Skip to content

Commit ae4a158

Browse files
authored
Update network-security-policies.md
1 parent d21d55a commit ae4a158

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

deploy-manage/security/network-security-policies.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Policies operate on the platform proxies. Requests rejected by the policies are
1818

1919
## Logic
2020

21-
- You can assign multiple policies to a single deployment. The policies can be of different types. In case of multiple policies, traffic can match any associated policy to be forwarded to the resource. If none of the policies match, the request is rejected with `403 Forbidden`.
21+
- You can apply multiple policies to a single deployment. The policies can be of different types. In case of multiple policies, traffic can match any associated policy to be forwarded to the resource. If none of the policies match, the request is rejected with `403 Forbidden`.
2222
- Policies, when associated with a deployment or project, will apply to all endpoints, such as {{es}}, {{kib}}, APM Server, and others.
2323
- Any policy assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint*. The implication is that if you make a mistake putting in the traffic source (for example, if you specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the policies.
2424
- You can [mark a policy as default](#default-network-security-policies). Default policies are automatically attached to all new resources of the matching resource type that you create in its region.
@@ -32,26 +32,26 @@ Policies operate on the platform proxies. Requests rejected by the policies are
3232

3333
## Default network security policies
3434

35-
You can mark a policy as default. Default policies are automatically attached to all new resources of the matching resource type that you create in its region.
35+
You can apply a policy by default. Default policies are automatically attached to all new resources of the matching resource type that you create in its region.
3636

37-
You can detach default policies from resources after they are created. Default policies are not automatically attached to existing resources.
37+
You can remove default policies from resources after they are created. Default policies are not automatically associated with existing resources.
3838

3939
### Apply policies to new resources by default
4040

41-
To automatically apply a network security policy to new resources by default new deployments or projects in your organization:
41+
To automatically apply a network security policy to new resources in your organization by default:
4242

4343
:::{include} _snippets/network-security-page.md
4444
:::
4545
4. Select **Create** to create a new policy, or select **Edit** {icon}`pencil` to open an existing policy.
46-
5. Under **Apply to future resources by default**, select **Include by default**.
46+
5. Under **Apply to resources (optional)**, check the **Apply to future resources by default** box.
4747

4848
### Identify default policies
4949

5050
To identify which network security policies are automatically applied to new deployments or projects in your organization:
5151

5252
:::{include} _snippets/network-security-page.md
5353
:::
54-
4. Select each of the policies. **Include by default** is checked when a policy is automatically applied to all new deployments or projects in its region.
54+
4. In the **Network security** page, the **Default** value is "Yes" when a policy is automatically applied to all new deployments or projects in its region.
5555

5656
## Review the policies associated with a resource
5757

@@ -63,15 +63,15 @@ To identify the network security policies that are applied to your deployment or
6363
2. On the **Serverless projects** page, select your project.
6464
3. Select the **Network security** tab on the left-hand side menu bar.
6565

66-
Network security policies are listed on the page. From this page, you can view and remove existing policies and attach new policies.
66+
Network security policies are listed on the page. From this page, you can view and remove existing policies and apply new policies.
6767

6868
:::
6969
:::{tab-item} Hosted
7070
1. Log in to the [{{ecloud}} Console](https://cloud.elastic.co?page=docs&placement=docs-body).
7171
2. On the **Hosted deployments** page, select your deployment.
7272
3. Select the **Security** tab on the left-hand side menu bar.
7373

74-
Network security policies are listed under **Network security**. From this section, you can view and remove existing policies and attach new policies.
74+
Network security policies are listed under **Network security**. From this section, you can view and remove existing policies and apply new policies.
7575
:::
7676
::::
7777

@@ -107,4 +107,4 @@ Requests rejected by a network security policy have the status code `403 Forbidd
107107

108108
```json
109109
{"ok":false,"message":"Forbidden due to traffic filtering. Please see the Elastic documentation on Traffic Filtering for more information."}
110-
```
110+
```

0 commit comments

Comments
 (0)