[Security Solution] Update Security Roles with new Rules RBAC permissions#245576
Merged
rylnd merged 6 commits intoelastic:mainfrom Dec 11, 2025
Merged
[Security Solution] Update Security Roles with new Rules RBAC permissions#245576rylnd merged 6 commits intoelastic:mainfrom
rylnd merged 6 commits intoelastic:mainfrom
Conversation
This updates prebuilt roles and those used in tests to: * Reference siemv5 instead of the older siemv4 * Add the new `rules:read` or `rules:all` feature where appropriate Without this change, our tests are implicitly testing the `replacedBy`/"migration" path that existing users will follow. With that version of the code being green, we can have confidence in the behavior for existing users, and can then update our tests to use the latest features, here.
Contributor
|
Pinging @elastic/security-detections-response (Team:Detections and Resp) |
Contributor
|
Pinging @elastic/security-solution (Team: SecuritySolution) |
Contributor
|
Pinging @elastic/security-detection-engine (Team:Detection Engine) |
This was referenced Dec 8, 2025
jbudz
approved these changes
Dec 9, 2025
This reverts commit ac4378d. Testing to see whether this change is what's causing our current CI failures.
PhilippeOberti
approved these changes
Dec 10, 2025
Contributor
PhilippeOberti
left a comment
There was a problem hiding this comment.
Code review only, LGTM for the @elastic/security-threat-hunting team
dmlemeshko
approved these changes
Dec 10, 2025
Contributor
dmlemeshko
left a comment
There was a problem hiding this comment.
roles update in kbn/es LGTM
seanrathier
approved these changes
Dec 10, 2025
paul-tavares
approved these changes
Dec 10, 2025
Contributor
💛 Build succeeded, but was flaky
Failed CI StepsMetrics [docs]
History
cc @rylnd |
seanrathier
pushed a commit
to seanrathier/kibana
that referenced
this pull request
Dec 15, 2025
…ions (elastic#245576) ## Summary With elastic#239634 in `main` and the build being green, we have demonstrated the correct behavior for _existing_ users with existing kibana privileges. This PR now updates existing test/prebuilt roles to explicitly use these new privileges moving forward. ## Reference * Discussion about the benefits/logic for this PR can be found [here](elastic#232113 (comment)). * Accompanying `elasticsearch-controller` PR can be found [here](elastic/elasticsearch-controller#1400). ### Checklist - [ ] [Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html) was added for features that require explanation or tutorials - [x] [Unit or functional tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html) were updated or added to match the most common scenarios - [x] The PR description includes the appropriate Release Notes section, and the correct `release_note:*` label is applied per the [guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process) - [x] Review the [backport guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing) and apply applicable `backport:*` labels. --------- Co-authored-by: Edgar Santos <edgar.santos@elastic.co>
4 tasks
dhurley14
added a commit
that referenced
this pull request
Feb 4, 2026
## Summary With #245576 in `main` and the build being green, we have demonstrated the correct behavior for _existing_ users with existing kibana privileges. This PR now updates existing test/prebuilt roles to explicitly use these new privileges moving forward. ## Reference * Discussion about the benefits/logic for this PR can be found [here](#232113 (comment)). * Accompanying `elasticsearch-controller` PR can be found [here](elastic/elasticsearch-controller#1509).
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
With #239634 in
mainand the build being green, we have demonstrated the correct behavior for existing users with existing kibana privileges. This PR now updates existing test/prebuilt roles to explicitly use these new privileges moving forward.Reference
elasticsearch-controllerPR can be found here.Checklist
release_note:*label is applied per the guidelinesbackport:*labels.