controller#1223
albertoblaz
pushed a commit
to albertoblaz/kibana
that referenced
this pull request
Nov 4, 2025
## Summary Update `security` roles used in local serverless instance and in tests: - switch from `siemV3` to `siemV4` - apply the migration from the following Kibana PR: - elastic#233433 - rules: - security ALL -> endpoint exceptions ALL - security READ -> endpoint exceptions READ - **BUGFIX**: t1/t2 analyst roles lose their endpoint exceptions READ access, as intended PR in `elasticsearch-controller`: - elastic/elasticsearch-controller#1223
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
should be merged on the same week as:
Tip
Apologies for the huge PR. To help getting started, as we're getting closer to feature freeze:
authorization.ts) is 3k lines on its own, and the rest is test updates and the necessary small updates in different plugins. But all the changes belong together unfortunately.siemV3tosiemV4, both on ESS and serverless environments, both with custom and pre-defined roles when applicable. (result 1, result 2, result 3)Summary
The goal of this PR is to add Endpoint Exceptions sub-feature privilege to ESS and Serverless in the same way.
(with new text)
ESS
On ESS, Endpoint Exceptions did not have its own sub-privilege: it was included implicitly in the Security privilege (
Security:ALL => EE:ALL,Security:READ => EE:READ). Therefore, areplacedByrole migration and api backward compatibility was added, in order to preserve behavior for the users.Serverless
On Serverless, Endpoint Exceptions sub-feature privilege has already existed in the following way:
Here, a
replacedByrole migration and api backward compatibility was also added.Including Endpoint Exceptions in
Security:READ/ALLEndpoint Exceptions is not included anymore in
Security:READ/ALLprivileges, it always has to be explicitly allowed, similarly to other artifacts.Feature deprecations / role migrations
security:NONEflowchart LR subgraph siemV3[siem/siemV2/siemV3] none1[none] end subgraph siemV4 none2[none] end none1 --> none2security:READ- same for ESS and serverlessflowchart LR subgraph siemV2[siem/siemV2/siemV3] read1[read] end subgraph siemV4 read2[minimal_read] endpoint_exceptions_read end read1 --enable sub-feature privilege customization toggle--> read2 read1 --> endpoint_exceptions_readsecurity:MINIMAL_READ(when the sub-feature customizsation toggle is enabled)ESS
flowchart LR subgraph siemV2[siem/siemV2/siemV3] read1[minimal_read] end subgraph siemV4 read2[minimal_read] endpoint_exceptions_read end read1 --> read2 read1 --> endpoint_exceptions_readServerless - no change
flowchart LR subgraph siemV2[siem/siemV2/siemV3] read1[minimal_read] eer1[endpoint_exceptions_read] eew1[endpoint_exceptions_all] end subgraph siemV4 read2[minimal_read] eer2[endpoint_exceptions_read] eew2[endpoint_exceptions_all] end read1 --> read2 eer1 --> eer2 eew1 --> eew2security:ALL- same for ESS and serverlessflowchart LR subgraph siemV2[siem/siemV2/siemV3] all1[all] end subgraph siemV4 read2[minimal_all] endpoint_exceptions_all end all1 --enable sub-feature privilege customization toggle--> read2 all1 --> endpoint_exceptions_allsecurity:MINIMAL_ALL(when the sub-feature customization toggle is enabled)ESS
flowchart LR subgraph siemV2[siem/siemV2/siemV3] all1[minimal_all] end subgraph siemV4 all2[minimal_all] endpoint_exceptions_all end all1 --> all2 all1 --> endpoint_exceptions_allServerless - no change
flowchart LR subgraph siemV2[siem/siemV2/siemV3] all1[minimal_all] eer1[endpoint_exceptions_read] eew1[endpoint_exceptions_all] end subgraph siemV4 all2[minimal_all] eer2[endpoint_exceptions_read] eew2[endpoint_exceptions_all] end all1 --> all2 eer1 --> eer2 eew1 --> eew2Testing ✅ done
see result 1, result 2, result 3
It should be tested on cloud deploy, both serverless and ESS.
What to test?
* For these, custom roles can be created in the Dev console with previous siem versions.
Dev console commands
Note
Coming from
siemorsiemV2security:ALLwill includeglobal_artifact_management_allas well. See #219566Coming from
siemwill add new features next tosiemV4:securitySolutionTimelineandsecuritySolutionNotes. See #201780What not to test?
What should be seen is that the role migration works well. What won't be seen is that setting Endpoint Exception sub-privilege has the expected effect, as there are some authorization bugs on UI side. These bugs will being fixed while this PR is under review, in a follow-up PR. Issue: https://github.com/elastic/security-team/issues/13921
Checklist
Check the PR satisfies following conditions.
Reviewers should verify this PR satisfies this list as well.
release_note:*label is applied per the guidelinesRelease notes
Endpoint exceptions sub-privilege is added to ESS. From now on, Endpoint Exception access needs to be explicitly set both on ESS and Serverless for user roles.
Doc issue