Skip to content

Commit 6e5c3c5

Browse files
secure ecloud
1 parent f7d74e0 commit 6e5c3c5

File tree

1 file changed

+19
-13
lines changed

1 file changed

+19
-13
lines changed

deploy-manage/security/secure-your-elastic-cloud-organization.md

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,26 +8,32 @@ applies_to:
88

99
# Secure your Elastic Cloud organization [ec-securing-considerations]
1010

11-
:::{warning}
12-
**This page is a work in progress.**
13-
:::
11+
This section describes the settings available for you to secure your {{ecloud}} organization, which is the platform where you can manage your {{ech}} deployments and serverless projects.
1412

13+
**Managed for you**
1514

16-
## TLS certificate management
15+
As a managed service, a certain number of [security aspects are handled by Elastic](https://www.elastic.co/cloud/security#details) and don't require specific configuration from you:
1716

18-
TLS certificates apply security controls to network communications. They encrypt data in transit, verify the identity of connecting parties, and help prevent man-in-the-middle attacks.
17+
- **TLS encrypted communication** is provided in the default configuration. Elasticsearch nodes communicate using TLS.
18+
- **Encryption at rest**. By default, all of your {{ecloud}} resources are encrypted at rest. Note that you can choose to encrypt your {{ech}} deployments [using your own encryption key](/deploy-manage/security/encrypt-deployment-with-customer-managed-encryption-key.md).
19+
- **Cluster isolation**. Elasticsearch nodes run in isolated containers, configured according to the principle of least privilege, and with restrictions on system calls and allowed root operations.
1920

20-
For your **{{ech}}** deployments and serverless projects hosted on {{ecloud}}, TLS certificates are managed automatically.
21+
**Organization-level available security settings**
2122

22-
## Access control
23+
To reinforce the security of your organization, consider implementing the following measures:
2324

24-
Define which users can access your {{ecloud}} organization using the following methods:
25+
- **Network security**. Control which systems can access your Elastic deployments and projects through traffic filtering and network controls:
26+
- [**IP traffic filtering**](/deploy-manage/security/ip-traffic-filtering.md): Restrict access based on IP addresses or CIDR ranges.
27+
- [**Private link filters**](/deploy-manage/security/private-link-traffic-filters.md): Secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect.
28+
- [**Static IPs**](/deploy-manage/security/elastic-cloud-static-ips.md): Use static IP addresses for predictable firewall rules.
29+
- **Access control**
30+
- [**Organization-level SSO**](/deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md). Note that for {{ech}} deployments, you can also configure SSO at the [deployment level](/deploy-manage/users-roles/cluster-or-deployment-auth.md).
31+
- [**Cloud role-based access control**](/deploy-manage/users-roles/cloud-organization/manage-users.md): Define the roles of users who have access to your organization and its resources. Note that for {{ech}} deployments, you can also [manage non-cloud users and roles](/deploy-manage/users-roles/cluster-or-deployment-auth/defining-roles.md).
32+
- [**Cloud API keys**](/deploy-manage/api-keys/elastic-cloud-api-keys.md): Manage API keys used for programmatic access to [{{ecloud}}](https://www.elastic.co/docs/api/doc/cloud/) and [{{ecloud}} serverless](https://www.elastic.co/docs/api/doc/elastic-cloud-serverless/) APIs.
2533

26-
- [SSO](/deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md)
27-
- [Role-based access control](/deploy-manage/users-roles/cloud-organization/manage-users.md)
28-
- [Cloud API keys](/deploy-manage/api-keys/elastic-cloud-api-keys.md)
2934

3035

31-
## Next step: secure your deployments and clusters
36+
**Deployment-level available security settings**
37+
38+
While serverless projects are fully managed and secured by Elastic, additional security settings are available for you to configure individually for your {{ech}} deployments. Refer to [](secure-your-cluster-deployment.md) for more information.
3239

33-
This section covered security principles and options at the environment level. You can take further measures individually for each deployment or cluster that you're running on this environment. Refer to [](secure-your-cluster-deployment.md).

0 commit comments

Comments
 (0)