1Confidential
Securing your Streaming
Data Platform
Operational considerations for a secure deployment
Andrew Lance, Vormetric
David Tucker, Confluent
2Confidential
Agenda
• Introduction to Apache Kafka and Confluent
• Overview of Vormetric and its policy-driven security solution
• Confluent Platform deployment architecture
• Security considerations and solutions
• Q&A
3Confidential
About Confluent and Apache Kafka
• Founded by the creators of Apache Kafka
• Founded September2014
• Technology developed while atLinkedIn
• 73%of active Kafka committers
Cheryl Dalrymple
CFO
Jay Kreps
CEO
Neha Narkhede
CTO, VP Engineering
Luanne Dauber
CMO
Leadership
Todd Barnett
VP WW Sales
Jabari Norton
VP Business Dev
4Confidential
Before: Many Ad Hoc Pipelines
5Confidential
After: Stream Data Platform with Kafka
 Distribute
d
 Fault
Tolerant
 Stores
Messages
Search Security
Fraud Detection Application
User Tracking Operational Logs Operational MetricsMySQL Cassandra Oracle
Hadoop Elastic Search Splunk
Data
Warehouse
Kafka
 Processes Streams
6Confidential
What is a Stream Data Platform?
Kafka
Stream Data
Platform
Search
NoSQL
RDBMS Monitoring
Stream ProcessingReal-time Analytics Data Warehouse
Apps
Apps
Hadoop
Synchronous Req/Response
0 – 100s ms
Near Real Time
> 100s ms
Offline Batch
> 1 hour
Build streaming applications
Deploy streaming applications at scale
Monitor and manage streaming applications
Common Kafka Use Cases
• Log data
• Database changes
• Sensors and device data
• Monitoring streams
• Call data records
• Real-time Monitoring
• Asynchronous applications
• Fraud and security
• Bridge to Cloud
7Confidential
People Using Kafka Today
Financial Services
Entertainment & Media
Consumer Tech
Travel & Leisure
Enterprise Tech
Telecom Retail
8 of the top 10 insurance companies &
7 of the top 10 banks in the Fortune 500
9 of the top 10 telcos
in the Fortune 500
6 of the top 10 travel companies in the Fortune
500
8Confidential
Confluent Platform: It’s Kafka ++
Feature Benefit Apache Kafka Confluent Platform 3.0 Confluent Enterprise 3.0
Apache Kafka
High throughput, low latency, high availability, secure distributed message
system
Kafka Connect
Advanced framework for connecting external sources
and destinations into Kafka
Java Client Provides easy integration into Java applications
Kafka Streams
Simple library that enables streaming application development within the
Kafka framework
Additional Clients Supports non-Java clients; C, C++, Python, Go, etc.
Rest Proxy
Provides universal access to Kafka from any network connected device via
HTTP
Schema Registry
Central registry for the format of Kafka data – guarantees all data is always
consumable
Pre-Built Connectors
HDFS, JDBC, Elastic and other connectors fully Certified
and fully supported by Confluent
Confluent Control Center Includes Connector Management and Stream Monitoring
Support
Connection and Monitoring command center provides advanced
functionality and control
Community Community 24x7x365
Free Free Subscription
12Confidential
Agenda
• Introduction to Apache Kafka and Confluent
• Overview of Vormetric and its policy-driven security solution
• Confluent Platform deployment architecture
• Security considerations and solutions
• Q&A
13
Vormetric Company Overview
13
Smart Cloud
Enterprise Plus
Global Customers
• Over 1,500 customers
• 17 of the Fortune 30
Most Security Conscious Brands
• Largest financial institutions
• Largest retail companies
• Major manufacturers
• Third party business service providers
• Government agencies
Cloud Service Providers Trust Vormetric
Business Drivers
• Executive mandates
o Data breach, insider threat
• Compliance
• SLAs
”With Vormetric, people have no idea it’s even
running. Vormetric Encryption also saved us at least
nine months of application rewrite effort, and its
installation was one of the easiest we’ve ever
experienced. ”
-Karl Mudra, CIO, Delta Dental of Missouri
15
Vormetric Data Security Platform
Application
Encryption
Vormetric
Data Security
Manager
Tokenization
Data
Masking
Key
Management
Security
Intelligence
Transparent
Encryption
Encryption
Gateway
KMaaS
16
How do we Encrypt?
Sensitive Data Protection Technologies
▌ SSL, SSH,
HTTPS, IPSEC
Data in Motion
Between Devices
Data at Rest
ENCRYPTION,TOKENIZATION,
DATA MASKING
Application/Database
File System
Disk
Application/Database
File System
Disk
17
Vormetric Transparent Encryption
Policy is used to restrict access
to sensitive data by user and
process information provided
by the Operating System.
Users
Application
Database
Operating System
FS Agent
File
Systems
Volume
Managers
SSL/TLS
*communication is only
required at system boot
18
Policy Example: Kafka
Policy Summary:
Only the specified Kafka user, using only the
verified Java process has full read/write &
automatic encrypt/decrypt access to the
protected topic data.
Privileged admins and root accounts are
allowed to manage the protected data
without seeing the sensitive contents.
All other data requests are denied and
audited.
# Resource User Process Action Effects
any Kafka User Java Read / Write Permit
Encrypt / Decrypt
(audit optional)
any Root Whitelisted
management
processes
Metadata
Only
Permit
Audit
any * * * Deny & Audit
1
2
3
1
2
3
Policy Benefits
 Data-at-rest encryption without changing configs
or application code.
 Remove custodial risk of privileged root users
19
Vormetric Security Intelligence
▌Log all access and attempted access to what
matters – the data
Reveals unauthorized access attempts to protected data
Find unusual access patterns
Identify compromised users, administrators and applications
Identify attacks on data such as APTs or malicious insiders
Prebuilt integrations: Splunk, ArcSight, Qradar, LogRhythm
20Confidential
Agenda
• Introduction to Apache Kafka and Confluent
• Overview of Vormetric and its policy-driven security solution
• Confluent Platform deployment architecture
• Security considerations and solutions
• Q&A
21Confidential
22Confidential
Kafka Topics
Topic == Distributed Commit Log
• Immutable (persisted to broker storage)
• Ordered
• Sequential Offset
• Partitioned (for scalability)
23Confidential
Kafka Deployment Architecture (simplified)
Zookeeper
Producer /
ConsumerProducer /
ConsumerProducer /
Consumer
Producer /
Consumer
Broker
Broker
Broker
Broker
Broker
Zookeeper
Zookeeper
• Zookeeper quorum
manages metadata
• Broker nodes manage (and
store) topic data
• Brokers and Clients access
ZK nodes
• Brokers communicate
directly for replication
(many-to-many)
• Broker and Zookeeper
nodes utilize local storage.
24Confidential
Kafka Deployment Architecture
Zookeeper
Producer /
ConsumerProducer /
ConsumerProducer /
Consumer
Producer /
Consumer
Broker
Broker
Broker
Broker
Broker
Zookeeper
Zookeeper
• Zookeeper quorum
manages metadata
• Broker nodes manage (and
store) topic data
• Brokers and Clients access
ZK nodes
• Brokers communicate
directly for replication
(many-to-many)
• Broker and Zookeeper
nodes utilize local storage.
25Confidential
Security Options
• Authentication
• SSL certificates support for 1-way (broker-only) or 2-way (broker and client) authentication
• SASL challenge/response support via Kerberos
• Mix-n-match : SSL for wire-level encryption, SASL for authentication
• Authorization
• Access Control Lists
• Operations: Read, Write, Create, Describe, ClusterAction, ALL
• Resources: Topic, Cluster, ConsumerGroup
• NOTE: ACL’s stored in zookeeper (along with all topic metadata)
• Data Encryption
• Vormetric policy management
26Confidential
Secure Deployments: Step by Step
• SSL Configuration
• Identify / deploy Certificate Authority
• Generate certificates (brokers, clients, or both)
• Share / Install certificates on brokers and/or clients
• Set Kafka broker properties to restrict communication to SSL channels
• Kerberos Configuration (SASL)
• Identify / deploy Kerberos principal
27Confidential
Secure Deployments: Step by Step (continued)
• Data Encryption
• Identify / Deploy Vormetric DSM
• Configure cluster brokers and ZK nodes into DSM domain
• Create and distributed keys (could be coordinated with keys used by brokers and clients)
• Define encryption policy and apply policy to the storage directories
• (test/dev best-practice: exclude metadata operations from policy enforcement)
• References:
• http://docs.confluent.io/3.0.0/kafka/security.html
• <vormetric>
28Confidential
Solution Benefits
• End-to-end security management … from Kafka topic to storage layer
• Robust access controls across all layers
• Fine grained access control
• Logical constraints on privileged users
• Alerting regarding in-band and out-of-band access attempts
29Confidential
Any questions ?
30Confidential
Thank You

More Related Content

PDF
End-End Security with Confluent Platform
PPTX
Hashicorp Vault ppt
PDF
PDF
Walking through the Spring Stack for Apache Kafka with Soby Chacko | Kafka S...
PPTX
Temporal intro and event loop
PDF
Credential store using HashiCorp Vault
PDF
Developing real-time data pipelines with Spring and Kafka
PDF
The Patterns of Distributed Logging and Containers
End-End Security with Confluent Platform
Hashicorp Vault ppt
Walking through the Spring Stack for Apache Kafka with Soby Chacko | Kafka S...
Temporal intro and event loop
Credential store using HashiCorp Vault
Developing real-time data pipelines with Spring and Kafka
The Patterns of Distributed Logging and Containers

What's hot (20)

PPTX
Alfresco Certificates
PPTX
Syslog
PDF
Azure DDoS Protection Standard
PPTX
AWS Simple Storage Service (s3)
PPTX
Secure your app with keycloak
PPTX
Keeping a Secret with HashiCorp Vault
PDF
Palo alto networks product overview
PPTX
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
PDF
Spark (Structured) Streaming vs. Kafka Streams
PPT
Active Directory
PDF
4 palo alto licenses
PPTX
Azure Storage
PDF
What's Coming In CloudStack 4.18
PDF
ELK in Security Analytics
PDF
Introduction to Event Driven Architecture
PDF
ksqlDB - Stream Processing simplified!
PPTX
Monitoramento de Aplicações Web Modernas com Zabbix
PDF
Distributed Tracing for Kafka with OpenTelemetry with Daniel Kim | Kafka Summ...
PDF
Temporal-Joins in Kafka Streams and ksqlDB | Matthias Sax, Confluent
PDF
SSH - Secure Shell
Alfresco Certificates
Syslog
Azure DDoS Protection Standard
AWS Simple Storage Service (s3)
Secure your app with keycloak
Keeping a Secret with HashiCorp Vault
Palo alto networks product overview
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Spark (Structured) Streaming vs. Kafka Streams
Active Directory
4 palo alto licenses
Azure Storage
What's Coming In CloudStack 4.18
ELK in Security Analytics
Introduction to Event Driven Architecture
ksqlDB - Stream Processing simplified!
Monitoramento de Aplicações Web Modernas com Zabbix
Distributed Tracing for Kafka with OpenTelemetry with Daniel Kim | Kafka Summ...
Temporal-Joins in Kafka Streams and ksqlDB | Matthias Sax, Confluent
SSH - Secure Shell
Ad

Viewers also liked (20)

PPTX
Building Large-Scale Stream Infrastructures Across Multiple Data Centers with...
PDF
Securing Kafka
PDF
Leveraging Mainframe Data for Modern Analytics
PPTX
Streaming in Practice - Putting Apache Kafka in Production
PDF
What's new in Confluent 3.2 and Apache Kafka 0.10.2
PPTX
Confluent building a real-time streaming platform using kafka streams and k...
PPTX
Microservices in the Apache Kafka Ecosystem
PPTX
Deep Dive into Apache Kafka
PDF
A Practical Guide to Selecting a Stream Processing Technology
PPTX
Apache Kafka Security
PPTX
Building an Event-oriented Data Platform with Kafka, Eric Sammer
PDF
Real-Time Analytics with Confluent and MemSQL
PDF
Power of the Log: LSM & Append Only Data Structures
PDF
Building Realtime Data Pipelines with Kafka Connect and Spark Streaming
PPTX
Real-time Data Integration with Kafka and Cassandra (Ewen Cheslack-Postava, C...
PDF
Confluent kafka meetupseattle jan2017
PDF
Confluent Enterprise Datasheet
PPTX
Building a real-time streaming platform using Kafka Connect + Kafka Streams
PPTX
Introducing Kafka Streams, the new stream processing library of Apache Kafka,...
PDF
Apache kafka-a distributed streaming platform
Building Large-Scale Stream Infrastructures Across Multiple Data Centers with...
Securing Kafka
Leveraging Mainframe Data for Modern Analytics
Streaming in Practice - Putting Apache Kafka in Production
What's new in Confluent 3.2 and Apache Kafka 0.10.2
Confluent building a real-time streaming platform using kafka streams and k...
Microservices in the Apache Kafka Ecosystem
Deep Dive into Apache Kafka
A Practical Guide to Selecting a Stream Processing Technology
Apache Kafka Security
Building an Event-oriented Data Platform with Kafka, Eric Sammer
Real-Time Analytics with Confluent and MemSQL
Power of the Log: LSM & Append Only Data Structures
Building Realtime Data Pipelines with Kafka Connect and Spark Streaming
Real-time Data Integration with Kafka and Cassandra (Ewen Cheslack-Postava, C...
Confluent kafka meetupseattle jan2017
Confluent Enterprise Datasheet
Building a real-time streaming platform using Kafka Connect + Kafka Streams
Introducing Kafka Streams, the new stream processing library of Apache Kafka,...
Apache kafka-a distributed streaming platform
Ad

Similar to Protecting your data at rest with Apache Kafka by Confluent and Vormetric (20)

PDF
A Tour of Apache Kafka
PDF
Apache Kafka 2.3 + Confluent Platform 5.3 => What's New?
PDF
What's new in confluent platform 5.4 online talk
PDF
Kafka Security 101 and Real-World Tips
PDF
Benefits of Stream Processing and Apache Kafka Use Cases
PDF
Team Collaboration in Kafka Clusters With Maria Berinde-Tampanariu | Current ...
PPTX
Being Ready for Apache Kafka - Apache: Big Data Europe 2015
PDF
Au delà des brokers, un tour de l’environnement Kafka | Florent Ramière
PDF
Paris FOD meetup - kafka security 101
PDF
Confluent Partner Tech Talk with Synthesis
PDF
Introduction to Apache Kafka and why it matters - Madrid
PPTX
Data Pipelines with Kafka Connect
PDF
Confluent Platform 5.4 + Apache Kafka 2.4 Overview (RBAC, Tiered Storage, Mul...
PDF
Kafka 2018 - Securing Kafka the Right Way
PDF
Beyond the brokers - Un tour de l'écosystème Kafka
PPTX
PPTX
Confluent and Syncsort Webinar August 2016
PDF
Apache Kafka® Security Overview
PDF
Why Build an Apache Kafka® Connector
PPTX
Westpac Bank Tech Talk 1: Dive into Apache Kafka
A Tour of Apache Kafka
Apache Kafka 2.3 + Confluent Platform 5.3 => What's New?
What's new in confluent platform 5.4 online talk
Kafka Security 101 and Real-World Tips
Benefits of Stream Processing and Apache Kafka Use Cases
Team Collaboration in Kafka Clusters With Maria Berinde-Tampanariu | Current ...
Being Ready for Apache Kafka - Apache: Big Data Europe 2015
Au delà des brokers, un tour de l’environnement Kafka | Florent Ramière
Paris FOD meetup - kafka security 101
Confluent Partner Tech Talk with Synthesis
Introduction to Apache Kafka and why it matters - Madrid
Data Pipelines with Kafka Connect
Confluent Platform 5.4 + Apache Kafka 2.4 Overview (RBAC, Tiered Storage, Mul...
Kafka 2018 - Securing Kafka the Right Way
Beyond the brokers - Un tour de l'écosystème Kafka
Confluent and Syncsort Webinar August 2016
Apache Kafka® Security Overview
Why Build an Apache Kafka® Connector
Westpac Bank Tech Talk 1: Dive into Apache Kafka

More from confluent (20)

PDF
Stream Processing Handson Workshop - Flink SQL Hands-on Workshop (Korean)
PPTX
Webinar Think Right - Shift Left - 19-03-2025.pptx
PDF
Migration, backup and restore made easy using Kannika
PDF
Five Things You Need to Know About Data Streaming in 2025
PDF
Data in Motion Tour Seoul 2024 - Keynote
PDF
Data in Motion Tour Seoul 2024 - Roadmap Demo
PDF
From Stream to Screen: Real-Time Data Streaming to Web Frontends with Conflue...
PDF
Confluent per il settore FSI: Accelerare l'Innovazione con il Data Streaming...
PDF
Data in Motion Tour 2024 Riyadh, Saudi Arabia
PDF
Build a Real-Time Decision Support Application for Financial Market Traders w...
PDF
Strumenti e Strategie di Stream Governance con Confluent Platform
PDF
Compose Gen-AI Apps With Real-Time Data - In Minutes, Not Weeks
PDF
Building Real-Time Gen AI Applications with SingleStore and Confluent
PDF
Unlocking value with event-driven architecture by Confluent
PDF
Il Data Streaming per un’AI real-time di nuova generazione
PDF
Unleashing the Future: Building a Scalable and Up-to-Date GenAI Chatbot with ...
PDF
Break data silos with real-time connectivity using Confluent Cloud Connectors
PDF
Building API data products on top of your real-time data infrastructure
PDF
Speed Wins: From Kafka to APIs in Minutes
PDF
Evolving Data Governance for the Real-time Streaming and AI Era
Stream Processing Handson Workshop - Flink SQL Hands-on Workshop (Korean)
Webinar Think Right - Shift Left - 19-03-2025.pptx
Migration, backup and restore made easy using Kannika
Five Things You Need to Know About Data Streaming in 2025
Data in Motion Tour Seoul 2024 - Keynote
Data in Motion Tour Seoul 2024 - Roadmap Demo
From Stream to Screen: Real-Time Data Streaming to Web Frontends with Conflue...
Confluent per il settore FSI: Accelerare l'Innovazione con il Data Streaming...
Data in Motion Tour 2024 Riyadh, Saudi Arabia
Build a Real-Time Decision Support Application for Financial Market Traders w...
Strumenti e Strategie di Stream Governance con Confluent Platform
Compose Gen-AI Apps With Real-Time Data - In Minutes, Not Weeks
Building Real-Time Gen AI Applications with SingleStore and Confluent
Unlocking value with event-driven architecture by Confluent
Il Data Streaming per un’AI real-time di nuova generazione
Unleashing the Future: Building a Scalable and Up-to-Date GenAI Chatbot with ...
Break data silos with real-time connectivity using Confluent Cloud Connectors
Building API data products on top of your real-time data infrastructure
Speed Wins: From Kafka to APIs in Minutes
Evolving Data Governance for the Real-time Streaming and AI Era

Recently uploaded (20)

PPTX
Hexagone difital twin solution in the desgining
PDF
Science is Not Enough SPLC2009 Richard P. Gabriel
PDF
SBOM Document Quality Guide - OpenChain SBOM Study Group
PDF
Software Development Company - swapdigit | Best Mobile App Development In India
PPTX
Advanced Heap Dump Analysis Techniques Webinar Deck
PDF
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
PPTX
oracle_ebs_12.2_project_cutoveroutage.pptx
PPTX
AI Tools Revolutionizing Software Development Workflows
PPTX
TRAVEL SUPPLIER API INTEGRATION | XML BOOKING ENGINE
PPTX
Comprehensive Guide to Digital Image Processing Concepts and Applications
PPTX
Phoenix Marketo User Group: Building Nurtures that Work for Your Audience. An...
PDF
DOWNLOAD—IOBit Uninstaller Pro Crack Download Free
PPTX
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
PDF
KidsTale AI Review - Create Magical Kids’ Story Videos in 2 Minutes.pdf
PPT
introduction of sql, sql commands(DD,DML,DCL))
PDF
IObit Driver Booster Pro Crack Latest Version Download
PDF
solman-7.0-ehp1-sp21-incident-management
PDF
IT Advisory Services | Alphavima Technologies – Microsoft Partner
PDF
OpenImageIO Virtual Town Hall - August 2025
PDF
OpenTimelineIO Virtual Town Hall - August 2025
Hexagone difital twin solution in the desgining
Science is Not Enough SPLC2009 Richard P. Gabriel
SBOM Document Quality Guide - OpenChain SBOM Study Group
Software Development Company - swapdigit | Best Mobile App Development In India
Advanced Heap Dump Analysis Techniques Webinar Deck
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
oracle_ebs_12.2_project_cutoveroutage.pptx
AI Tools Revolutionizing Software Development Workflows
TRAVEL SUPPLIER API INTEGRATION | XML BOOKING ENGINE
Comprehensive Guide to Digital Image Processing Concepts and Applications
Phoenix Marketo User Group: Building Nurtures that Work for Your Audience. An...
DOWNLOAD—IOBit Uninstaller Pro Crack Download Free
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
KidsTale AI Review - Create Magical Kids’ Story Videos in 2 Minutes.pdf
introduction of sql, sql commands(DD,DML,DCL))
IObit Driver Booster Pro Crack Latest Version Download
solman-7.0-ehp1-sp21-incident-management
IT Advisory Services | Alphavima Technologies – Microsoft Partner
OpenImageIO Virtual Town Hall - August 2025
OpenTimelineIO Virtual Town Hall - August 2025

