Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DOCS] Creates separate doc for security in production #103973

Merged
merged 11 commits into from
Jul 7, 2021

Conversation

gchaps
Copy link
Contributor

@gchaps gchaps commented Jun 30, 2021

Summary

This PR:

  • Creates a new page for the security production considerations
  • Uses attributes for Kibana and Elasticsearch

Preview:
https://kibana_103973.docs-preview.app.elstc.co/guide/en/kibana/master/Security-production-considerations.html

@gchaps gchaps added v7.13.0 v7.14.0 v7.15.0 v8.0.0 release_note:skip Skip the PR/issue when compiling release notes Team:Docs labels Jun 30, 2021
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-docs (Team:Docs)

@gchaps
Copy link
Contributor Author

gchaps commented Jun 30, 2021

@elasticmachine run elasticsearch-ci/docs

@gchaps
Copy link
Contributor Author

gchaps commented Jul 1, 2021

@elasticmachine merge upstream

@gchaps gchaps requested a review from legrego July 1, 2021 17:08
@gchaps
Copy link
Contributor Author

gchaps commented Jul 1, 2021

@legrego Can you please write an intro paragraph for this doc?

@jportner jportner requested review from jportner and removed request for legrego July 1, 2021 17:25
This is the highest priority item for securing a production installation
of Kibana.
Comment on lines 32 to 38
Kibana uses a Content Security Policy to help prevent the browser from allowing
unsafe scripting, but older browsers will silently ignore this policy. If your
organization does not need to support Internet Explorer 11 or much older
versions of our other supported browsers, we recommend that you enable Kibana's
`strict` mode for content security policy, which will block access to Kibana
for any browser that does not enforce even a rudimentary set of CSP
protections.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We stopped supporting IE in Kibana 7.9, so this is stale info.
I did check our other supported browsers (Chrome, Firefox, Safari) -- each of them first started supporting Content Security Policy around 2012-2013. So I suppose we should leave this section in here and just remove the bit about IE, yeah?

@jportner
Copy link
Contributor

jportner commented Jul 7, 2021

@elasticmachine merge upstream

@gchaps gchaps requested a review from jportner July 7, 2021 18:52
Copy link
Contributor

@jportner jportner left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Love it, thanks!!!

@gchaps gchaps merged commit e92892a into elastic:master Jul 7, 2021
@gchaps gchaps deleted the docs/production-considerations-security branch July 7, 2021 20:19
gchaps added a commit to gchaps/kibana that referenced this pull request Jul 7, 2021
* [DOCS] Creates separate doc for security in production

* Use Kibana attribute

* Update CSP section

* Move SSL section to the top

This is the highest priority item for securing a production installation
of Kibana.

* Add section on using secure HTTP headers

* Write intro

* [DOCS] Fixes broken link and other minor edits

* [DOCS] Changes man to manipulator

Co-authored-by: Kibana Machine 
<42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Joe Portner <5295965+jportner@users.noreply.github.com>
jloleysens added a commit to jloleysens/kibana that referenced this pull request Jul 8, 2021
…-of-max-results

* 'master' of github.com:elastic/kibana: (36 commits)
  Lower Kibana app bundle limits (elastic#104688)
  [Security Solutions] Fixes bug with the filter query compatibility for transforms (elastic#104559)
  [RAC] Add mapping update logic to RuleDataClient (elastic#102586)
  Fix import workpad (elastic#104722)
  [canvas] Fix Storybook service decorator (elastic#104750)
  [Detection Rules] Add 7.14 rules (elastic#104772)
  [Enterprise Search] Fix beta notification in sidebar (elastic#104763)
  Fix engine routes that are meta engine or non-meta-engine specific (elastic#104757)
  [Fleet] Fix policy revision number getting bumped for no reason (elastic#104696)
  persistable state migrations (elastic#103680)
  [Fleet] Fix add agent in the package policy table (elastic#104749)
  [DOCS] Creates separate doc for security in production (elastic#103973)
  [SO Migration] fix reindex race on multi-instance mode (elastic#104516)
  [Security Solution] Update text in Endpoint Admin pages (elastic#104649)
  [package testing] Decrease timeout to 2 hours (elastic#104668)
  Fix background styling of waterfall chart sidebar tooltip. (elastic#103997)
  [Fleet + Integrations UI] Integrations UI Cleanup (elastic#104641)
  [Fleet] Link to download page of current stack version on Agent install instructions (elastic#104494)
  [Workplace Search] Fix Media Type field preview is unformatted bug (elastic#104684)
  [ML] add marker body (elastic#104672)
  ...

# Conflicts:
#	x-pack/plugins/fleet/public/search_provider.test.ts
gchaps added a commit that referenced this pull request Jul 9, 2021
…4769)

* [DOCS] Creates separate doc for security in production

* Use Kibana attribute

* Update CSP section

* Move SSL section to the top

This is the highest priority item for securing a production installation
of Kibana.

* Add section on using secure HTTP headers

* Write intro

* [DOCS] Fixes broken link and other minor edits

* [DOCS] Changes man to manipulator

Co-authored-by: Kibana Machine 
<42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Joe Portner <5295965+jportner@users.noreply.github.com>

Co-authored-by: Joe Portner <5295965+jportner@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants