Skip to content

Commit 10f334e

Browse files
[D&M] Secure Elastic Cloud organization (#723)
^^ To consider: - Where to locate traffic filtering pages (under this page, or under secure cluster/deployment) --------- Co-authored-by: Liam Thompson <[email protected]>
1 parent e1b8945 commit 10f334e

File tree

1 file changed

+19
-13
lines changed

1 file changed

+19
-13
lines changed

deploy-manage/security/secure-your-elastic-cloud-organization.md

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,26 +8,32 @@ applies_to:
88

99
# Secure your Elastic Cloud organization [ec-securing-considerations]
1010

11-
:::{warning}
12-
**This page is a work in progress.**
13-
:::
11+
This section covers security settings for your {{ecloud}} organization, the platform for managing {{ech}} deployments and serverless projects.
1412

13+
**Managed by Elastic**
1514

16-
## TLS certificate management
15+
As a managed service, Elastic automatically handles a [number of security features](https://www.elastic.co/cloud/security#details) with no configuration required:
1716

18-
TLS certificates apply security controls to network communications. They encrypt data in transit, verify the identity of connecting parties, and help prevent man-in-the-middle attacks.
17+
- **TLS encrypted communication** is provided in the default configuration. Elasticsearch nodes communicate using TLS.
18+
- **Encryption at rest**. By default, all of your {{ecloud}} resources are encrypted at rest. Note that you can choose to encrypt your {{ech}} deployments [using your own encryption key](/deploy-manage/security/encrypt-deployment-with-customer-managed-encryption-key.md).
19+
- **Cluster isolation**. Elasticsearch nodes run in isolated containers, configured according to the principle of least privilege, and with restrictions on system calls and allowed root operations.
1920

20-
For your **{{ech}}** deployments and serverless projects hosted on {{ecloud}}, TLS certificates are managed automatically.
21+
**Additional organization-level security settings**
2122

22-
## Access control
23+
To reinforce the security of your organization, consider implementing the following measures:
2324

24-
Define which users can access your {{ecloud}} organization using the following methods:
25+
- **Network security**. Control which systems can access your Elastic deployments and projects through traffic filtering and network controls:
26+
- [**IP traffic filtering**](/deploy-manage/security/ip-traffic-filtering.md): Restrict access based on IP addresses or CIDR ranges.
27+
- [**Private link filters**](/deploy-manage/security/private-link-traffic-filters.md): Secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect.
28+
- [**Static IPs**](/deploy-manage/security/elastic-cloud-static-ips.md): Use static IP addresses for predictable firewall rules.
29+
- **Access control**
30+
- [**Organization-level SSO**](/deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md). Note that for {{ech}} deployments, you can also configure SSO at the [deployment level](/deploy-manage/users-roles/cluster-or-deployment-auth.md).
31+
- [**Cloud role-based access control**](/deploy-manage/users-roles/cloud-organization/manage-users.md): Define the roles of users who have access to your organization and its resources. Note that for {{ech}} deployments, you can also [manage non-cloud users and roles](/deploy-manage/users-roles/cluster-or-deployment-auth/defining-roles.md).
32+
- [**Cloud API keys**](/deploy-manage/api-keys/elastic-cloud-api-keys.md): Manage API keys used for programmatic access to [{{ecloud}}](https://www.elastic.co/docs/api/doc/cloud/) and [{{ecloud}} serverless](https://www.elastic.co/docs/api/doc/elastic-cloud-serverless/) APIs.
2533

26-
- [SSO](/deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md)
27-
- [Role-based access control](/deploy-manage/users-roles/cloud-organization/manage-users.md)
28-
- [Cloud API keys](/deploy-manage/api-keys/elastic-cloud-api-keys.md)
2934

3035

31-
## Next step: secure your deployments and clusters
36+
**Additional deployment-level security settings**
37+
38+
While serverless projects are fully managed and secured by Elastic, additional security settings are available for you to configure individually for your {{ech}} deployments. Refer to [](secure-your-cluster-deployment.md) for more information.
3239

33-
This section covered security principles and options at the environment level. You can take further measures individually for each deployment or cluster that you're running on this environment. Refer to [](secure-your-cluster-deployment.md).

0 commit comments

Comments
 (0)