Protecting your data at rest with Apache Kafka by Confluent and Vormetric

  • 1. 1Confidential Securing your Streaming Data Platform Operational considerations for a secure deployment Andrew Lance, Vormetric David Tucker, Confluent
  • 2. 2Confidential Agenda • Introduction to Apache Kafka and Confluent • Overview of Vormetric and its policy-driven security solution • Confluent Platform deployment architecture • Security considerations and solutions • Q&A
  • 3. 3Confidential About Confluent and Apache Kafka • Founded by the creators of Apache Kafka • Founded September2014 • Technology developed while atLinkedIn • 73%of active Kafka committers Cheryl Dalrymple CFO Jay Kreps CEO Neha Narkhede CTO, VP Engineering Luanne Dauber CMO Leadership Todd Barnett VP WW Sales Jabari Norton VP Business Dev
  • 5. 5Confidential After: Stream Data Platform with Kafka  Distribute d  Fault Tolerant  Stores Messages Search Security Fraud Detection Application User Tracking Operational Logs Operational MetricsMySQL Cassandra Oracle Hadoop Elastic Search Splunk Data Warehouse Kafka  Processes Streams
  • 6. 6Confidential What is a Stream Data Platform? Kafka Stream Data Platform Search NoSQL RDBMS Monitoring Stream ProcessingReal-time Analytics Data Warehouse Apps Apps Hadoop Synchronous Req/Response 0 – 100s ms Near Real Time > 100s ms Offline Batch > 1 hour Build streaming applications Deploy streaming applications at scale Monitor and manage streaming applications Common Kafka Use Cases • Log data • Database changes • Sensors and device data • Monitoring streams • Call data records • Real-time Monitoring • Asynchronous applications • Fraud and security • Bridge to Cloud
  • 7. 7Confidential People Using Kafka Today Financial Services Entertainment & Media Consumer Tech Travel & Leisure Enterprise Tech Telecom Retail 8 of the top 10 insurance companies & 7 of the top 10 banks in the Fortune 500 9 of the top 10 telcos in the Fortune 500 6 of the top 10 travel companies in the Fortune 500
  • 8. 8Confidential Confluent Platform: It’s Kafka ++ Feature Benefit Apache Kafka Confluent Platform 3.0 Confluent Enterprise 3.0 Apache Kafka High throughput, low latency, high availability, secure distributed message system Kafka Connect Advanced framework for connecting external sources and destinations into Kafka Java Client Provides easy integration into Java applications Kafka Streams Simple library that enables streaming application development within the Kafka framework Additional Clients Supports non-Java clients; C, C++, Python, Go, etc. Rest Proxy Provides universal access to Kafka from any network connected device via HTTP Schema Registry Central registry for the format of Kafka data – guarantees all data is always consumable Pre-Built Connectors HDFS, JDBC, Elastic and other connectors fully Certified and fully supported by Confluent Confluent Control Center Includes Connector Management and Stream Monitoring Support Connection and Monitoring command center provides advanced functionality and control Community Community 24x7x365 Free Free Subscription
  • 9. 12Confidential Agenda • Introduction to Apache Kafka and Confluent • Overview of Vormetric and its policy-driven security solution • Confluent Platform deployment architecture • Security considerations and solutions • Q&A
  • 10. 13 Vormetric Company Overview 13 Smart Cloud Enterprise Plus Global Customers • Over 1,500 customers • 17 of the Fortune 30 Most Security Conscious Brands • Largest financial institutions • Largest retail companies • Major manufacturers • Third party business service providers • Government agencies Cloud Service Providers Trust Vormetric Business Drivers • Executive mandates o Data breach, insider threat • Compliance • SLAs ”With Vormetric, people have no idea it’s even running. Vormetric Encryption also saved us at least nine months of application rewrite effort, and its installation was one of the easiest we’ve ever experienced. ” -Karl Mudra, CIO, Delta Dental of Missouri
  • 11. 15 Vormetric Data Security Platform Application Encryption Vormetric Data Security Manager Tokenization Data Masking Key Management Security Intelligence Transparent Encryption Encryption Gateway KMaaS
  • 12. 16 How do we Encrypt? Sensitive Data Protection Technologies ▌ SSL, SSH, HTTPS, IPSEC Data in Motion Between Devices Data at Rest ENCRYPTION,TOKENIZATION, DATA MASKING Application/Database File System Disk Application/Database File System Disk
  • 13. 17 Vormetric Transparent Encryption Policy is used to restrict access to sensitive data by user and process information provided by the Operating System. Users Application Database Operating System FS Agent File Systems Volume Managers SSL/TLS *communication is only required at system boot
  • 14. 18 Policy Example: Kafka Policy Summary: Only the specified Kafka user, using only the verified Java process has full read/write & automatic encrypt/decrypt access to the protected topic data. Privileged admins and root accounts are allowed to manage the protected data without seeing the sensitive contents. All other data requests are denied and audited. # Resource User Process Action Effects any Kafka User Java Read / Write Permit Encrypt / Decrypt (audit optional) any Root Whitelisted management processes Metadata Only Permit Audit any * * * Deny & Audit 1 2 3 1 2 3 Policy Benefits  Data-at-rest encryption without changing configs or application code.  Remove custodial risk of privileged root users
  • 15. 19 Vormetric Security Intelligence ▌Log all access and attempted access to what matters – the data Reveals unauthorized access attempts to protected data Find unusual access patterns Identify compromised users, administrators and applications Identify attacks on data such as APTs or malicious insiders Prebuilt integrations: Splunk, ArcSight, Qradar, LogRhythm
  • 16. 20Confidential Agenda • Introduction to Apache Kafka and Confluent • Overview of Vormetric and its policy-driven security solution • Confluent Platform deployment architecture • Security considerations and solutions • Q&A
  • 18. 22Confidential Kafka Topics Topic == Distributed Commit Log • Immutable (persisted to broker storage) • Ordered • Sequential Offset • Partitioned (for scalability)
  • 19. 23Confidential Kafka Deployment Architecture (simplified) Zookeeper Producer / ConsumerProducer / ConsumerProducer / Consumer Producer / Consumer Broker Broker Broker Broker Broker Zookeeper Zookeeper • Zookeeper quorum manages metadata • Broker nodes manage (and store) topic data • Brokers and Clients access ZK nodes • Brokers communicate directly for replication (many-to-many) • Broker and Zookeeper nodes utilize local storage.
  • 20. 24Confidential Kafka Deployment Architecture Zookeeper Producer / ConsumerProducer / ConsumerProducer / Consumer Producer / Consumer Broker Broker Broker Broker Broker Zookeeper Zookeeper • Zookeeper quorum manages metadata • Broker nodes manage (and store) topic data • Brokers and Clients access ZK nodes • Brokers communicate directly for replication (many-to-many) • Broker and Zookeeper nodes utilize local storage.
  • 21. 25Confidential Security Options • Authentication • SSL certificates support for 1-way (broker-only) or 2-way (broker and client) authentication • SASL challenge/response support via Kerberos • Mix-n-match : SSL for wire-level encryption, SASL for authentication • Authorization • Access Control Lists • Operations: Read, Write, Create, Describe, ClusterAction, ALL • Resources: Topic, Cluster, ConsumerGroup • NOTE: ACL’s stored in zookeeper (along with all topic metadata) • Data Encryption • Vormetric policy management
  • 22. 26Confidential Secure Deployments: Step by Step • SSL Configuration • Identify / deploy Certificate Authority • Generate certificates (brokers, clients, or both) • Share / Install certificates on brokers and/or clients • Set Kafka broker properties to restrict communication to SSL channels • Kerberos Configuration (SASL) • Identify / deploy Kerberos principal
  • 23. 27Confidential Secure Deployments: Step by Step (continued) • Data Encryption • Identify / Deploy Vormetric DSM • Configure cluster brokers and ZK nodes into DSM domain • Create and distributed keys (could be coordinated with keys used by brokers and clients) • Define encryption policy and apply policy to the storage directories • (test/dev best-practice: exclude metadata operations from policy enforcement) • References: • http://docs.confluent.io/3.0.0/kafka/security.html • <vormetric>
  • 24. 28Confidential Solution Benefits • End-to-end security management … from Kafka topic to storage layer • Robust access controls across all layers • Fine grained access control • Logical constraints on privileged users • Alerting regarding in-band and out-of-band access attempts

