CSPM for Azure Integration
This manual explains how to get started monitoring the security posture of your cloudAzure assetsCSP using the Cloud Security Posture Management (CSPM) feature.
Requirements
CSPM only works in the Default Kibana space. Installing the CSPM integration on a different Kibana space will not work.CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported.To view posture data, you need read privileges for the following Elasticsearch indices:logs-cloud_security_posture.findings_latest-*logs-cloud_security_posture.scores-*logs-cloud_security_posture.findings
- The user who gives the CSPM integration permissions in Azure must be an Azure subscription admin.
Setup
Option 1: Service principal with client secret (recommended)
Before using this method, you must have set up a Microsoft Entra application and service principal that can access resources.
- The following information is required.
- Directory (tenant) ID and Application (client) ID
- To get these values:
- Go to the Registered apps section of Microsoft Entra ID.
- Click on New Registration, name your app and click Register.
- Copy your new app’s Directory (tenant) ID and Application (client) ID.
- To get these values:
- Client Secret
- In Azure portal, select Certificates & secrets, then go to the Client secrets tab. Click New client secret.
- Copy the new secret.
- Directory (tenant) ID and Application (client) ID
- Return to Azure. Go to your Azure subscription list and select the subscription or management group you want to monitor with CSPM.
- Go to Access control (IAM) and select Add Role Assignment.
- Select the Reader function role, assign access to User, group, or service principal, and select your new app.
Option 2: Managed identity (recommended)optional)
This method involves creating an Azure VM (or using an existing one), giving it read access to the resources you want to monitor with CSPM, and installing Elastic Agent on it.the Azure VM.
- Go to the Azure portal to create a new Azure VM.
- Follow the setup process, and make sure you enable System assigned managed identity under the Management tab.
- Go to your Azure subscription list and select the subscription or management group you want to monitor with CSPM.
- Go to Access control (IAM) and select Add Role Assignment.
- Select the Reader role, assign access to Managed Identity, then select your VM.
After assigning the role:
Return to theAdd CSPMpage in Kibana.UnderConfigure integration, selectAzure. UnderSetup access, selectManual.UnderWhere to add this integration, selectNew hosts.ClickSave and continue, then follow the instructions to installInstall Elastic Agent on your Azure VM.
Wait for the confirmation that Kibana received data from your new integration. Then you can click View Assets to see your data.
Option 2: Service principal with client secret
Before using this method, you must have set up a Microsoft Entra application and service principal that can access resources.
On theAdd Cloud Security Posture Management (CSPM) integrationpage, scroll to theSetup accesssection, then selectManual.UnderPreferred manual method, selectService principal with Client Secret.Go to theRegistered appssection of Microsoft Entra ID.Click onNew Registration, name your app and clickRegister.Copy your new app’sDirectory (tenant) IDandApplication (client) ID. Paste them into the corresponding fields in Kibana.Return to the Azure portal. SelectCertificates & secrets, then go to theClient secretstab. ClickNew client secret.Copy the new secret. Paste it into the corresponding field in Kibana.Return to Azure. Go to your Azure subscription list and select the subscription or management group you want to monitor with CSPM.Go toAccess control (IAM)and selectAdd Role Assignment.Select theReaderfunction role, assign access toUser, group, or service principal, and select your new app.Return to theAdd CSPMpage in Kibana.UnderWhere to add this integration, selectNew hosts.ClickSave and continue, then follow the instructions to install Elastic Agent on your selected host.
Wait for the confirmation that Kibana received data from your new integration. Then you can click View Assets to see your data.
If you need further assistance, kindly contact our support at support@cytechint.com for prompt assistance and guidance.