-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security][Tech Debt] Make sure all of our APIs apply authorization #184075
Comments
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
@kfirpeled @animehart How can we verify this? |
@oren-zohar |
bulk action is actualy makes updates to data, it is not @animehart can you fix this?? |
Can't be tested on serverless security project In order to test this, we need to define a role without security permissions. This cannot be accomplished when using serverless project. On the other projects I attach here a known issue that was reproduced while verifying this issue: #188354 |
@kfirpeled No need if the plugin isn't available. I agree it's redundant. |
Describe the feature:
Currently not all of our APIs has the way to check if user has the permission to use that or not , we most check if user can access a certain feature or not via the UI or frontend, which means users might still be able to access the feature by doing API Call.
So far only benchmark, status and vulnerabilities_dashboard api that has this checks. We should add this checks to other APIs that we have to make sure only user with correct permission can use the feature
How to test:
Definition of Done:
The text was updated successfully, but these errors were encountered: