Skip to content

Commit 0181c9f

Browse files
basic structure
1 parent 5c9dd47 commit 0181c9f

10 files changed

+227
-37
lines changed

deploy-manage/security.md

Lines changed: 54 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
---
2+
applies_to:
3+
deployment: all
4+
serverless: all
25
mapped_urls:
36
- https://www.elastic.co/guide/en/elasticsearch/reference/current/security-files.html
47
- https://www.elastic.co/guide/en/elasticsearch/reference/current/secure-cluster.html
@@ -52,4 +55,54 @@ $$$maintaining-audit-trail$$$
5255
* [/raw-migrated-files/cloud/cloud-heroku/ech-security.md](/raw-migrated-files/cloud/cloud-heroku/ech-security.md)
5356
* [/raw-migrated-files/kibana/kibana/using-kibana-with-security.md](/raw-migrated-files/kibana/kibana/using-kibana-with-security.md)
5457
* [/raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md)
55-
* [/raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md)
58+
* [/raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md)
59+
60+
An Elastic implementation comprises many moving parts. There are the Elasticsearch nodes that form the cluster, Kibana instances, additional stack components such as Logstash and Beats, and clients and integrations all communicating with your cluster.
61+
62+
To keep your data secured, Elastic offers security features that prevent bad actors from tampering with your data, and encrypt communications to, from, and within your cluster. Regardless of your deployment type, Elastic sets up certain security features for you automatically.
63+
64+
In this section, you’ll learn about how to manage basic Elastic security features. You’ll also learn how to implement advanced security measures.
65+
66+
As part of your overall security strategy, you can also do the following:
67+
68+
- Prevent unauthorized access with [password protection and role-based access control].
69+
- Maintain an [audit trail] for security-related events.
70+
- Control access to dashboards and other saved objects in your UI using [Spaces].
71+
- Connect a local cluster to a [remote cluster] to enable cross-cluster replication and search.
72+
- Manage [API keys] used for programmatic access to Elastic.
73+
74+
75+
76+
Keeping your Elastic installation and data safe generally means:
77+
78+
- Securing the hosting environment where your Elastic products are deployed.
79+
- self-managed
80+
- TLS certificates
81+
- HTTPS
82+
- ECE
83+
- TLS certificates
84+
- Cloud RBAC
85+
- ECH and Serverless
86+
- SSO
87+
- Role-based access control
88+
- Securing the deployments and clusters within that environment.
89+
- Authentication and access
90+
- `elastic` power user, built-in and system user passwords
91+
- Deployment-level authentication protocols (SAML, OpenID Connect, Kerberos, JWT)
92+
- Trust for cross-cluster communication
93+
- Traffic and IP filtering
94+
- Using the Elasticsearch keystore for sensitive settings
95+
- [ECH only] Encryption using a customer-managed encryption key
96+
- Keeping deployments up to date
97+
- Audit logging
98+
- Index and document-level permissions
99+
- Kibana security
100+
- Kibana sessions management
101+
- Spaces
102+
- Saved object security
103+
- Securing your own account and access to the environment and deployments.
104+
- [ECH only] Multifactor authentication
105+
- User API keys
106+
- Securing clients and integrations connected to your environment's clusters.
107+
108+
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
# Data security

deploy-manage/security/fips-140-2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ mapped_urls:
44
- https://www.elastic.co/guide/en/kibana/current/xpack-security-fips-140-2.html
55
---
66

7-
# FIPS 140-2
7+
# FIPS 140-2 compliance
88

99
% What needs to be done: Refine
1010

deploy-manage/security/manually-configure-security-in-self-managed-cluster.md

Lines changed: 26 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,8 @@
11
---
2+
navigation_title: Self-managed
3+
applies_to:
4+
deployment:
5+
self: ga
26
mapped_pages:
37
- https://www.elastic.co/guide/en/elasticsearch/reference/current/manually-configure-security.html
48
---
@@ -15,8 +19,9 @@ If you configure security manually *before* starting your {{es}} nodes, the auto
1519
:alt: Elastic Security layers
1620
:::
1721

22+
## Common security scenarios
1823

19-
## Minimal security ({{es}} Development) [security-minimal-overview]
24+
### Minimal security ({{es}} Development) [security-minimal-overview]
2025

2126
If you’ve been working with {{es}} and want to enable security on your existing, unsecured cluster, start here. You’ll set passwords for the built-in users to prevent unauthorized access to your local cluster, and also configure password authentication for {{kib}}.
2227

@@ -28,7 +33,7 @@ The minimal security scenario is not sufficient for [production mode](../deploy/
2833
[Set up minimal security](set-up-minimal-security.md)
2934

3035

31-
## Basic security ({{es}} + {{kib}}) [security-basic-overview]
36+
### Basic security ({{es}} + {{kib}}) [security-basic-overview]
3237

3338
This scenario configures TLS for communication between nodes. This security layer requires that nodes verify security certificates, which prevents unauthorized nodes from joining your {{es}} cluster.
3439

@@ -37,7 +42,7 @@ Your external HTTP traffic between {{es}} and {{kib}} won’t be encrypted, but
3742
[Set up basic security](secure-cluster-communications.md)
3843

3944

40-
## Basic security plus secured HTTPS traffic ({{stack}}) [security-basic-https-overview]
45+
### Basic security plus secured HTTPS traffic ({{stack}}) [security-basic-https-overview]
4146

4247
This scenario builds on the one for basic security and secures all HTTP traffic with TLS. In addition to configuring TLS on the transport interface of your {{es}} cluster, you configure TLS on the HTTP interface for both {{es}} and {{kib}}.
4348

@@ -50,6 +55,24 @@ You then configure {{kib}} and Beats to communicate with {{es}} using TLS so tha
5055

5156
[Set up basic security plus HTTPS traffic](secure-http-communications.md)
5257

58+
## Considerations
59+
60+
### TLS certificate management
61+
62+
TLS certificates apply security controls to network communications. They encrypt data in transit, verify the identity of connecting parties, and help prevent man-in-the-middle attacks.
63+
64+
On **self-managed** installations, you manage certificates for both HTTP and transport layers.
65+
66+
### Network security
67+
68+
Control which systems can access your Elastic deployment through traffic filtering and network controls:
69+
70+
- **IP traffic filtering**: Restrict access based on IP addresses or CIDR ranges.
71+
72+
## Next step: secure your deployments and clusters
73+
74+
This section covered security principles and options at the environment level. You can take further measures individually for each deployment or cluster that you're running on your installation. Refer to [](secure-your-cluster-deployment.md).
75+
5376

5477

5578

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
applies_to:
3+
deployment: all
4+
serverless: ga
5+
---
6+
7+
# Secure your hosting environment
8+
9+
Whether you're running Elastic on {{ecloud}}, through an {{ece}} or {{eck}} orchestrator, or self-managed on your own premises, it is critical that you secure the layer responsible for deploying and hosting your Elastic products.
10+
11+
This section covers security measures specific to:
12+
13+
- [{{ecloud}}](secure-your-elastic-cloud-organization.md)
14+
- [{{ece}}](secure-your-elastic-cloud-enterprise-installation.md)
15+
- [{{eck}}](secure-your-eck-installation.md)
16+
- [Self-managed](manually-configure-security-in-self-managed-cluster.md)
17+
18+
Learn how to manage security certificates, configure TLS versions, and implement additional security controls at the environment level.
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
navigation_title: "{{eck}}"
3+
applies_to:
4+
deployment:
5+
eck: ga
6+
---
7+
8+
# Secure your {{eck}} installation [eck-securing-considerations]
9+
10+
**This page is a work in progress.**
11+
12+
## TLS certificate management
13+
14+
TLS certificates apply security controls to network communications. They encrypt data in transit, verify the identity of connecting parties, and help prevent man-in-the-middle attacks.
15+
16+
With **{{eck}}**, you manage HTTP layer certificates. The transport layer is managed by ECK.
17+
18+
## Network security
19+
20+
Control which systems can access your Elastic deployment through traffic filtering and network controls:
21+
22+
- **IP traffic filtering**: Restrict access based on IP addresses or CIDR ranges.
23+
24+
## Next step: secure your deployments and clusters
25+
26+
This section covered security principles and options at the environment level. You can take further measures individually for each deployment or cluster that you're running on your installation. Refer to [](secure-your-cluster-deployment.md).
27+
Lines changed: 33 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,56 @@
11
---
2+
navigation_title: "{{ece}}"
3+
applies_to:
4+
deployment:
5+
ece: ga
26
mapped_pages:
37
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-securing-considerations.html
48
---
59

610
# Secure your Elastic Cloud Enterprise installation [ece-securing-considerations]
711

8-
Elastic Cloud Enterprise can run on shared and less secure environments, but you should be aware of some limitations when deploying our product.
12+
**This page is a work in progress.**
913

14+
When securing your {{ece}} installation, consider the following:
1015

11-
### Users with admin privileges [ece_users_with_admin_privileges]
16+
## TLS certificate management
1217

13-
In Elastic Cloud Enterprise 3.8.1, every user who can manage your installation through the Cloud UI or the RESTful API is a user with admin privileges. This includes both the `admin` user and the `readonly` user that get created when you install ECE on your first host. Initially, only the `admin` user has the required privileges to make changes to resources on ECE.
18+
TLS certificates apply security controls to network communications. They encrypt data in transit, verify the identity of connecting parties, and help prevent man-in-the-middle attacks.
1419

15-
[Role-based access control](../users-roles/cloud-enterprise-orchestrator/manage-users-roles.md) for Elastic Cloud Enterprise allows you to connect multiple users or user groups to the platform.
20+
With {{ece}}, you manage proxy certificates for the HTTP layer. The transport layer is managed by ECE. Refer to [](secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md).
1621

17-
All Elasticsearch clusters come with X-Pack security features and support role-based access control. To learn more, check [Secure Your Clusters](../users-roles/cluster-or-deployment-auth.md).
22+
## Network security
23+
24+
Control which systems can access your Elastic deployment through traffic filtering and network controls:
1825

26+
- **IP traffic filtering**: Restrict access based on IP addresses or CIDR ranges.
27+
- **Trust for cross-cluster operations**. Define which environments your {{ece}} installation can connect to and receive connections from. For more details on cross-cluster operations and the required settings, refer to [](/deploy-manage/remote-clusters.md).
1928

20-
### Clusters share the same resources [ece_clusters_share_the_same_resources]
29+
$$$ece_clusters_share_the_same_resources$$$
30+
:::{note}
31+
Clusters share the same resources
2132

2233
The Elasticsearch clusters you create on Elastic Cloud Enterprise share the same resources. It is currently not possible to run a specific cluster on entirely dedicated hardware not shared by other clusters.
34+
:::
35+
36+
## Users with admin privileges [ece_users_with_admin_privileges]
37+
38+
In Elastic Cloud Enterprise, every user who can manage your installation through the Cloud UI or the RESTful API is a user with admin privileges. This includes both the `admin` user and the `readonly` user that get created when you install ECE on your first host. Initially, only the `admin` user has the required privileges to make changes to resources on ECE.
39+
40+
[Role-based access control](../users-roles/cloud-enterprise-orchestrator/manage-users-roles.md) for Elastic Cloud Enterprise allows you to connect multiple users or user groups to the platform.
41+
42+
All Elasticsearch clusters come with X-Pack security features and support role-based access control. To learn more, check [Secure Your Clusters](../users-roles/cluster-or-deployment-auth.md).
2343

2444

25-
### Encryption [ece_encryption]
45+
## Encryption [ece_encryption]
2646

2747
Elastic Cloud Enterprise does not implement encryption at rest out of the box. To ensure encryption at rest for all data managed by Elastic Cloud Enterprise, the hosts running Elastic Cloud Enterprise must be configured with disk-level encryption, such as dm-crypt. In addition, snapshot targets must ensure that data is encrypted at rest as well.
2848

2949
Configuring dm-crypt or similar technologies is outside the scope of the Elastic Cloud Enterprise documentation, and issues related to disk encryption are outside the scope of support.
3050

31-
Elastic Cloud Enterprise provides full encryption of all network traffic by default when using Elasticsearch 6.0 or higher.
51+
Elastic Cloud Enterprise provides full encryption of all network traffic by default.
3252

33-
TLS is supported when interacting with the RESTful API of Elastic Cloud Enterprise and for the proxy layer that routes user requests to clusters of all versions. Internally, our administrative services also ensure transport-level encryption.
34-
35-
In Elasticsearch versions lower than 6.0, traffic between nodes in a cluster and between proxies and the clusters is *not* encrypted.
53+
TLS is supported when interacting with the [RESTful API of Elastic Cloud Enterprise](https://www.elastic.co/docs/api/doc/cloud-enterprise/) and for the proxy layer that routes user requests to clusters of all versions. Internally, our administrative services also ensure transport-level encryption.
3654

3755

3856
## Attack vectors versus separation of roles [ece-securing-vectors]
@@ -45,3 +63,7 @@ Elastic Cloud Enterprise is designed to ensure that an allocator has access only
4563

4664
Security comes in layers, and running separate services on separate infrastructure is the last layer of defense, on top of other security features like the JVM security manager, system call filtering, and running nodes in isolated containers with no shared secrets.
4765

