Skip to content

Commit d13c54c

Browse files
leemthompoflorent-leborgne
authored andcommitted
[D&M] Improve deploy-manage/security landing page (#721)
## What is this? - Second cut at landing page for https://github.com/elastic/docs-projects/issues/346, because the first draft started to disgust me almost immediately. - (first cut: #703) ## Summary - Intro rewrite - Replaced generic intro with specific bullet points explaining exactly what's on the page - Restructured security features section - Changed from vertical comparison tables to tab-based organization by deployment type - Security topics simplified - Cleaned up redundant descriptions in the four main security topic areas - Added "Next steps" section - New conclusion with clear paths to deployment-specific documentation - Removed "Using this documentation" section - Integrated essential guidance into a brief note under Security topics Consolidated ECE/ECK information - Combined identical deployment types to reduce redundancy --------- Co-authored-by: florent-leborgne <[email protected]>
1 parent c8e4bdb commit d13c54c

File tree

1 file changed

+119
-59
lines changed

1 file changed

+119
-59
lines changed

deploy-manage/security.md

Lines changed: 119 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -75,102 +75,162 @@ $$$maintaining-audit-trail$$$
7575

7676
# Security
7777

78-
This section covers how to secure your Elastic environment. Learn how to implement TLS encryption, network security controls, and data protection measures.
78+
This overview page helps you understand Elastic's security capabilities across different deployment types. You'll find:
79+
80+
- Key security features for protecting your Elastic deployment
81+
- Security capabilities specific to each deployment type
82+
- Comparison tables showing feature availability and configurability by deployment type
83+
- Links to detailed implementation guides
7984

8085
## Security overview
8186

82-
An Elastic implementation comprises many moving parts: {es} nodes forming the cluster, {kib} instances, additional stack components such as Logstash and Beats, and various clients and integrations communicating with your deployment.
87+
An Elastic implementation comprises many moving parts: {{es}} nodes forming the cluster, {{kib}} instances, additional stack components such as Logstash and Beats, and various clients and integrations communicating with your deployment.
8388

8489
To keep your data secured, Elastic offers comprehensive security features that:
8590
- Prevent unauthorized access to your deployment
8691
- Encrypt communications between components
8792
- Protect data at rest
8893
- Secure sensitive settings and saved objects
8994

90-
Security requirements and capabilities vary by deployment. Features may be managed automatically by Elastic, require configuration, or must be fully self-managed. Refer to [Security by deployment type](#security-by-deployment-type) for details.
95+
:::{note}
96+
The availability and configurability of security features vary by deployment type. Refer to [Security by deployment type](#security-features-by-deployment-type) for a comparison table.
97+
:::
9198

92-
::::{tip}
93-
See the [Deployment overview](/deploy-manage/deploy.md) to understand your options for deploying Elastic.
94-
::::
99+
## Security topics
95100

96-
### Security by deployment type
101+
The documentation is organized into four main areas.
97102

98-
Security features have one of these statuses across deployment types:
103+
:::{note}
104+
Throughout the documentation, you'll see deployment type indicators that show which content applies to specific deployment types. Focus on sections tagged with your deployment type and look for subsections specifically addressing your deployment model.
105+
:::
99106

100-
| Status | Description |
101-
|--------|-------------|
102-
| **Managed** | Handled automatically by Elastic with no user configuration needed |
103-
| **Configurable** | Built-in feature that needs your configuration (like IP filters or passwords) |
104-
| **Self-managed** | Infrastructure-level security you implement and maintain |
105-
| **N/A** | Not available for this deployment type |
107+
### 1. Secure your hosting environment
108+
109+
The [security of your hosting environment](security/secure-hosting-environment.md) forms the foundation of your overall security posture. This section covers environment-specific security controls:
106110

107-
#### Communication security
111+
- [**Elastic Cloud Hosted and Serverless**](security/secure-your-elastic-cloud-organization.md)
112+
- [**Elastic Cloud Enterprise**](security/secure-your-elastic-cloud-enterprise-installation.md)
113+
- [**Elastic Cloud on Kubernetes**](security/secure-your-eck-installation.md)
114+
- [**Self-managed environments**](security/manually-configure-security-in-self-managed-cluster.md)
108115

109-
| **Security feature** | Serverless | Elastic Cloud Hosted | ECE | ECK | Self-managed |
110-
|------------------|------------|--------------|-----|-----|--------------|
111-
| **TLS (HTTP Layer)** | Managed | Managed | Configurable | Configurable | Self-managed |
112-
| **TLS (Transport Layer)** | Managed | Managed | Managed | Managed | Self-managed |
116+
### 2. Secure your deployments and clusters
113117

114-
#### Network security
118+
[Secure your deployments](security/secure-your-cluster-deployment.md) with features available across all deployment types:
115119

