Presentations

Search Guard slide decks regarding various topics around security and alerting for Elasticsearch

preview imaginery
Quickstart and first steps
How to use the Demo Installer to quickly set up a Search Guard PoC for Elasticsearch and Kibana. Use the Kibana config GUI to add users, roles and permissions.
preview imaginery
Architecture and Request Flow
A high-level view on the Search Guard architecture and the request flow. This presentation describes the main concepts of Search Guard and how security is implemented.
preview imaginery
Configuration Basics
This deck describes how the Search Guard configuration for users, roles and permissions is structured, and explains how to apply configuration changes.
preview imaginery
Active Directory & LDAP
How to connect Search Guard to an Active Directory or LDAP server, and how to configure authentication and authorization.
preview imaginery
JSON web tokens
How to use JSON web tokens for Elasticsearch single sign on authentication.
preview imaginery
Audit logging
Use Search Guard audit logging to track access to your cluster and to stay compliant with regulations like PCI, HIPAA, SOX, GDPR and ISO.
preview imaginery
Document- and Field-Level Security
How to apply fine-grained access control to documents and fields in indices. Filter documents and filter or anonymize fields based on the users roles.
preview imaginery
Zero-trusted network
VPNs and firewalls are the norms, but perimeter security is not enough anymore. The Zero Trust Security model moves access control mechanisms from the network perimeter to the actual users, devices, and systems.
follow us
twitter iconfacebook iconlinkedIn iconyoutube icon
stay updated
For the latest product developments, new versions and cybersecurity news, sign up to our newsletter.