Kafka is used as a centralized event data store, receiving data from various sources, such as micro services and databases.
In any enterprise deployment of Kafka, security should be looked at from five paradigms. They are as follows:
- Authentication: This establishes who the client(producer or consumer) is that trying to use Kafka services. Kafka has support for the Kerberos authentication mechanism.
- Authorization: This establishes what kind of permission the client (producer or consumer) has on topics. Kafka has support for ACLs for authorization. Apache tools, such as Ranger, can also be used for Kafka authorization.
- Wire encryption: This ensures that any sensitive data traveling over the network is encrypted and not in plain text. Kafka has support for SSL communication between the client (producer or consumer) and the broker. Even inter-broker...