[Change Proposal] When the deployment_mode agentless is enabled, invalid input configurations should be hidden from the users. #805
Labels
discuss
Issue needs discussion
Team:Cloud Security
Team:Fleet
Label for the Fleet team
Team:Service-Integrations
Label for the Service Integrations team
Motivation
When integrations are hosted and managed using the agentless deployment_mode, some special security handling is invoked. From a security perspective, we treat the deployment as if it could run arbitrary malicious code and be controlled by the user. Its network is isolated, ingress is disallowed and only specific egress is allowed.
This means that many inputs won't be user-useable. These inputs include tcp, udp, winlog, http endpoint, and filestream.
Some integrations like crowdstrike.fdrr have datastreams that support multiple input types. If we use the agentless deployment mode for this integration S3 will be valid, but filestream will not.
Questions
The text was updated successfully, but these errors were encountered: