
Summary
The rule 'Inbound Connection to an Unsecure Elasticsearch Node' alerts on unsecured Elasticsearch nodes exposed to network traffic without Transport Layer Security (TLS) or authentication. Elasticsearch, typically used for log and data analytics, can be vulnerable to unauthorized access if improperly configured. The detection mechanism focuses on inbound connections targeting the default Elasticsearch port (9200) that do not carry authentication headers. Insecure configurations are significant risks, exposing nodes to potential exploitation which may lead to unauthorized data access, exfiltration, or service disruption. The detection relies on established traffic patterns and alerts teams to investigate potentially malicious activity while identifying trusted or known IPs to reduce false positives. Recommended actions include enhancing security measures like enabling TLS and required authentication, conducting thorough access log reviews, and swiftly isolating any affected nodes. The presence of unauthorized attempts necessitates action to secure configurations and inform relevant security personnel about the incident appropriately.
Categories
- Network
- Endpoint
Data Sources
- Network Traffic
- Application Log
ATT&CK Techniques
- T1190
Created: 2020-08-11