You're viewing version 2.15 of the OpenSearch documentation. This version is no longer maintained. For the latest version, see the current documentation. For information about OpenSearch version maintenance, see Release Schedule and Maintenance Policy.
Best practices for OpenSearch security
Setting up security in OpenSearch is crucial for protecting your data. Here are 10 best practices that offer clear steps for keeping your system safe.
1. Use your own PKI to set up SSL/TLS
Although using your own public key infrastructure (PKI), such as AWS Certificate Manager, requires more initial effort, a custom PKI provides you with the flexibility needed to set up SSL/TLS in the most secure and performant way.
Enable SSL/TLS for node- and REST-layer traffic
SSL/TLS is enabled by default on the transport layer, which is used for node-to-node communication. SSL/TLS is disabled by default on the REST layer.
The following setting is required in order to enable encryption on the REST layer:
plugins.security.ssl.http.enabled: true
For additional configuration options, such as specifying certificate paths, keys, and certificate authority files, refer to Configuring TLS certificates.
Replace all demo certificates with your own PKI
The certificates generated when initializing an OpenSearch cluster with install_demo_configuration.sh
are not suitable for production. These should be replaced with your own certificates.
You can generate custom certificates in a few different ways. One approach is to use OpenSSL, described in detail at Generating self-signed certificates. Alternatively, there are online tools available that can simplify the certificate creation process, such as the following:
2. Prefer client certificate authentication for API authentication
Client certificate authentication offers a secure alternative to password authentication and is more suitable for machine-to-machine interactions. It also ensures low performance overhead because the authentication occurs on the TLS level. Nearly all client software, such as curl and client libraries, support this authentication method.
For detailed configuration instructions and additional information about client certificate authentication, see Enabling client certificate authentication.
3. Prefer SSO using SAML or OpenID for OpenSearch Dashboards authentication
Implementing single sign-on (SSO) with protocols like SAML or OpenID for OpenSearch Dashboards authentication enhances security by delegating credential management to a dedicated system.
This approach minimizes direct interaction with passwords in OpenSearch, streamlines authentication processes, and prevents clutter in the internal user database. For more information, go to the SAML section of the OpenSearch documentation.
4. Limit the number of roles assigned to a user
Prioritizing fewer, more intricate user roles over numerous simplistic roles enhances security and simplifies administration.
Additional best practices for role management include:
- Role granularity: Define roles based on specific job functions or access requirements to minimize unnecessary privileges.
- Regular role review: Regularly review and audit assigned roles to ensure alignment with organizational policies and access needs.
For more information about roles, go to the documentation on defining users and roles in OpenSearch.
5. Verify DLS, FLS, and field masking
If you have configured Document Level Security (DLS), Field Level Security (FLS), or field masking, make sure you double-check your role definitions, especially if a user is mapped to multiple roles. It is highly recommended that you test this by making a GET request to _plugins/_security/authinfo
.
The following resources provide detailed examples and additional configurations:
6. Use only the essentials for the audit logging configuration
Extensive audit logging can degrade system performance due to the following:
- Each logged event adds to the processing load.
- Audit logs can quickly grow in size, consuming significant disk space.
To ensure optimal performance, disable unnecessary logging and be selective about which logs are used. If not strictly required by compliance regulations, consider turning off audit logging. If audit logging is essential for your cluster, configure it according to your compliance requirements.
Whenever possible, adhere to these recommendations:
- Set
audit.log_request_body
tofalse
. - Set
audit.resolve_bulk_requests
tofalse
. - Enable
compliance.write_log_diffs
. - Minimize entries for
compliance.read_watched_fields
. - Minimize entries for
compliance.write_watched_indices
.
7. Consider disabling the private tenant
In many cases, the use of private tenants is unnecessary, although this feature is enabled by default. As a result, every OpenSearch Dashboards user is provided with their own private tenant and a corresponding new index in which to save objects. This can lead to a large number of unnecessary indexes. Evaluate whether private tenants are needed in your cluster. If private tenants are not needed, disable the feature by adding the following configuration to the config.yml
file:
config:
dynamic:
kibana:
multitenancy_enabled: true
private_tenant_enabled: false
8. Manage the configuration using securityadmin.sh
Use securityadmin.sh
to manage the configuration of your clusters. securityadmin.sh
is a command-line tool provided by OpenSearch for managing security configurations. It allows administrators to efficiently manage security settings, including roles, role mappings, and other security-related configurations within an OpenSearch cluster.
Using securityadmin.sh
provides the following benefits:
- Consistency: By using
securityadmin.sh
, administrators can ensure consistency across security configurations within a cluster. This helps to maintain a standardized and secure environment. - Automation:
securityadmin.sh
enables automation of security configuration tasks, making it easier to deploy and manage security settings across multiple nodes or clusters. - Version control: Security configurations managed through
securityadmin.sh
can be version controlled using standard version control systems like Git. This facilitates tracking changes, auditing, and reverting to previous configurations.
You can prevent configuration overrides by first creating a backup of the current configuration created using the OpenSearch Dashboards UI or the OpenSearch API by running the securityadmin.sh
tool with the -backup
option. This ensures that all configurations are captured before uploading the modified configuration with securityadmin.sh
.
For more detailed information about using securityadmin.sh
and managing OpenSearch security configurations, refer to the following resources:
9. Replace all default passwords
When initializing OpenSearch with the demo configuration, many default passwords are provided for internal users in internal_users.yml
, such as admin
, kibanaserver
, and logstash
.
You should change the passwords for these users to strong, complex passwords either at startup or as soon as possible once the cluster is running. Creating password configurations is a straightforward procedure, especially when using the scripts bundled with OpenSearch, like hash.sh
or hash.bat
, located in the plugin/OpenSearch security/tools
directory.
The kibanaserver
user is a crucial component that allows OpenSearch Dashboards to communicate with the OpenSearch cluster. By default, this user is preconfigured with a default password in the demo configuration. This should be replaced with a strong, unique password in the OpenSearch configuration, and the opensearch_dashboards.yml
file should be updated to reflect this change.
10. Getting help
If you need additional help, you can do the following:
- Create an issue on GitHub at OpenSearch-project/security or OpenSearch-project/OpenSearch.
- Ask a question on the OpenSearch forum.