Editor's Notes

  • #8: 35% of the Fortune 500 7 out of 10 of the top 10 Fortune 500 global banks 8 of the top 10 insurance companies 9 of the 10 top telecom companies 6 of the top 10 travel companies
  • #10: Talking Points: 1. Companies are faced with very complex environments with difficult to manage parts. They want to organize large amounts of data into a well managed, unified stream data platform. 2. Customers use Confluent Platform for realtime, batch operational and analytical purposes. Take away the costly and labor intensive process of developing proprietary data replication practices and allow the Confluent Platform to make data available in realtime streams. 3. Our platform has Kafka at the core (same build as open source Kafka but with additional bug fixes applied) with components and tools that allow you successfully deploy to production, including: Kafka Schema management layer (ensures data compatibility across applications Java and Rest clients that integrate with our schema management layer Kafka Connect Kafka Streams Authentication and Authorization Confluent Control Center
  • #14: 1,300 customers, including many of the largest enterprise customers trust us. IBM and Symantec also deliver our products through OEM arrangements.
  • #17: Separate Application and Database TDE/Columnar
  • #18: Vormetric Encryption Expert Agents are software agents that insert above the file system logical volume layers. The agents evaluate any attempt to access the protected data and apply predetermined policies to either grant or deny such attempts. This is a proven high-performance solution that transparently integrates into: Linux, UNIX, and Windows operating systems   to protect data in physical, virtual, and cloud environments. across all leading applications, databases, operating systems, and storage devices.
  • #26: SASL : simply authentication and Security Layer