consul/website/content/docs/security/index.mdx

24 lines
1022 B
Plaintext
Raw Normal View History

2014-02-08 00:41:03 +00:00
---
2020-04-07 18:55:19 +00:00
layout: docs
2022-09-16 15:28:32 +00:00
page_title: Security - Overview
2020-04-07 18:55:19 +00:00
description: >-
2022-09-16 15:28:32 +00:00
Security requirements and recommendations for Consul vary depending on workloads and environments. Learn how ACLs and encryption can protect access to and communication within your datacenter.
2014-02-08 00:41:03 +00:00
---
2020-11-04 22:05:44 +00:00
## Security Models
2014-02-08 00:41:03 +00:00
Requirements and recommendations for operating a secure Consul deployment may vary drastically depending on your
intended workloads, operating system, and environment. You can find detailed information about the various personas,
recommendations, requirements, and threats [here](/docs/security/security-models).
2014-02-08 00:41:03 +00:00
2020-11-04 22:05:44 +00:00
## ACLs
2014-02-20 20:26:50 +00:00
Consul provides an optional [Access Control List (ACL) system](/docs/security/acl) which can be used to control access
to data and APIs.
2014-02-20 20:26:50 +00:00
2020-11-04 22:05:44 +00:00
## Encryption
2014-02-08 00:41:03 +00:00
The Consul agent supports encrypting all of its network traffic. The exact method of encryption is described on the
[encryption security page](/docs/security/encryption). There are two separate encryption systems, one for gossip
traffic and one for HTTP + RPC.