Skip to content
Merged
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,18 @@ applies_to:

# Access isolation for the found-snapshots repository [ec-snapshot-repository-migration]

In {{ech}}, [snapshots](/deploy-manage/tools/snapshot-and-restore.md) are stored in a repository. By default, deployments in the same region may have access to each other’s snapshots through the `found-snapshots` repository.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We need to clarify what's the default, because this sentence is contradictory with the note, which was the only content of the original doc (https://www.elastic.co/guide/en/cloud/current/ec-snapshot-repository-migration.html).

I believe the default now is isolation. In such case the introductory sentence might cause confusion.


To enhance security, access isolation ensures that each deployment can only access its own snapshots. This prevents accidental or unauthorized access to backups from other deployments within the same organization.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
In {{ech}}, [snapshots](/deploy-manage/tools/snapshot-and-restore.md) are stored in a repository. By default, deployments in the same region may have access to each other’s snapshots through the `found-snapshots` repository.
To enhance security, access isolation ensures that each deployment can only access its own snapshots. This prevents accidental or unauthorized access to backups from other deployments within the same organization.
In {{ech}}, access isolation ensures that each deployment can only access its own snapshots, preventing accidental or unauthorized access to backups from other deployments within the same organization.
Any newly created deployment has snapshot isolation set up by default. These guides are only relevant for deployments created before this default was introduced, where deployments within your organization in the same region may have access to each other's snapshots.
If a deployment can access the snapshots of other deployments, a notification will appear in the deployments menu under Elasticsearch > Snapshots, prompting you to set up access isolation.

::::{note}
The guides in this section are only relevant for some deployments. Any newly created deployment will have access isolation set up by default. If a deployment’s repository can be updated, a notification will show up in the deployments menu under **Elasticsearch** > **Snapshots**.
::::

The process for enabling access isolation depends on your cloud provider:

* [Azure deployments](/deploy-manage/tools/snapshot-and-restore/repository-isolation-on-aws-gcp.md)
* [AWS & GCP deployments](/deploy-manage/tools/snapshot-and-restore/repository-isolation-on-azure.md)