2. How do we ensure
easy to maintain security in
a cluster shared by many teams?
Photo by Chris Lawton on Unsplash
3. Copyright: mimacom ag, 2019. All rights reserved.
What is
Kafka security?
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
Photo by Silas Köhler on Unsplash
4. Copyright: mimacom ag, 2019. All rights reserved.
What is
Kafka security?
Encryption
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
Photo by Silas Köhler on Unsplash
5. Copyright: mimacom ag, 2019. All rights reserved.
What is
Kafka security?
Encryption
Authentication
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
Photo by Silas Köhler on Unsplash
6. Copyright: mimacom ag, 2019. All rights reserved.
Photo by Silas Köhler on Unsplash
What is
Kafka security?
Encryption
Authentication Authorization
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
8. Copyright: mimacom ag, 2019. All rights reserved.
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
AccessControlLists
“User alice can write to topic clickStream”
“User bob cannot read topic cardEvents”
9. Copyright: mimacom ag, 2019. All rights reserved.
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
AccessControlLists
“User alice can write to topic clickStream”
10. Copyright: mimacom ag, 2019. All rights reserved.
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
AccessControlLists
“User alice can write to topic clickStream”
11. Copyright: mimacom ag, 2019. All rights reserved.
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
AccessControlLists
“User alice can write to topic clickStream”
12. Photo by Nik Shuliahin on Unsplash
This approach has many
pitfalls
13. Photo by Nik Shuliahin on Unsplash
This approach has many
pitfalls
Complex
14. Photo by Nik Shuliahin on Unsplash
This approach has many
pitfalls
Complex
Tedious
15. Photo by Nik Shuliahin on Unsplash
This approach has many
pitfalls
Complex
Error prone
Tedious
16. Photo by Nik Shuliahin on Unsplash
This approach has many
pitfalls
Complex
Error prone
Tedious
Difficult
to secure
17. Photo by Nik Shuliahin on Unsplash
This approach has many
pitfalls
Complex
Difficult
to audit
Error prone
Tedious
Difficult
to secure
18. Photo by Nik Shuliahin on Unsplash
This approach has many
pitfalls
Complex
Difficult
to audit
Error prone
Tedious
Difficult
to secure
Kill me
please...
19. Copyright: mimacom ag, 2019. All rights reserved.
Welcome the
Kafka
Security
Manager
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
Photo by Srh Hrbch on Unsplash
50. ... but don’t worry,
they will be!
Photo by Rowen Smith on Unsplash
51. Copyright: mimacom ag, 2019. All rights reserved.
Questions?
Meet me at the mimacom booth
THANKS!
11.11.2019 / Confluent Stream - Zurich / @ntrpivan
CREDITS:
- Unsplash and SlideGo for backgrounds and resources
- Carbon for the code snippets
ivan.g.ortolan@gmail.com
/ntrp
/ntrp
/in/goivan
@ntrpivan