66+
## Next step: secure your deployments and clusters
67+
68+
This section covered security principles and options at the environment level. You can take further measures individually for each deployment or cluster that you're running on your installation. Refer to [](secure-your-cluster-deployment.md).
69+
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
navigation_title: "{{ecloud}}"
3+
applies_to:
4+
deployment:
5+
ess: ga
6+
serverless: ga
7+
---
8+
9+
# Secure your Elastic Cloud organization [ec-securing-considerations]
10+
11+
**This page is a work in progress.**
12+
13+
## TLS certificate management
14+
15+
TLS certificates apply security controls to network communications. They encrypt data in transit, verify the identity of connecting parties, and help prevent man-in-the-middle attacks.
16+
17+
For your **{{ech}}** deployments and serverless projects hosted on {{ecloud}}, TLS certificates are managed automatically.
18+
19+
## Network security
20+
21+
Control which systems can access your Elastic deployment through traffic filtering and network controls:
22+
23+
- **IP traffic filtering**: Restrict access based on IP addresses or CIDR ranges.
24+
- **Private link filters**: Secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect.
25+
- **Static IPs**: Use static IP addresses for predictable firewall rules.
26+
27+
28+
## Next step: secure your deployments and clusters
29+
30+
This section covered security principles and options at the environment level. You can take further measures individually for each deployment or cluster that you're running on your installation. Refer to [](secure-your-cluster-deployment.md).
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
applies_to:
3+
deployment: all
4+
serverless: ga
5+
---
6+
7+
# Secure your personal account
8+
9+
**This page is a work in progress.**

deploy-manage/toc.yml

Lines changed: 28 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -512,17 +512,25 @@ toc:
512512
- file: remote-clusters/remote-clusters-settings.md
513513
- file: remote-clusters/eck-remote-clusters.md
514514
- file: security.md
515-
children:
516-
- file: security/secure-your-elastic-cloud-enterprise-installation.md
515+
children:
516+
- file: security/secure-hosting-environment.md
517517
children:
518-
- file: security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md
519-
- file: security/secure-your-elastic-cloud-enterprise-installation/allow-x509-certificates-signed-with-sha-1.md
520-
- file: security/secure-your-elastic-cloud-enterprise-installation/configure-tls-version.md
518+
- file: security/secure-your-elastic-cloud-organization.md
519+
- file: security/secure-your-elastic-cloud-enterprise-installation.md
520+
children:
521+
- file: security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md
522+
- file: security/secure-your-elastic-cloud-enterprise-installation/allow-x509-certificates-signed-with-sha-1.md
523+
- file: security/secure-your-elastic-cloud-enterprise-installation/configure-tls-version.md
524+
- file: security/secure-your-eck-installation.md
525+
- file: security/manually-configure-security-in-self-managed-cluster.md
526+
children:
527+
- file: security/set-up-minimal-security.md
528+
- file: security/set-up-basic-security.md
529+
- file: security/set-up-basic-security-plus-https.md
521530
- file: security/secure-your-cluster-deployment.md
522531
children:
523532
- file: security/secure-endpoints.md
524533
children:
525-
- file: security/secure-http-communications.md
526534
- file: security/traffic-filtering.md
527535
children:
528536
- file: security/ip-traffic-filtering.md
@@ -534,31 +542,30 @@ toc:
534542
- file: security/claim-traffic-filter-link-id-ownership-through-api.md
535543
- file: security/manage-traffic-filtering-through-api.md
536544
- file: security/elastic-cloud-static-ips.md
537-
- file: security/kibana-session-management.md
538545
- file: security/secure-cluster-communications.md
539546
children:
547+
- file: security/secure-http-communications.md
540548
- file: security/security-certificates-keys.md
541549
children:
542550
- file: security/updating-certificates.md
543551
children:
544552
- file: security/same-ca.md
545553
- file: security/different-ca.md
546-
- file: security/secure-clients-integrations.md
554+
- file: security/supported-ssltls-versions-by-jdk-version.md
555+
- file: security/data-security.md
547556
children:
548-
- file: security/httprest-clients-security.md
549-
- file: security/encrypt-deployment.md
550-
children:
551-
- file: security/encrypt-deployment-with-customer-managed-encryption-key.md
552-
- file: security/secure-settings.md
553-
- file: security/secure-saved-objects.md
554-
- file: security/manually-configure-security-in-self-managed-cluster.md
555-
children:
556-
- file: security/set-up-minimal-security.md
557-
- file: security/set-up-basic-security.md
558-
- file: security/set-up-basic-security-plus-https.md
559-
- file: security/enabling-cipher-suites-for-stronger-encryption.md
560-
- file: security/supported-ssltls-versions-by-jdk-version.md
557+
- file: security/encrypt-deployment.md
558+
children:
559+
- file: security/encrypt-deployment-with-customer-managed-encryption-key.md
560+
- file: security/enabling-cipher-suites-for-stronger-encryption.md
561+
- file: security/secure-settings.md
562+
- file: security/secure-saved-objects.md
563+
- file: security/kibana-session-management.md
561564
- file: security/fips-140-2.md
565+
- file: security/secure-your-personal-account.md
566+
- file: security/secure-clients-integrations.md
567+
children:
568+
- file: security/httprest-clients-security.md
562569
- file: users-roles.md
563570
children:
564571
- file: users-roles/cloud-organization.md

0 commit comments

Comments
 (0)