diff --git a/docs/cloud-native-security/cspm-get-started-aws.asciidoc b/docs/cloud-native-security/cspm-get-started-aws.asciidoc index 7508b739a5..86f465ec2b 100644 --- a/docs/cloud-native-security/cspm-get-started-aws.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-aws.asciidoc @@ -30,6 +30,21 @@ This page explains how to get started monitoring the security posture of your cl You can set up CSPM for AWS either by enrolling a single cloud account, or by enrolling an organization containing multiple accounts. Either way, first you will add the CSPM integration, then enable cloud account access. +[discrete] +[[cspm-aws-agentless]] +== Agentless deployment option +beta::[] + +The steps to create an agentless deployment are similar to those to create an agent-based deployment. To deploy using agentless technology, follow the instructions below with the following modifications: + +. On the **Add Cloud Security Posture Management (CSPM) integration** page, after you name your integration and give it a description, click **Advanced options** then select **Agentless (BETA)**. +. Once you've selected **Agentless (BETA)**, you'll need to authenticate to AWS. Agentless AWS deployments support authentication via <>, and by two manual authentication methods: <> and <>. +. Once you've selected an authentication method and provided any necessary credentials, click **Save and continue** to finish deployment. + +[discrete] +[[cspm-aws-agent-based]] +== Agent-based deployment + [discrete] [[cspm-add-and-name-integration]] == Add the CSPM integration @@ -38,8 +53,6 @@ You can set up CSPM for AWS either by enrolling a single cloud account, or by en . Click *Add Cloud Security Posture Management (CSPM)*. . Select *AWS*, then either *AWS Organization* to onboard multiple accounts, or *Single Account* to onboard an individual account. . Give your integration a name that matches the purpose or team of the AWS account/organization you want to monitor, for example, `dev-aws-account`. -. beta:[] (Optional) Click **Advanced settings** to deploy the integration using agentless technology. - [discrete] @@ -49,7 +62,6 @@ The CSPM integration requires access to AWS's built-in https://docs.aws.amazon.c For most use cases, the simplest option is to use AWS CloudFormation to automatically provision the necessary resources and permissions in your AWS account. This method, as well as several manual options, are described below. -NOTE: beta:[] Agentless deployments support two authentication methods: <> and <>. [discrete] [[cspm-set-up-cloudformation]] diff --git a/docs/cloud-native-security/cspm-get-started-azure.asciidoc b/docs/cloud-native-security/cspm-get-started-azure.asciidoc index 101a8e2ffc..887a572dc8 100644 --- a/docs/cloud-native-security/cspm-get-started-azure.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-azure.asciidoc @@ -31,6 +31,18 @@ This page explains how to get started monitoring the security posture of your cl You can set up CSPM for Azure by by enrolling an Azure organization (management group) containing multiple subscriptions, or by enrolling a single subscription. Either way, first add the CSPM integration, then enable cloud account access. +[discrete] +[[cspm-azure-agentless]] +== Agentless deployment option +beta::[] + +The steps to create an agentless deployment are similar to those to create an agent-based deployment. To deploy using agentless technology, follow the instructions below with the following modifications: + +. On the **Add Cloud Security Posture Management (CSPM) integration** page, after you name your integration and give it a description, click **Advanced options** then select **Agentless (BETA)**. +. Once you've selected **Agentless (BETA)**, you'll need to authenticate to Azure. Agentless Azure deployments support authentication via the <> method described below. +. Once you've selected an authentication method and provided any necessary credentials, click **Save and continue** to finish deployment. + + [discrete] [[cspm-add-and-name-integration-azure]] === Add your CSPM integration diff --git a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc index dec49e4ccc..fc90860f72 100644 --- a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc @@ -30,6 +30,20 @@ This page explains how to get started monitoring the security posture of your GC You can set up CSPM for GCP either by enrolling a single project, or by enrolling an organization containing multiple projects. Either way, you need to first add the CSPM integration, then enable cloud account access. +[discrete] +[[cspm-gcp-agentless]] +== Agentless deployment option +beta::[] + +The steps to create an agentless deployment are similar to those to create an agent-based deployment. To deploy using agentless technology, follow the instructions below with the following modifications: + +. On the **Add Cloud Security Posture Management (CSPM) integration** page, after you name your integration and give it a description, click **Advanced options** then select **Agentless (BETA)**. +. Once you've selected **Agentless (BETA)**, click **Steps to Generate GCP Account Credentials** under **Setup Access**. Follow the instructions that appear to generate the necessary GCP credentials. +. Once you've entered your credentials under **Credentials json**, click **Save and continue** to deploy your integration. + +[discrete] +[[cspm-gcp-agent-based]] +== Agent-based deployment [discrete] [[cspm-add-and-name-integration-gcp]] diff --git a/docs/cloud-native-security/cspm.asciidoc b/docs/cloud-native-security/cspm.asciidoc index 6ffeb3a1c7..532f2efe3e 100644 --- a/docs/cloud-native-security/cspm.asciidoc +++ b/docs/cloud-native-security/cspm.asciidoc @@ -3,7 +3,7 @@ The Cloud Security Posture Management (CSPM) feature discovers and evaluates the services in your cloud environment — like storage, compute, IAM, and more — against configuration security guidelines defined by the https://www.cisecurity.org/[Center for Internet Security] (CIS) to help you identify and remediate risks that could undermine the confidentiality, integrity, and availability of your cloud data. -This feature currently supports Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. For step-by-step getting started guides, refer to <>, <>, or <>. +This feature currently supports agentless and agent-based deployments on Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. For step-by-step getting started guides, refer to <>, <>, or <>. .Requirements [sidebar] diff --git a/docs/getting-started/agentless-integrations.asciidoc b/docs/getting-started/agentless-integrations.asciidoc index 2cf2a446e3..d0aab1c39a 100644 --- a/docs/getting-started/agentless-integrations.asciidoc +++ b/docs/getting-started/agentless-integrations.asciidoc @@ -1,3 +1,10 @@ [[agentless-integrations]] = Agentless integrations +beta::[] + +Agentless integrations provide a means to ingest data while avoiding the orchestration, management, and maintenance needs associated with standard ingest infrastructure. Using agentless integrations makes manual agent deployment unnecessary, allowing you to focus on your data instead of the agent that collects it. + +We currently support one agentless integration: cloud security posture management (CSPM). Using this integration's agentless deployment option, you can enable Elastic's CSPM capabilities just by providing the necessary credentials. Agentless CSPM deployments support AWS, Azure, and GCP accounts. + +To learn more about agentless CSPM deployments, refer to the getting started guides for CSPM on <>, <>, or <>. \ No newline at end of file