Skip to content

Commit aee62c9

Browse files
leemthompoeedugon
andauthored
Apply suggestions from code review
Co-authored-by: Edu González de la Herrán <[email protected]>
1 parent f0ffbf0 commit aee62c9

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

deploy-manage/security/secure-cluster-communications.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,8 @@ Your {{stack}} deployment includes several distinct communication channels that
4343
The transport layer is used for communication between {{es}} nodes in a cluster. Securing this layer prevents unauthorized nodes from joining your cluster and protects internode data.
4444

4545
**Deployment type notes:**
46-
- **Elastic Cloud & Serverless**: Transport security is fully managed by Elastic. No configuration is required.
47-
- **ECE/ECK**: Transport security is automatically configured by the operator. No direct user configuration is required.
46+
- **Elastic Cloud, ECE, and Serverless**: Transport security is fully managed by Elastic. No configuration is required.
47+
- **ECK**: Transport security is automatically configured by the operator, but you can [customize its service and SSL certificates](/deploy-manage/deploy/cloud-on-k8s/transport-settings.md).
4848
- **Self-managed**: Transport security must be manually configured following the steps in [Set up basic security](set-up-basic-security.md).
4949

5050
## HTTP layer security
@@ -53,7 +53,8 @@ The HTTP layer secures client communication with your {{es}} cluster via its RES
5353

5454
**Deployment type notes:**
5555
- **Elastic Cloud & Serverless**: HTTP security is fully managed by Elastic. No configuration is required.
56-
- **ECE/ECK**: HTTP security is automatically configured with self-signed certificates. Custom certificates can be configured.
56+
- **ECE**: HTTP security is automatically enforced at ECE proxies using self-signed certificates and a default [wildcard DNS record](/deploy-manage/deploy/cloud-enterprise/ece-wildcard-dns.md). However, it's recommended to [configure your own certificates](/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md).
57+
- **ECK**: HTTP security is automatically configured with self-signed certificates. Custom certificates and domain names can be configured.
5758
- **Self-managed**: HTTP security must be manually configured following [Secure HTTP communications](secure-http-communications.md).
5859

5960
## {{kib}}-to-{{es}} communications
@@ -73,7 +74,7 @@ Managing certificates is critical for secure communications. Certificates have l
7374
- **Elastic Cloud & Serverless**: Certificate management is fully automated by Elastic.
7475
- **ECE**: ECE generates certificates for you. Refer to [](/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md).
7576

76-
ECK**: Certificate generation and basic rotation is handled by the operator. Custom HTTP certificates require manual management.
77+
**ECK**: ECK provides flexible options for managing SSL certificates in your deployments, including automatic certificate generation and rotation, integration with external tools like `cert-manager`, or using your own custom certificates. Custom HTTP certificates require manual management.
7778
- **Self-managed**: Certificate management is your responsibility. See [Security certificates and keys](security-certificates-keys.md).
7879

7980
## Next steps

0 commit comments

Comments
 (0)