Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[v15] Fix Vale warnings in the Access Monitoring guide #50016

Merged
merged 1 commit into from
Dec 11, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 11 additions & 9 deletions docs/pages/admin-guides/access-controls/access-monitoring.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ Users are able to write their own custom access monitoring queries by querying t

## Prerequisites
- Teleport v14 or later.
- For self-hosted Teleport the [AWS Athena Backend](../../reference/backends.mdx) is required.
- For self-hosted Teleport the [Amazon Athena Backend](../../reference/backends.mdx) is required.


### Configuration
Expand Down Expand Up @@ -281,7 +281,8 @@ FROM
WHERE identity_user = 'admin-annie'
```

- Show access requests and their reviews:
- Show Access Requests and their reviews:

```sql
SELECT
*
Expand All @@ -291,7 +292,8 @@ WHERE
access_request_create.id = access_request_review.id
```

- Show details about access request and review:
- Show details about an Access Request and its reviews:

```sql
SELECT
request.user, request.reason, request.roles, request.resource_ids, review.reviewer, review.state
Expand Down Expand Up @@ -324,7 +326,7 @@ The report allows to identify the following weak security events:
### Database sessions with weak security

The following query identifies database sessions with weak security
such as as sessions with missing access requests, MFA, impersonation, and trusted device identification.
such as as sessions with missing Access Requests, MFA, impersonation, and trusted device identification.

```sql
SELECT
Expand All @@ -351,12 +353,12 @@ ORDER BY
![privileged access report](../../../img/access-monitoring/privileged_access_report.png)


**Suggestion:** Set up access requests, device trust and per-session MFA.
**Suggestion:** Set up Access Requests, Device Trust and per-session MFA.

### SSH sessions with weak security

The following query identifies SSH sessions with weak security,
such as as sessions with missing access requests, MFA, impersonation, and trusted device identification.
such as as sessions with missing Access Requests, MFA, impersonation, and trusted device identification.

```sql
SELECT
Expand All @@ -383,12 +385,12 @@ ORDER BY
event_date
```

**Suggestion:** Set up access requests, device trust and per-session MFA.
**Suggestion:** Set up Access Requests, Device Trust and per-session MFA.

### Kubernetes API calls with weak security

The following query identifies Kubernetes sessions with weak security,
such as sessions with missing access requests, MFA, impersonation, and trusted device identification.
such as sessions with missing Access Requests, MFA, impersonation, and trusted device identification.

```sql
SELECT
Expand All @@ -412,7 +414,7 @@ ORDER BY
event_date
```

**Suggestion:** Set up access requests, device trust and per-session MFA.
**Suggestion:** Set up Access Requests, Device Trust and per-session MFA.

### Privileged Postgres sessions

Expand Down
Loading