overview.asciidoc 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. [role="xpack"]
  2. [[elasticsearch-security]]
  3. == Security overview
  4. ++++
  5. <titleabbrev>Overview</titleabbrev>
  6. ++++
  7. Security protects {es} clusters by:
  8. * <<preventing-unauthorized-access, Preventing unauthorized access>>
  9. with password protection, role-based access control, and IP filtering.
  10. * <<preserving-data-integrity, Preserving the integrity of your data>>
  11. with SSL/TLS encryption.
  12. * <<maintaining-audit-trail, Maintaining an audit trail>>
  13. so you know who's doing what to your cluster and the data it stores.
  14. [float]
  15. [[preventing-unauthorized-access]]
  16. === Preventing unauthorized access
  17. To prevent unauthorized access to your {es} cluster, you must have a
  18. way to _authenticate_ users. This simply means that you need a way to validate
  19. that a user is who they claim to be. For example, you have to make sure only
  20. the person named _Kelsey Andorra_ can sign in as the user `kandorra`. The
  21. {es-security-features} provide a standalone authentication mechanism that enables
  22. you to quickly password-protect your cluster. If you're already using LDAP,
  23. Active Directory, or PKI to manage users in your organization, the
  24. {security-features} are able to integrate with those systems to perform user
  25. authentication.
  26. In many cases, simply authenticating users isn't enough. You also need a way to
  27. control what data users have access to and what tasks they can perform. The
  28. {es-security-features} enable you to _authorize_ users by assigning access
  29. _privileges_ to _roles_ and assigning those roles to users. For example, this
  30. role-based access control mechanism (a.k.a RBAC) enables you to specify that the
  31. user `kandorra` can only perform read operations on the `events` index and can't
  32. do anything at all with other indices.
  33. The {security-features} also support IP-based authorization.
  34. You can whitelist and blacklist specific IP addresses or subnets to control
  35. network-level access to a server.
  36. [float]
  37. [[preserving-data-integrity]]
  38. === Preserving data integrity
  39. A critical part of security is keeping confidential data confidential.
  40. {es} has built-in protections against accidental data loss and
  41. corruption. However, there's nothing to stop deliberate tampering or data
  42. interception. The {stack-security-features} preserve the integrity of your
  43. data by encrypting communications to and from nodes. For even
  44. greater protection, you can increase the <<ciphers,encryption strength>>.
  45. [float]
  46. [[maintaining-audit-trail]]
  47. === Maintaining an audit trail
  48. Keeping a system secure takes vigilance. By using {stack-security-features} to
  49. maintain an audit trail, you can easily see who is accessing your cluster and
  50. what they're doing. By analyzing access patterns and failed attempts to access
  51. your cluster, you can gain insights into attempted attacks and data breaches.
  52. Keeping an auditable log of the activity in your cluster can also help diagnose
  53. operational issues.