Loading

Network security policies in Elastic Cloud

ECH Serverless

By default, in Elastic Cloud Hosted and Elastic Cloud Serverless, all your deployments are accessible over the public internet without restrictions.

Network security policies include IP filters and private connections. They are created at the organization level, and need to be associated with one or more resources, such as a deployment or project, to take effect. After you associate at least one policy with a resource, traffic that does not match the policy or any other policy associated with the resource is denied.

Policies apply to external traffic only. Internal traffic is managed by the deployment or project. For example, in Elastic Cloud Hosted, Kibana can connect to Elasticsearch, as well as internal services which manage the deployment. Other deployments can’t connect to deployments protected by network security policies.

Policies operate on the platform proxies. Requests rejected by the policies are not forwarded to the resource. The proxy responds to the client with 403 Forbidden.

  • You can assign multiple policies to a single deployment. The policies can be of different types. In case of multiple policies, traffic can match any associated policy to be forwarded to the resource. If none of the policies match, the request is rejected with 403 Forbidden.
  • Policies, when associated with a deployment or project, will apply to all endpoints, such as Elasticsearch, Kibana, APM Server, and others.
  • Any policy assigned to a deployment overrides the default behavior of allow all access over the public internet endpoint. The implication is that if you make a mistake putting in the traffic source (for example, if you specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the policies.
  • You can mark a policy as default. Default policies are automatically attached to all new resources of the matching resource type that you create in its region.
  • You can have a maximum of 1024 policies per organization and 128 sources in each policy.
  • Policies must be created for a specific resource type. If you want to associate a policy to both hosted deployments and Serverless projects, then you have to create the same policy for each resource types.
  • Policies are bound to a single region, and can be assigned only to deployments or projects in the same region. If you want to associate a policy with resources in multiple regions, then you have to create the same policy in all the regions you want to apply it to.
  • Domain-based filtering sources are not allowed for network security policies, because the original IP is hidden behind the proxy. Only IP-based filtering sources are allowed.

You can mark a policy as default. Default policies are automatically attached to all new resources of the matching resource type that you create in its region.

You can detach default policies from resources after they are created. Default policies are not automatically attached to existing resources.

To automatically apply a network security policy to new resources by default new deployments or projects in your organization:

  1. Log in to the Elastic Cloud Console.
  2. From any deployment or project on the home page, select Manage.
  3. From the left navigation menu, select Access and security > Network security.
  1. Select Create to create a new policy, or select Edit to open an existing policy.
  2. Under Apply to future resources by default, select Include by default.

To identify which network security policies are automatically applied to new deployments or projects in your organization:

  1. Log in to the Elastic Cloud Console.
  2. From any deployment or project on the home page, select Manage.
  3. From the left navigation menu, select Access and security > Network security.
  1. Select each of the policies. Include by default is checked when a policy is automatically applied to all new deployments or projects in its region.

To identify the network security policies that are applied to your deployment or project:

  1. Log in to the Elastic Cloud Console.
  2. On the Serverless projects page, select your project.
  3. Select the Network security tab on the left-hand side menu bar.

Network security policies are listed on the page. From this page, you can view and remove existing policies and attach new policies.

  1. Log in to the Elastic Cloud Console.
  2. On the Hosted deployments page, select your deployment.
  3. Select the Security tab on the left-hand side menu bar.

Network security policies are listed under Network security. From this section, you can view and remove existing policies and attach new policies.

You can review the resources that are currently protected by an IP filter or private connection from the Network security page.

  1. Log in to the Elastic Cloud Console.
  2. From any deployment or project on the home page, select Manage.
  3. From the left navigation menu, select Access and security > Network security.
  1. Review the usage summary cards at the top of the page.

These cards include the following information:

  • How many of the configured IP filters and private connections are currently in use.

    You can click on the [X] of [Y] in use links to view any unused IP filters or private connections.

  • Which resources are protected by IP filters or private connections.

    You can click on the [X] deployments or [X] projects links to view a list of the protected resources.

    Only resources that you have permission to view are counted and shown. IP filter or private connection policies might also be applied to resources that you don't have permission to view.

You can also view the resources associated with a specific policy by clicking on the links in the Protected resources column of the policy list.

Requests rejected by a network security policy have the status code 403 Forbidden and one of the following in the response body:

{"ok":false,"message":"Forbidden"}
{"ok":false,"message":"Forbidden due to traffic filtering. Please see the Elastic documentation on Traffic Filtering for more information."}