From version 5.0 onward, Shield is part of X-Pack. For more information, see Securing the Elastic Stack.
Now that you have Shield up and running, you might want to:
- Define and Use Custom Roles for fine-grained access control.
- Integrate with LDAP or Active Directory, or require certificates for authentication.
- Use SSL/TLS encryption to secure communications to and from nodes.
- Use IP Filtering to allow or deny requests from particular IP addresses or address ranges.