Apache Kafka Security Best Practices

preview_player
Показать описание

In order to build a secure Kafka installation, you need to securely authenticate your users. Whether you are using Kerberos (SASL/GSSAPI), SASL/PLAIN, SCRAM, or OAUTH. Verifying your users can authenticate, and non-users can’t, is a primary requirement for any connected system.

But authentication is only one part of the security story. We also need to address other areas. Kafka added support for fine-grained access control using ACLs with a pluggable authorizer several years ago. Over time, this was extended to support prefixed ACLs to make ACLs more manageable in large organizations. Now on its second generation authorizer, Kafka is easily extendable to support other forms of authorization, like integrating with a corporate LDAP server to provide group or role-based access control.

Even if you’ve set up your system to use secure authentication and each user is authorized using a series of ACLs if the data is viewable by anyone listening, how secure is your system? That’s where encryption comes in. Using TLS Kafka can encrypt your data-in-transit.

Security has gone from a nice-to-have to being a requirement of any modern-day system. Kafka has followed a similar path from zero security to having a flexible and extensible system that helps companies of any size pick the right security path for them.

Be sure to also check out the newest Apache Kafka Security course on Confluent Developer for an in-depth explanation along with other recommendations.

EPISODE LINKS

TIMESTAMPS
0:00 - Intro
2:20 - Kafka: The Definitive Guide v2
3:41 - Kafka as a service
10:10 - Securing Kafka – the development process
12:56 - Authentication
18:23 - Authorization
29:09 - Audit logs
35:14 - Encryption
36:40 - It's a wrap

ABOUT CONFLUENT

#security #apachekafka #kafka #confluent
Рекомендации по теме
Комментарии
Автор

Sou vítima de Kafka, o que posso fazer? A quem pedir ajuda please

virginiagoncalves