Enhance the existing CSP violation reporting pipeline to include more fields and support other policy violation reports #175113
Labels
Feature:Security/CSP
Platform Security - Content Security Policy
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Summary
In the scope of #162974 and #153584, we successfully adapted the event-based telemetry (EBT) framework for the collection of CSP violation reports. Now that we know it works well for this use case, we can consider moving further and enhancing this reporting pipeline to cover other types of policy violation reports (e.g.,
Permission Policy
violation reports). Additionally, we need to add more fields to the violation reports to make monitoring and investigation more efficient, so that the final document/report might look like this:In addition to new fields, we also need to add the ingest pipeline with the following processors to make data more filterable/searchable:
user_agent
field, so that we have dedicated fields for the user agent's OS and browser, which might be beneficial while debugging OS- or browser-specific issues.Tasks
hasCustomPlugins
report field)version
,deploymentId
, etc.)kibana-security-csp-violations.edn
-->kibana-security-web-policy-violations.edn
)The text was updated successfully, but these errors were encountered: