Skip to content

Commit bfae1d2

Browse files
authored
Update 0046-additional-rule-field.md
As per comment (#2386 (review)) on Stage 1 of this RFC. Adding the usage, source data and scope of impact
1 parent eaecbe7 commit bfae1d2

File tree

1 file changed

+8
-15
lines changed

1 file changed

+8
-15
lines changed

rfcs/text/0046-additional-rule-field.md

Lines changed: 8 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -26,31 +26,24 @@ rule.remediation | array | Enable encryption on all S3 buckets | Used to capture
2626
## Usage
2727

2828
<!--
29-
Stage 1: Describe at a high-level how these field changes will be used in practice. Real world examples are encouraged. The goal here is to understand how people would leverage these fields to gain insights or solve problems. ~1-3 paragraphs.
30-
-->
29+
The new remediation field will be used to track and manage remediation actions for compliance findings identified by the CIS benchmarks across AWS, GCP, and Azure environments. This field will help security teams to document the steps taken to address non-compliance issues, ensuring that all actions are recorded and can be audited. For example, if a CIS benchmark identifies that multi-factor authentication (MFA) is not enabled for all users, the remediation field will include details on how MFA was enabled and verified.
3130
32-
## Source data
31+
In practice, this field will be leveraged by security operations teams to ensure that all compliance gaps are addressed promptly and effectively. It will also be used by auditors to verify that the organization is adhering to security best practices and regulatory requirements. By having a standardized field for remediation, organizations can streamline their compliance processes and improve their overall security posture.
3332
34-
<!--
35-
Stage 1: Provide a high-level description of example sources of data. This does not yet need to be a concrete example of a source document, but instead can simply describe a potential source (e.g. nginx access log). This will ultimately be fleshed out to include literal source examples in a future stage. The goal here is to identify practical sources for these fields in the real world. ~1-3 sentences or unordered list.
36-
-->
33+
## Source data
3734
3835
<!--
39-
Stage 2: Included a real world example source document. Ideally this example comes from the source(s) identified in stage 1. If not, it should replace them. The goal here is to validate the utility of these field changes in the context of a real world example. Format with the source name as a ### header and the example document in a GitHub code block with json formatting, or if on the larger side, add them to the corresponding RFC folder.
40-
-->
36+
Potential sources of data for the remediation field include:
4137
42-
<!--
43-
Stage 3: Add more real world example source documents so we have at least 2 total, but ideally 3. Format as described in stage 2.
38+
AWS Config rules and AWS Security Hub findings
39+
GCP Security Command Center findings
40+
Azure Security Center and Azure Policy compliance data
4441
-->
4542

4643
## Scope of impact
4744

4845
<!--
49-
Stage 2: Identifies scope of impact of changes. Are breaking changes required? Should deprecation strategies be adopted? Will significant refactoring be involved? Break the impact down into:
50-
* Ingestion mechanisms (e.g. beats/logstash)
51-
* Usage mechanisms (e.g. Kibana applications, detections)
52-
* ECS project (e.g. docs, tooling)
53-
The goal here is to research and understand the impact of these changes on users in the community and development teams across Elastic. 2-5 sentences each.
46+
Currently this is achieved in product using a custom field, adding this new field will standardize the mapping for new and existing integrations. No major impact on Ingestion/ Kibana and Documentation expected.
5447
-->
5548

5649
## Concerns

0 commit comments

Comments
 (0)