The Elastic integration enables security and compliance teams to automate User Access Reviews (UAR) by syncing user access data directly from Elastic. This helps organizations review which users have access to Elastic and maintain accurate access records for compliance monitoring.
Key Capabilities
User Access Monitoring: Retrieve Elastic user accounts for access review workflows
Organization Visibility: Monitor users associated with your Elastic Cloud organization
Compliance Monitoring: Maintain visibility into system access for audit readiness
This integration supports User Access Review workflows, helping demonstrate compliance with access control policies.
Prerequisites & Data Access
Elastic Access Requirements
You must have Admin privileges in your Elastic Cloud organization.
You must obtain your Elastic Cloud Organization ID.
You must generate an Elastic API key with appropriate access.
Drata Role Requirements
To create or modify connections, you must have one of the following Drata roles with write access: Admin, Workspace Manager, or DevOps Engineer
Access Reviewers can view the connection page but cannot create or modify connections
Permissions & Data Table
Permission / Access | Why It’s Needed |
Elastic API Key | Authenticates the integration and allows Drata to retrieve user access data |
Organization ID | Identifies the Elastic Cloud organization being connected |
Step-by-Step Setup
Step 1: Retrieve Your Elastic Organization ID
Log in to your Elastic Cloud account.
Select your profile icon in the top-right corner.
Select Organization to open the Organization page.
Locate and copy your Organization ID.
Expected outcome:
You have copied the Elastic Cloud Organization ID required for the integration.
Step 2: Create an Elastic API Key
From the Organization page, select the API Keys tab.
Select Create API Key.
Enter a name for the API key.
Set an expiration date for the key.
Enable Organization Owner permissions.
Create the API key and copy the generated API key value.
Important:
Record the expiration date so you can update the connection before the key expires.
Expected outcome:
You have created and stored the Elastic API key required for the integration.
Step 3: Connect Elastic in Drata
Log in to Drata → go to the Connections page.
Navigate to your Available Connections.
Search for and start the Elastic connection process.
Enter the following information when prompted:
Elastic Organization ID
Elastic API Key
Expected outcome:
Elastic is successfully connected and user access data begins syncing to Drata.
Important Notes
Authentication method: The Elastic integration uses an API key generated from Elastic Cloud.
API key expiration: If the API key expires, you must create a new key and update the connection in Drata.
Network restrictions: If your organization uses a Web Application Firewall (WAF), ensure required Drata IP addresses are allowlisted so the connection can be established.
