Protect Your Data in the Elastic Stack
X-Pack security features give the right access to the right people. IT, operations, and application teams rely on X-Pack to manage well-intentioned users and keep nefarious actors at bay, while executives and customers can rest easy knowing data stored in the Elastic Stack is safe and secure.
If You Like It, You Should Put a Password on It
It's the first step toward protecting data flowing through Elasticsearch, Kibana, Beats, and Logstash from unauthorized users and unintentional modification.
Integrate with authentication systems like Active Directory and LDAP, create a custom realm that supports your home-grown identity management system, or use our built-in native authentication.
Manage Users and Roles
Take control of who can do what within the Elastic Stack. Grant the IT/Ops team the ability to monitor Elasticsearch cluster health without being able to see or modify the data. Or give the marketing team read-only access to marketing-specific data, but deny access to other indices.
And with support for multitenancy, you can grant users access to specific Elasticsearch indices.
Prevent Snooping, Tampering, and Sniffing
Protect data — credit card numbers, email addresses, accounts — as it travels within the cluster and clients.
With SSL/TLS encryption, you can secure node-to-node, HTTP, and transport client traffic across your Elastic Stack. IP filtering also prevents unapproved hosts from joining or communicating with your cluster.
Secure All the Way Down to the Field Level
We dug deep to engineer and implement rock-solid security you can trust. Safeguard your Elastic Stack data at the level you like — from top to bottom.
CLUSTERWho can check cluster health?
INDEXWho can add or delete documents in an index?
DOCUMENTWho can access sensitive documents?
FIELDRestrict access to individual fields.
Have a Record of Who Did What and When
Perhaps the quiet hero of the security world, the audit log features in X‑Pack let you easily maintain a complete record of all system and user activity. This helps you stay compliant with internal security policies and regulations like HIPAA, PCI DSS, FISMA, and ISO.
You can also store the history in a file or index for easy searching and analyzing later.