116-
| **Security feature** | Serverless | Elastic Cloud Hosted | ECE | ECK | Self-managed |
117-
|------------------|------------|--------------|-----|-----|--------------|
118-
| **IP traffic filtering** | Configurable | Configurable | Configurable | Configurable | Configurable |
119-
| **Private link** | N/A | Configurable | N/A | N/A | N/A |
120-
| **Static IPs** | Configurable | Configurable | N/A | N/A | N/A |
120+
- [**Traffic filtering**](security/traffic-filtering.md): IP filtering, private links, and static IPs
121+
- [**Secure communications**](security/secure-cluster-communications.md): TLS configuration, certificates management
122+
- [**Data protection**](security/data-security.md): Encryption at rest, secure settings, saved objects
123+
- [**Session management**](security/kibana-session-management.md): Kibana session controls
124+
- [**FIPS 140-2 compliance**](security/fips-140-2.md): Federal security standards
121125

122-
#### Data security
126+
### 3. Secure your personal account
123127

124-
| **Security feature** | Serverless | Elastic Cloud Hosted | ECE | ECK | Self-managed |
125-
|------------------|------------|--------------|-----|-----|--------------|
126-
| **Encryption at rest** | Managed | Managed | Self-managed | Self-managed | Self-managed |
127-
| **Bring your own encryption key** | N/A | Configurable | N/A | N/A | N/A |
128-
| **Keystore security** | Managed | Managed | Configurable | Configurable | Configurable |
129-
| **Saved object encryption** | Managed | Managed | Configurable | Configurable | Configurable |
128+
[Secure your personal account](security/secure-your-personal-account.md) to help prevent unauthorized access:
130129

131-
#### User session security
130+
- Multi-factor authentication and account security best practices
132131

133-
| **Security feature** | Serverless | Elastic Cloud Hosted | ECE | ECK | Self-managed |
134-
|------------------|------------|--------------|-----|-----|--------------|
135-
| **Kibana Sessions** | Managed | Configurable | Configurable | Configurable | Configurable |
132+
### 4. Secure your clients and integrations
136133

137-
### Using this documentation
134+
[Secure your clients and integrations](security/secure-clients-integrations.md) to ensure secure communication between your applications and Elastic:
138135

139-
Throughout this security documentation, you'll see deployment type indicators that show which content applies to specific deployment types. Each section clearly identifies which deployment types it applies to, and deployment-specific details are separated within each topic.
136+
- [**Client security**](security/httprest-clients-security.md): Best practices for securely connecting applications to {{es}}
137+
- **Integration security**: Secure configuration for Beats, Logstash, and other integrations
140138

141-
To get the most relevant information for your environment, focus on sections tagged with your deployment type and look for subsections specifically addressing your deployment model.
139+
## Security features by deployment type
142140

143-
## Security topics
141+
Security feature availability varies by deployment type, with each feature having one of the following statuses:
144142

145-
This security documentation is organized into four main areas:
143+
| **Status** | **Description** |
144+
|--------|-------------|
145+
| **Managed** | Handled automatically by Elastic with no user configuration needed |
146+
| **Configurable** | Built-in feature that needs your configuration (like IP filters or passwords) |
147+
| **Self-managed** | Infrastructure-level security you implement and maintain |
148+
| **N/A** | Not available for this deployment type |
146149

147-
% TODO: Add links to the sections below
150+
Select your deployment type below to see what's available and how implementation responsibilities are distributed:
148151

149-
### 1. Secure your hosting environment
152+
::::{tab-set}
153+
:group: deployment-type
150154

151-
The security of your hosting environment forms the foundation of your overall security posture. This section covers environment-specific security controls:
155+
:::{tab-item} Elastic Cloud Hosted
156+
:sync: cloud-hosted
152157

153-
- **Elastic Cloud Hosted and Serverless**: Organization-level SSO, role-based access control, and cloud API keys
154-
- **Elastic Cloud Enterprise**: TLS certificates, role-based access control, and cloud API keys
155-
- **Self-managed environments**: TLS certificates, HTTPS configuration
158+
| **Security Category** | **Security Feature** | **Status** | **Description** |
159+
|------------------|------------|--------------|-------------|
160+
| **Communication** | TLS (HTTP Layer) | Managed | Automatically configured by Elastic |
161+
| | TLS (Transport Layer) | Managed | Automatically configured by Elastic |
162+
| **Network** | IP traffic filtering | Configurable | Configure IP-based access restrictions |
163+
| | Private link | Configurable | Establish secure VPC connection |
164+
| | Static IPs | Configurable | Enable fixed IP addresses |
165+
| **Data** | Encryption at rest | Managed | Automatically encrypted by Elastic |
166+
| | Bring your own encryption key | Configurable | Implement customer-provided keys |
167+
| | Keystore security | Managed | Automatically protected by Elastic |
168+
| | Saved object encryption | Managed | Automatically encrypted by Elastic |
169+
| **User Session** | Kibana Sessions | Configurable | Customize session parameters |
156170

