This topic compares Alibaba Cloud Elasticsearch clusters with user-created Elasticsearch clusters to describe the security protection advantages of Alibaba Cloud Elasticsearch.
Background information
Open-source software is often the first target of attacks. The MongoDB ransomware attacks are an example. Elasticsearch has also become the target of attacks. Attackers may attack user-created Elasticsearch clusters that do not have professional security protection, and then delete important data or interfere with the business system.
Alibaba Cloud Security Center released a warning about the security risks of Elasticsearch and provided multiple security hardening strategies and solutions. Alibaba Cloud Elasticsearch provides more reliable and professional solutions for data and service security than user-created Elasticsearch.
Security feature descriptions
Alibaba Cloud released the fully hosted Elasticsearch service in November, 2017. Alibaba Cloud Elasticsearch provides security protection features for you to safeguard your clusters.
The following table compares the security protection of Alibaba Cloud Elasticsearch with that of user-created Elasticsearch.
Security metric | Security protection of user-created Elasticsearch | Integrated security features of Alibaba Cloud Elasticsearch |
Access control |
|
|
Authentication and authorization | Install third-party security plug-ins, such as Search Guard and Shield. |
|
Data encryption |
|
|
Monitoring and auditing | Use third-party tools to audit logs and monitor services. |
|
Disaster recovery |
|
|