123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263 |
- [role="xpack"]
- [[elasticsearch-security]]
- == Security overview
- ++++
- <titleabbrev>Overview</titleabbrev>
- ++++
- Security protects {es} clusters by:
- * <<preventing-unauthorized-access, Preventing unauthorized access>>
- with password protection, role-based access control, and IP filtering.
- * <<preserving-data-integrity, Preserving the integrity of your data>>
- with SSL/TLS encryption.
- * <<maintaining-audit-trail, Maintaining an audit trail>>
- so you know who's doing what to your cluster and the data it stores.
- [float]
- [[preventing-unauthorized-access]]
- === Preventing unauthorized access
- To prevent unauthorized access to your {es} cluster, you must have a
- way to _authenticate_ users. This simply means that you need a way to validate
- that a user is who they claim to be. For example, you have to make sure only
- the person named _Kelsey Andorra_ can sign in as the user `kandorra`. The
- {es-security-features} provide a standalone authentication mechanism that enables
- you to quickly password-protect your cluster. If you're already using LDAP,
- Active Directory, or PKI to manage users in your organization, the
- {security-features} are able to integrate with those systems to perform user
- authentication.
- In many cases, simply authenticating users isn't enough. You also need a way to
- control what data users have access to and what tasks they can perform. The
- {es-security-features} enable you to _authorize_ users by assigning access
- _privileges_ to _roles_ and assigning those roles to users. For example, this
- role-based access control mechanism (a.k.a RBAC) enables you to specify that the
- user `kandorra` can only perform read operations on the `events` index and can't
- do anything at all with other indices.
- The {security-features} also support IP-based authorization.
- You can whitelist and blacklist specific IP addresses or subnets to control
- network-level access to a server.
- [float]
- [[preserving-data-integrity]]
- === Preserving data integrity
- A critical part of security is keeping confidential data confidential.
- {es} has built-in protections against accidental data loss and
- corruption. However, there's nothing to stop deliberate tampering or data
- interception. The {stack-security-features} preserve the integrity of your
- data by encrypting communications to and from nodes. For even
- greater protection, you can increase the <<ciphers,encryption strength>>.
- [float]
- [[maintaining-audit-trail]]
- === Maintaining an audit trail
- Keeping a system secure takes vigilance. By using {stack-security-features} to
- maintain an audit trail, you can easily see who is accessing your cluster and
- what they're doing. By analyzing access patterns and failed attempts to access
- your cluster, you can gain insights into attempted attacks and data breaches.
- Keeping an auditable log of the activity in your cluster can also help diagnose
- operational issues.
|