Loading

Secure your cluster or deployment

ECE ECK Elastic Cloud Hosted Self Managed

It's important to protect your Elasticsearch cluster and the data it contains. Implementing a defense in depth strategy provides multiple layers of security to help safeguard your system.

Note

As part of your overall security strategy, you can also do the following:

Important
  • Never run an Elasticsearch cluster without security enabled. This principle cannot be overstated. Running Elasticsearch without security leaves your cluster exposed to anyone who can send network traffic to Elasticsearch, permitting these individuals to download, modify, or delete any data in your cluster.
  • Never try to run Elasticsearch as the root user, which would invalidate any defense strategy and permit a malicious user to do anything on your server. You must create a dedicated, unprivileged user to run Elasticsearch. By default, the rpm, deb, docker, and Windows packages of Elasticsearch contain an elasticsearch user with this scope.
Tip

You can configure the following aspects of your Elastic cluster or deployment to maintain and enhance security:

  • Manage TLS certificates: TLS certificates apply security controls to network communications. Elastic uses TLS certificates to secure communications in two places:
    • The HTTP layer: Used for communication between your cluster or deployment and the internet.
    • The transport layer: Used mainly for inter-node communications, and in certain cases for cluster to cluster communication.
    • In self-managed Elasticsearch clusters, you can also Configure Kibana and Elasticsearch to use mutual TLS.
  • Enable cipher suites for stronger encryption: The TLS and SSL protocols use a cipher suite that determines the strength of encryption used to protect the data. You may want to enable the use of additional cipher suites, so you can use different cipher suites for your TLS communications or communications with authentication providers.
  • Restrict connections using traffic filtering: Traffic filtering allows you to limit how your deployments can be accessed. Add another layer of security to your installation and deployments by restricting inbound traffic to only the sources that you trust. Restrict access based on IP addresses or CIDR ranges, or secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect.
  • Allow or deny Elastic Cloud Hosted IP ranges: Elastic Cloud publishes a list of IP addresses used by its Elastic Cloud Hosted services for both incoming and outgoing traffic. Users can use these lists to configure their network firewalls as needed to allow or restrict traffic related to Elastic Cloud Hosted services.
  • Secure your settings: Some of the settings that you configure in Elastic are sensitive, such as passwords, and relying on file system permissions to protect these settings is insufficient. Learn how to configure secure settings in the Elasticsearch keystore or Kibana keystore.

  • Secure saved objects: Kibana stores entities such as dashboards, visualizations, alerts, actions, and advanced settings as saved objects, which are kept in a dedicated, internal Elasticsearch index. If such an object includes sensitive information, for example a PagerDuty integration key or email server credentials used by the alert action, Kibana encrypts it and makes sure it cannot be accidentally leaked or tampered with. You can configure and rotate the saved object encryption key for additional security.

  • Encrypt data at rest: By default, Elastic Cloud already encrypts your Elastic Cloud Hosted deployment data, Serverless project data, and snapshots at rest. If you’re using ECH, then you can reinforce this mechanism by providing your own encryption key, also known as Bring Your Own Key (BYOK).

    Note

    Other deployment types don’t implement encryption at rest out of the box. For self-managed clusters, to implement encryption at rest, the hosts running the cluster must be configured with disk-level encryption, such as dm-crypt. In addition, snapshot targets must ensure that data is encrypted at rest as well.

    Configuring dm-crypt or similar technologies is outside the scope of this documentation, and issues related to disk encryption are outside the scope of support.

Manage Kibana sessions to control the timeout and lifespan of logged-in sessions to Kibana, as well as the number of concurrent sessions each user can have.

Audit logging is a powerful feature that helps you monitor and track security-related events within the Elastic Stack. By enabling audit logs, you can gain visibility into authentication attempts, authorization decisions, and other system activity.

Audit logging also provides forensic evidence in the event of an attack, and can be enabled independently for Elasticsearch and Kibana.

Learn how to enable audit logging.

Since Elasticsearch 8.0, security is enabled and configured by default. However, security auto configuration might be skipped in certain scenarios. In these cases, you can manually configure security.

ECK Self Managed

The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), titled "Security Requirements for Cryptographic Modules" is a U.S. government computer security standard used to approve cryptographic modules. You can run a self-managed cluster or Elastic Cloud on Kubernetes cluster in FIPS-compliant mode:

Security feature availability varies by deployment type, with each feature having one of the following statuses:

Status Description
Managed Handled automatically by Elastic with no user configuration needed
Configurable Built-in feature that needs your configuration (like IP filters or passwords)
Self-managed Infrastructure-level security you implement and maintain
N/A Not available for this deployment type

Select your deployment type below to see what's available and how implementation responsibilities are distributed:

Category Security feature Status Description
Communication TLS (HTTP Layer) Managed Automatically configured by Elastic
TLS (Transport Layer) Managed Automatically configured by Elastic
Network IP traffic filtering Configurable Configure IP-based access restrictions
Private link Configurable Establish secure VPC connection
Static IPs Configurable Enable fixed IP addresses
Data Encryption at rest Managed Automatically encrypted by Elastic
Bring your own encryption key Configurable Implement customer-provided keys
Keystore security Managed Automatically protected by Elastic
Saved object encryption Managed Automatically encrypted by Elastic
User Session Kibana Sessions Configurable Customize session parameters
Category Security feature Status Description
Communication TLS (HTTP Layer) Managed Automatically configured by Elastic
TLS (Transport Layer) Managed Automatically configured by Elastic
Network IP traffic filtering Configurable Configure IP-based access restrictions
Private link N/A X
Static IPs Configurable Enable fixed IP addresses
Data Encryption at rest Managed Automatically encrypted by Elastic
Bring your own encryption key N/A X
Keystore security Managed Automatically protected by Elastic
Saved object encryption Managed Automatically encrypted by Elastic
User Session Kibana Sessions Managed Automatically configured by Elastic
Category Security feature Status Description
Communication TLS (HTTP Layer) Configurable Configure custom certificates
TLS (Transport Layer) Managed Automatically configured by Elastic
Network IP traffic filtering Configurable Configure IP-based access restrictions
Private link N/A X
Static IPs N/A X
Data Encryption at rest Self-managed Implement at infrastructure level
Bring your own encryption key N/A X
Keystore security Configurable Configure secure settings storage
Saved object encryption Configurable Enable encryption for saved objects
User Session Kibana Sessions Configurable Customize session parameters
Category Security feature Status Description
Communication TLS (HTTP Layer) Self-managed Implement and maintain certificates
TLS (Transport Layer) Self-managed Implement and maintain certificates
Network IP traffic filtering Configurable Configure IP-based access restrictions
Private link N/A X
Static IPs N/A X
Data Encryption at rest Self-managed Implement at infrastructure level
Bring your own encryption key N/A X
Keystore security Configurable Configure secure settings storage
Saved object encryption Configurable Enable encryption for saved objects
User Session Kibana Sessions Configurable Customize session parameters