-
Notifications
You must be signed in to change notification settings - Fork 163
Fix security top-level overviews #902
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 5 commits
Commits
Show all changes
9 commits
Select commit
Hold shift + click to select a range
59ac5c4
fix top level overviews so the top-level page was simpler
shainaraskas c0cd869
fix
shainaraskas ce18b70
better h2
shainaraskas 6e6e3f2
fix
shainaraskas dc24e04
Merge branch 'main' into security-cleanup
shainaraskas 3858de6
Apply suggestions from code review
shainaraskas 99c240e
edu feedback
shainaraskas ce2a756
Merge branch 'main' into security-cleanup
shainaraskas 4f52341
Merge branch 'main' into security-cleanup
eedugon File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
Audit logging is a powerful feature that helps you monitor and track security-related events within the {{stack}}. By enabling audit logs, you can gain visibility into authentication attempts, authorization decisions, and other system activity. | ||
|
||
Audit logging also provides forensic evidence in the event of an attack, and can be enabled independently for {{es}} and {{kib}}. | ||
|
||
[Learn how to enable audit logging](/deploy-manage/security/logging-configuration/security-event-audit-logging.md). |
7 changes: 7 additions & 0 deletions
7
deploy-manage/security/_snippets/cluster-communication-network.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
* [Manage TLS certificates](/deploy-manage/security/secure-cluster-communications.md): TLS certificates apply security controls to network communications. Elastic uses TLS certificates to secure communications in two places: | ||
* **The HTTP layer**: Used for communication between your cluster or deployment and the internet. | ||
* **The transport layer**: Used mainly for inter-node communications, and in certain cases for cluster to cluster communication. | ||
* In self-managed {{es}} clusters, you can also [Configure Kibana and Elasticsearch to use mutual TLS](/deploy-manage/security/secure-http-communications.md#elasticsearch-mutual-tls). | ||
* [Enable cipher suites for stronger encryption](/deploy-manage/security/enabling-cipher-suites-for-stronger-encryption.md): The TLS and SSL protocols use a cipher suite that determines the strength of encryption used to protect the data. You may want to enable the use of additional cipher suites, so you can use different cipher suites for your TLS communications or communications with authentication providers. | ||
* [Restrict connections using traffic filtering](/deploy-manage/security/traffic-filtering.md): Traffic filtering allows you to limit how your deployments can be accessed. Add another layer of security to your installation and deployments by restricting inbound traffic to only the sources that you trust. Restrict access based on IP addresses or CIDR ranges, or secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect. | ||
* [Allow or deny {{ech}} IP ranges](/deploy-manage/security/elastic-cloud-static-ips.md): {{ecloud}} publishes a list of IP addresses used by its {{ech}} services for both incoming and outgoing traffic. Users can use these lists to configure their network firewalls as needed to allow or restrict traffic related to {{ech}} services. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,86 @@ | ||
Security feature availability varies by deployment type, with each feature having one of the following statuses: | ||
|
||
| Status | Description | | ||
|--------|-------------| | ||
| **Managed** | Handled automatically by Elastic with no user configuration needed | | ||
| **Configurable** | Built-in feature that needs your configuration (like IP filters or passwords) | | ||
| **Self-managed** | Infrastructure-level security you implement and maintain | | ||
| **N/A** | Not available for this deployment type | | ||
|
||
Select your deployment type below to see what's available and how implementation responsibilities are distributed: | ||
|
||
::::{tab-set} | ||
:group: deployment-type | ||
|
||
:::{tab-item} {{ech}} | ||
:sync: cloud-hosted | ||
|
||
| Category | Security feature | Status | Description | | ||
|------------------|------------|--------------|-------------| | ||
| **Communication** | TLS (HTTP Layer) | Managed | Automatically configured by Elastic | | ||
| | TLS (Transport Layer) | Managed | Automatically configured by Elastic | | ||
| **Network** | IP traffic filtering | Configurable | Configure IP-based access restrictions | | ||
| | Private link | Configurable | Establish secure VPC connection | | ||
| | Static IPs | Configurable | Enable fixed IP addresses | | ||
| **Data** | Encryption at rest | Managed | Automatically encrypted by Elastic | | ||
| | Bring your own encryption key | Configurable | Implement customer-provided keys | | ||
| | Keystore security | Managed | Automatically protected by Elastic | | ||
| | Saved object encryption | Managed | Automatically encrypted by Elastic | | ||
| **User Session** | Kibana Sessions | Configurable | Customize session parameters | | ||
|
||
::: | ||
|
||
:::{tab-item} {{serverless-full}} | ||
:sync: serverless | ||
|
||
| Category| Security feature | Status | Description | | ||
|------------------|------------|--------------|-------------| | ||
| **Communication** | TLS (HTTP Layer) | Managed | Automatically configured by Elastic | | ||
| | TLS (Transport Layer) | Managed | Automatically configured by Elastic | | ||
| **Network** | IP traffic filtering | Configurable | Configure IP-based access restrictions | | ||
| | Private link | N/A | X | | ||
| | Static IPs | Configurable | Enable fixed IP addresses | | ||
| **Data** | Encryption at rest | Managed | Automatically encrypted by Elastic | | ||
| | Bring your own encryption key | N/A | X | | ||
| | Keystore security | Managed | Automatically protected by Elastic | | ||
| | Saved object encryption | Managed | Automatically encrypted by Elastic | | ||
| **User Session** | Kibana Sessions | Managed | Automatically configured by Elastic | | ||
|
||
::: | ||
|
||
:::{tab-item} ECE/ECK | ||
:sync: ece-eck | ||
|
||
| Category| Security feature | Status | Description | | ||
|------------------|------------|--------------|-------------| | ||
| **Communication** | TLS (HTTP Layer) | Configurable | Configure custom certificates | | ||
| | TLS (Transport Layer) | Managed | Automatically configured by Elastic | | ||
| **Network** | IP traffic filtering | Configurable | Configure IP-based access restrictions | | ||
| | Private link | N/A | X | | ||
| | Static IPs | N/A | X | | ||
| **Data** | Encryption at rest | Self-managed | Implement at infrastructure level | | ||
| | Bring your own encryption key | N/A | X | | ||
| | Keystore security | Configurable | Configure secure settings storage | | ||
| | Saved object encryption | Configurable | Enable encryption for saved objects | | ||
| **User Session** | Kibana Sessions | Configurable | Customize session parameters | | ||
|
||
::: | ||
|
||
:::{tab-item} Self-managed | ||
:sync: self-managed | ||
|
||
| Category| Security feature | Status | Description | | ||
|------------------|------------|--------------|-------------| | ||
| **Communication** | TLS (HTTP Layer) | Self-managed | Implement and maintain certificates | | ||
| | TLS (Transport Layer) | Self-managed | Implement and maintain certificates | | ||
| **Network** | IP traffic filtering | Configurable | Configure IP-based access restrictions | | ||
| | Private link | N/A | X | | ||
| | Static IPs | N/A | X | | ||
| **Data** | Encryption at rest | Self-managed | Implement at infrastructure level | | ||
| | Bring your own encryption key | N/A | X | | ||
| | Keystore security | Configurable | Configure secure settings storage | | ||
| | Saved object encryption | Configurable | Enable encryption for saved objects | | ||
| **User Session** | Kibana Sessions | Configurable | Customize session parameters | | ||
|
||
::: | ||
:::: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
* [Secure your settings](/deploy-manage/security/secure-settings.md) Some of the settings that you configure in Elastic are sensitive, such as passwords, and relying on file system permissions to protect these settings is insufficient. Learn how to configure secure settings in the {{es}} keystore or {{kib}} keystore. | ||
* [Secure saved objects](/deploy-manage/security/secure-saved-objects.md): {{kib}} stores entities such as dashboards, visualizations, alerts, actions, and advanced settings as saved objects, which are kept in a dedicated, internal {{es}} index. If such an object includes sensitive information, for example a PagerDuty integration key or email server credentials used by the alert action, {{kib}} encrypts it and makes sure it cannot be accidentally leaked or tampered with. You can configure and rotate the saved object encryption key for additional security. | ||
* [Encrypt data at rest](/deploy-manage/security/data-security.md): By default, {{ecloud}} already encrypts your {{ech}} deployment data, Serverless project data, and snapshots at rest. If you’re using ECH, then you can reinforce this mechanism by providing your own encryption key, also known as [Bring Your Own Key (BYOK)](/deploy-manage/security/encrypt-deployment-with-customer-managed-encryption-key.md). | ||
|
||
::::{note} | ||
Other deployment types don’t implement encryption at rest out of the box. For self-managed clusters, to implement encryption at rest, the hosts running the cluster must be configured with disk-level encryption, such as `dm-crypt`. In addition, snapshot targets must ensure that data is encrypted at rest as well. | ||
|
||
Configuring `dm-crypt` or similar technologies is outside the scope of this documentation, and issues related to disk encryption are outside the scope of support. | ||
:::: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
[Manage {{kib}} sessions](/deploy-manage/security/kibana-session-management.md) to control the timeout and lifespan of logged-in sessions to {{kib}}, as well as the number of concurrent sessions each user can have. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
::::{note} | ||
As part of your overall security strategy, you can also do the following: | ||
|
||
* Prevent unauthorized access with [password protection and role-based access control](/deploy-manage/users-roles.md). | ||
* Control access to dashboards and other saved objects in your UI using [Spaces](/deploy-manage/manage-spaces.md). | ||
* Connect a local cluster to a [remote cluster](/deploy-manage/remote-clusters.md) to enable [cross-cluster replication](/deploy-manage/tools/cross-cluster-replication.md) and [cross-cluster search](/solutions/search/cross-cluster-search.md). | ||
* Manage [API keys](/deploy-manage/api-keys.md) used for programmatic access to Elastic. | ||
:::: |
shainaraskas marked this conversation as resolved.
Show resolved
Hide resolved
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.