157-
### 2. Secure your deployments and clusters
171+
:::
158172

159-
Protect your deployments with features available across all deployment types:
173+
:::{tab-item} Serverless
174+
:sync: serverless
175+
176+
| **Security Category** | **Security Feature** | **Status** | **Description** |
177+
|------------------|------------|--------------|-------------|
178+
| **Communication** | TLS (HTTP Layer) | Managed | Automatically configured by Elastic |
179+
| | TLS (Transport Layer) | Managed | Automatically configured by Elastic |
180+
| **Network** | IP traffic filtering | Configurable | Configure IP-based access restrictions |
181+
| | Private link | N/A | X |
182+
| | Static IPs | Configurable | Enable fixed IP addresses |
183+
| **Data** | Encryption at rest | Managed | Automatically encrypted by Elastic |
184+
| | Bring your own encryption key | N/A | X |
185+
| | Keystore security | Managed | Automatically protected by Elastic |
186+
| | Saved object encryption | Managed | Automatically encrypted by Elastic |
187+
| **User Session** | Kibana Sessions | Managed | Automatically configured by Elastic |
160188

161-
- **Authentication and access controls**: User management, API keys, authentication protocols, and traffic filtering
162-
- **Data protection**: Encryption, sensitive settings, and document-level security
163-
- **Monitoring and compliance**: Audit logging and security best practices
189+
:::
164190

165-
### 3. Secure your user accounts
191+
:::{tab-item} ECE/ECK
192+
:sync: ece-eck
193+
194+
| **Security Category** | **Security Feature** | **Status** | **Description** |
195+
|------------------|------------|--------------|-------------|
196+
| **Communication** | TLS (HTTP Layer) | Configurable | Configure custom certificates |
197+
| | TLS (Transport Layer) | Managed | Automatically configured by Elastic |
198+
| **Network** | IP traffic filtering | Configurable | Configure IP-based access restrictions |
199+
| | Private link | N/A | X |
200+
| | Static IPs | N/A | X |
201+
| **Data** | Encryption at rest | Self-managed | Implement at infrastructure level |
202+
| | Bring your own encryption key | N/A | X |
203+
| | Keystore security | Configurable | Configure secure settings storage |
204+
| | Saved object encryption | Configurable | Enable encryption for saved objects |
205+
| **User Session** | Kibana Sessions | Configurable | Customize session parameters |
166206

167-
Individual user security helps prevent unauthorized access:
207+
:::
168208

169-
- **Multi-factor authentication**: Add an extra layer of security to your login process
209+
:::{tab-item} Self-managed
210+
:sync: self-managed
211+
212+
| **Security Category** | **Security Feature** | **Status** | **Description** |
213+
|------------------|------------|--------------|-------------|
214+
| **Communication** | TLS (HTTP Layer) | Self-managed | Implement and maintain certificates |
215+
| | TLS (Transport Layer) | Self-managed | Implement and maintain certificates |
216+
| **Network** | IP traffic filtering | Configurable | Configure IP-based access restrictions |
217+
| | Private link | N/A | X |
218+
| | Static IPs | N/A | X |
219+
| **Data** | Encryption at rest | Self-managed | Implement at infrastructure level |
220+
| | Bring your own encryption key | N/A | X |
221+
| | Keystore security | Configurable | Configure secure settings storage |
222+
| | Saved object encryption | Configurable | Enable encryption for saved objects |
223+
| **User Session** | Kibana Sessions | Configurable | Customize session parameters |
170224

171-
### 4. Secure your clients and integrations
225+
:::
172226

173-
Ensure secure communication between your applications and Elastic:
227+
::::
174228

175-
- **Client security**: Best practices for securely connecting applications to {es}
176-
- **Integration security**: Secure configuration for Beats, Logstash, and other integrations
229+
## Next steps
230+
231+
Refer to the following sections for detailed instructions about securing your hosting environment:
232+
233+
* [Elastic Cloud Hosted and Serverless security setup](/deploy-manage/security/secure-your-elastic-cloud-organization.md)
234+
* [Elastic Cloud Enterprise (ECE) security setup](/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation.md)
235+
* [Elastic Cloud on Kubernetes (ECK) security setup](/deploy-manage/security/secure-your-eck-installation.md)
236+
* [Self-managed cluster security setup](/deploy-manage/security/manually-configure-security-in-self-managed-cluster.md)

0 commit comments

Comments
 (0)