4
4
5
5
[partintro]
6
6
--
7
- { security} enables you to easily secure a cluster. With {security},
8
- you can password-protect your data as well as implement more advanced security
7
+ The {stack- security-features} enable you to easily secure a cluster. You can
8
+ password-protect your data as well as implement more advanced security
9
9
measures such as encrypting communications, role-based access control,
10
10
IP filtering, and auditing. This guide describes how to configure the security
11
11
features you need, and interact with your secured cluster.
@@ -21,53 +21,53 @@ Security protects Elasticsearch clusters by:
21
21
22
22
[float]
23
23
[[preventing-unauthorized-access]]
24
- === Preventing Unauthorized Access
24
+ === Preventing unauthorized access
25
25
26
26
To prevent unauthorized access to your Elasticsearch cluster, you must have a
27
27
way to _authenticate_ users. This simply means that you need a way to validate
28
28
that a user is who they claim to be. For example, you have to make sure only
29
- the person named _Kelsey Andorra_ can sign in as the user `kandorra`. {security}
30
- provides a standalone authentication mechanism that enables you to
31
- quickly password-protect your cluster. If you're already using <<ldap-realm, LDAP>>,
32
- <<active-directory- realm, Active Directory >>, or <<pki- realm, PKI>> to manage
33
- users in your organization, {security} is able to integrate with those
34
- systems to perform user authentication.
29
+ the person named _Kelsey Andorra_ can sign in as the user `kandorra`. The
30
+ {es-security-features} provide a standalone authentication mechanism that enables
31
+ you to quickly password-protect your cluster. If you're already using
32
+ <<ldap- realm, LDAP >>, <<active-directory- realm, Active Directory>>, or
33
+ <<pki-realm, PKI>> to manage users in your organization, the {security-features}
34
+ are able to integrate with those systems to perform user authentication.
35
35
36
36
In many cases, simply authenticating users isn't enough. You also need a way to
37
- control what data users have access to and what tasks they can perform. {security}
38
- enables you to _authorize_ users by assigning access _privileges_ to _roles_,
39
- and assigning those roles to users. For example, this
37
+ control what data users have access to and what tasks they can perform. The
38
+ {es-security-features} enable you to _authorize_ users by assigning access
39
+ _privileges_ to _roles_ and assigning those roles to users. For example, this
40
40
<<authorization,role-based access control>> mechanism (a.k.a RBAC) enables
41
41
you to specify that the user `kandorra` can only perform read operations on the
42
42
`events` index and can't do anything at all with other indices.
43
43
44
- {security} also supports <<ip-filtering, IP-based authorization>>. You can
45
- whitelist and blacklist specific IP addresses or subnets to control network-level
46
- access to a server.
44
+ The {security-features } also support <<ip-filtering, IP-based authorization>>.
45
+ You can whitelist and blacklist specific IP addresses or subnets to control
46
+ network-level access to a server.
47
47
48
48
[float]
49
49
[[preserving-data-integrity]]
50
- === Preserving Data Integrity
50
+ === Preserving data integrity
51
51
52
52
A critical part of security is keeping confidential data confidential.
53
53
Elasticsearch has built-in protections against accidental data loss and
54
54
corruption. However, there's nothing to stop deliberate tampering or data
55
- interception. { security} preserves the integrity of your data by
56
- <<ssl-tls, encrypting communications>> to and from nodes.
57
- For even greater protection, you can increase the <<ciphers, encryption strength>> and
55
+ interception. The {stack- security-features} preserve the integrity of your
56
+ data by <<ssl-tls, encrypting communications>> to and from nodes. For even
57
+ greater protection, you can increase the <<ciphers, encryption strength>> and
58
58
<<separating-node-client-traffic, separate client traffic from node-to-node communications>>.
59
59
60
60
61
61
[float]
62
62
[[maintaining-audit-trail]]
63
- === Maintaining an Audit Trail
63
+ === Maintaining an audit trail
64
64
65
- Keeping a system secure takes vigilance. By using {security} to maintain
66
- an audit trail, you can easily see who is accessing your cluster and what they're
67
- doing. By analyzing access patterns and failed attempts to access your cluster,
68
- you can gain insights into attempted attacks and data breaches. Keeping an
69
- auditable log of the activity in your cluster can also help diagnose operational
70
- issues.
65
+ Keeping a system secure takes vigilance. By using {stack- security-features } to
66
+ maintain an audit trail, you can easily see who is accessing your cluster and
67
+ what they're doing. By analyzing access patterns and failed attempts to access
68
+ your cluster, you can gain insights into attempted attacks and data breaches.
69
+ Keeping an auditable log of the activity in your cluster can also help diagnose
70
+ operational issues.
71
71
72
72
[float]
73
73
=== Where to Go Next
@@ -80,8 +80,8 @@ issues.
80
80
authorization, and encryption.
81
81
82
82
* <<ccs-clients-integrations>>
83
- shows you how to interact with an Elasticsearch cluster protected by
84
- {security}.
83
+ shows you how to interact with an Elasticsearch cluster protected by the
84
+ {stack- security-features }.
85
85
86
86
[float]
87
87
=== Have Comments, Questions, or Feedback?
0 commit comments