Skip to content

Commit fb10f0d

Browse files
authored
Merge branch 'main' into fix/logging-level-default-value
2 parents 5f0c972 + a48476d commit fb10f0d

24 files changed

Lines changed: 363 additions & 33 deletions

docs/administration/enterprise.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,13 @@ according to the [OpenAEV architecture](../deployment/platform/overview.md#archi
5555
The SentinelOne Agent can be leveraged to execute implants as detached processes that will then execute payloads
5656
according to the [OpenAEV architecture](../deployment/platform/overview.md#architecture)
5757

58+
### Palo Alto Cortex Agent
59+
60+
The Palo Alto Cortex Agent can be leveraged to execute implants as detached processes that will then execute payloads
61+
according to the [OpenAEV architecture](../deployment/platform/overview.md#architecture).
62+
63+
On Windows, because Palo Alto Cortex whitelists its own process tree, OpenAEV creates a scheduled task to detach the process that will execute the payloads.
64+
5865
## Remediations in CVES
5966

6067
More detail: [CVES](taxonomies.md) and [Findings view](../usage/findings.md)

docs/administration/users-and-rbac.md

Lines changed: 58 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,63 @@ To create a new role in OpenAEV:
5555

5656
1. Go to **Settings → Security → Roles**.
5757
2. Click on **Create role**. Enter a **name** and an optional **description** for the role
58-
3. Select the **capabilities** that should be included in this role, such as:
59-
- Access assets
60-
- Manage dashboards
61-
- Delete documents
62-
- ...
58+
3. Select the **capabilities** that should be included in this role.
6359
4. Save the role.
6460

61+
### Capabilities
62+
63+
Capabilities in OpenAEV are organized hierarchically. A parent capability (e.g. `Access assessment`) must be granted before its children (e.g. `Manage assessment`, `Delete assessment`) can be assigned. Indentation below reflects this hierarchy.
64+
65+
Below is a full list of capabilities in OpenAEV
66+
67+
| Capability | Description |
68+
|:-----------|:------------|
69+
| `Bypass (user has all rights)` | Grants unconditional access to all platform features, bypassing every individual capability check and any data segregation enforcement. |
70+
| **Assessments: Scenarios, simulations and atomic testings** | |
71+
| `Access assessment` | Read-only access to assessments, including scenarios, simulations and atomic tests. |
72+
|   `Manage assessment` | Create and update assessments (scenarios, simulations, atomic tests). Requires *Access assessment*. |
73+
|     `Delete assessment` | Permanently delete assessments. Requires *Manage assessment*. |
74+
|   `Launch assessment` | Execute / run an assessment against defined targets. Requires *Access assessment*. |
75+
| **Targets** | |
76+
| `Access teams & players` | Read-only access to teams and player definitions used as assessment targets. |
77+
|   `Manage teams & players` | Create and update teams and players. Requires *Access teams & players*. |
78+
|     `Delete teams & players` | Permanently delete teams and players. Requires *Manage teams & players*. |
79+
| `Access assets` | Read-only access to asset inventory (hosts, endpoints, and other infrastructure targets). |
80+
|   `Manage assets` | Create and update assets in the inventory. Requires *Access assets*. |
81+
|     `Delete assets` | Permanently delete assets from the inventory. Requires *Manage assets*. |
82+
| `Access security platforms` | Read-only access to integrated security platform configurations (e.g. SIEM, EDR, firewall connectors). |
83+
|   `Manage security platforms` | Create and update security platform integrations. Requires *Access security platforms*. |
84+
|     `Delete security platforms` | Permanently delete security platform integrations. Requires *Manage security platforms*. |
85+
| **Payloads** | |
86+
| `Access payloads` | Read-only access to the payload library (attack scripts, tools, and techniques used in simulations). |
87+
|   `Manage payloads` | Create and update payloads in the library. Requires *Access payloads*. |
88+
|     `Delete payloads` | Permanently delete payloads from the library. Requires *Manage payloads*. |
89+
| **Dashboards** | |
90+
| `Access dashboards` | Read-only access to platform dashboards and their visualizations. |
91+
|   `Manage dashboards` | Create, update, and configure dashboards. Requires *Access dashboards*. |
92+
|     `Delete dashboards` | Permanently delete dashboards. Requires *Manage dashboards*. |
93+
| **Findings** | |
94+
| `Access findings` | Read-only access to assessment findings and results generated from simulations and atomic tests. |
95+
| **Content** | |
96+
| `Access documents` | Read-only access to documents stored in the platform (reports, attachments, playbooks). |
97+
|   `Manage documents` | Upload, create, and update documents. Requires *Access documents*. |
98+
|     `Delete documents` | Permanently delete documents. Requires *Manage documents*. |
99+
| `Access channels` | Read-only access to communication channels used to deliver exercise injects to players. |
100+
|   `Manage channels` | Create and update channels. Requires *Access channels*. |
101+
|     `Delete channels` | Permanently delete channels. Requires *Manage channels*. |
102+
| `Access challenges` | Read-only access to challenges (CTF-style tasks or objectives assigned to players during exercises). |
103+
|   `Manage challenges` | Create and update challenges. Requires *Access challenges*. |
104+
|     `Delete challenges` | Permanently delete challenges. Requires *Manage challenges*. |
105+
| `Access lessons learned` | Read-only access to lessons learned records captured after assessments or exercises. |
106+
|   `Manage lessons learned` | Create and update lessons learned entries. Requires *Access lessons learned*. |
107+
|     `Delete lessons learned` | Permanently delete lessons learned entries. Requires *Manage lessons learned*. |
108+
| **Platform Settings** | |
109+
| `Access Platform Settings` | Read-only access to platform-wide configuration and administration settings. |
110+
|   `Manage platform settings` | Modify platform-wide settings including security configuration, integrations, and system parameters. Requires *Access Platform Settings*. |
111+
112+
113+
114+
65115
!!! info "Hierarchical permissions"
66116

67117
Permissions are organized hierarchically by indentation: selecting a permission further to the right (e.g., Delete) will automatically enable the less-indented ones that precede it (e.g., Manage and Access).
@@ -78,7 +128,9 @@ To create a new role in OpenAEV:
78128

79129
Once the role is created, it can be assigned to a **group**. All users in that group will automatically inherit the role’s permissions.
80130

81-
### Example : Crisis content creator
131+
132+
133+
## Example : Creating a Crisis content creator role
82134

83135
> Role : Crisis content creator
84136
41.8 KB
Loading
36.9 KB
Loading
70.9 KB
Loading
83.5 KB
Loading
81.8 KB
Loading
65.7 KB
Loading
75.7 KB
Loading
84.2 KB
Loading

0 commit comments

Comments
 (0)