diff --git a/x-pack/plugins/cloud_security_posture/public/components/fleet_extensions/aws_credentials_form/aws_credentials_form.tsx b/x-pack/plugins/cloud_security_posture/public/components/fleet_extensions/aws_credentials_form/aws_credentials_form.tsx index dc2b46dd364f..b1774547a6e6 100644 --- a/x-pack/plugins/cloud_security_posture/public/components/fleet_extensions/aws_credentials_form/aws_credentials_form.tsx +++ b/x-pack/plugins/cloud_security_posture/public/components/fleet_extensions/aws_credentials_form/aws_credentials_form.tsx @@ -44,8 +44,8 @@ interface AWSSetupInfoContentProps { const AWSSetupInfoContent = ({ integrationLink }: AWSSetupInfoContentProps) => { return ( <> - - + +

( <> - - + +

( <> - - - + +

@@ -227,7 +227,6 @@ const AwsAccountTypeSelect = ({ )} - ); }; @@ -248,7 +247,7 @@ const GcpAccountTypeSelect = ({ @@ -274,7 +273,6 @@ const GcpAccountTypeSelect = ({ defaultMessage="Deploying to a single account is suitable for an initial POC. To ensure complete coverage, it is strongly recommended to deploy CSPM at the organization-level, which automatically connects all accounts (both current and future)." /> - ); }; @@ -436,6 +434,13 @@ export const CspPolicyTemplateForm = memo + {/* Defines the name/description */} + updatePolicy({ ...newPolicy, [field]: value })} + /> + + {/* AWS account type selection box */} {input.type === 'cloudbeat/cis_aws' && ( )} - {/* Defines the name/description */} - updatePolicy({ ...newPolicy, [field]: value })} - /> {/* Defines the vars of the enabled input of the active policy template */}