Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Elastic Stack

You're reading from   Mastering Elastic Stack Dive into data analysis with a pursuit of mastering ELK Stack on real-world scenarios.

Arrow left icon
Product type Paperback
Published in Feb 2017
Publisher Packt
ISBN-13 9781786460011
Length 526 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Ravi Kumar Gupta Ravi Kumar Gupta
Author Profile Icon Ravi Kumar Gupta
Ravi Kumar Gupta
Yuvraj Gupta Yuvraj Gupta
Author Profile Icon Yuvraj Gupta
Yuvraj Gupta
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Elastic Stack Overview FREE CHAPTER 2. Stepping into Elasticsearch 3. Exploring Logstash and Its Plugins 4. Kibana Interface 5. Using Beats 6. Elastic Stack in Action 7. Customizing Elastic Stack 8. Elasticsearch APIs 9. X-Pack: Security and Monitoring 10. X-Pack: Alerting, Graph, and Reporting 11. Best Practices 12. Case Study-Meetup

Security

X-Pack security is a module that has been created out of the requirement of having a proper authorization mechanism to access the data present in the cluster. It initially started with the need for secure the Elasticsearch cluster, and it has grown beyond that to even secure the Kibana UI and provide access to authorized users only.

Whenever we talk about security, we tend to discuss the three As:

  • Authentication: Used to authenticate users based on their identity
  • Authorization: Describes the roles/permissions granted to an authenticated user
  • Accountability: Logging user session information, usage information, and so on

Considering the three As, Elastic Team is using Shield as an X-Pack Security model, which makes sure that the 3A's are covered.

For Authentication, it provides restrictions on unauthorized access with basic password protection, organization-level user management, and IP-based authorization.

For Authorization, it provides role-based access control...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime