﻿---
title: Secure Heartbeat
description: The following topics provide information about securing the Heartbeat process and connecting to a cluster that has security features enabled. You can...
url: https://www.elastic.co/elastic/docs-builder/docs/3016/reference/beats/heartbeat/securing-heartbeat
products:
  - Beats
  - Heartbeat
applies_to:
  - Elastic Cloud Serverless: Generally available
  - Elastic Stack: Generally available
---

# Secure Heartbeat
The following topics provide information about securing the Heartbeat process and connecting to a cluster that has security features enabled.
You can use role-based access control and optionally, API keys to grant Heartbeat users access to secured resources.
- [*Grant users access to secured resources*](https://www.elastic.co/elastic/docs-builder/docs/3016/reference/beats/heartbeat/feature-roles)
- [*Grant access using API keys*](https://www.elastic.co/elastic/docs-builder/docs/3016/reference/beats/heartbeat/beats-api-keys).

After privileged users have been created, use authentication to connect to a secured Elastic cluster.
- [*Secure communication with Elasticsearch*](https://www.elastic.co/elastic/docs-builder/docs/3016/reference/beats/heartbeat/securing-communication-elasticsearch)
- [*Secure communication with Logstash*](https://www.elastic.co/elastic/docs-builder/docs/3016/reference/beats/heartbeat/configuring-ssl-logstash)

On Linux, Heartbeat can take advantage of secure computing mode to restrict the system calls that a process can issue.
- [*Use Linux Secure Computing Mode (seccomp)*](https://www.elastic.co/elastic/docs-builder/docs/3016/reference/beats/heartbeat/linux-seccomp)