Confluent Cloud Security
- 21-authenticating-users-and-applications
- 22-authorizing-using-rbac-and-acls
- 23-understanding-encryption
- 24-auditing-and-monitoring
- 25-maintaining-compliance-and-privacy
- ip-filtering
Documentation Outline
- Overview
- Manage Authentication
- Overview
- Manage User Identities
- Manage Workload Identities
- Overview
- Manage Workload Identities
- Manage Service Accounts and API Keys
- Manage OAuth/OIDC Identity Providers
- Manage mTLS Identity Providers
- Control Access
- Encrypt and Protect Data
- Overview
- Manage Data in Transit With TLS
- Encrypt Using Self-Managed Encryption Keys
- Overview
- Use Self-Managed Encryption Keys on AWS
- Use Self-Managed Encryption Keys on Azure
- Use Self-Managed Encryption Keys on Google Cloud
- Manage Key Policies
- Use Self-Managed Encryption Keys with Tableflow
- Use Pre-BYOK-API-V1 Self-Managed Encryption Keys
- Use Confluent CLI for Self-Managed Encryption Keys
- Use BYOK API for Self-Managed Encryption Keys
- Revoke Access to Data at Rest
- Best Practices
- Troubleshoot Key Policy Issues
- Encrypt Using Client-Side Field Level Encryption
- Encrypt Using Client-Side Payload Encryption
- Monitor Activity
- Concepts
- Audit Log Event Categories
- Understand Audit Log Records
- Audit Log Event Schema
- Auditable Event Methods
- Access Transparency
- Connector
- Custom Connector Plugin
- Flink
- Flink Authentication and Authorization
- IP Filter Authorization
- Kafka Cluster Authentication and Authorization
- Kafka Cluster Management and Operations
- ksqlDB Cluster Authentication and Authorization
- Networking
- Notifications Service
- OAuth/OIDC Identity Provider and Identity Pool
- Organization
- Role-based Access Control (RBAC)
- Schema Registry Authentication and Authorization
- Schema Registry Management and Operations
- Tableflow Data Plane
- Tableflow Control Plane
- Access and Consume Audit Log Records
- Access Transparency
- Retain Audit Logs
- Best Practices
- Troubleshoot
- Access Management Tutorial
Links
- Course: Introduction to Confluent Cloud Security
- Confluent Cloud Security | Secure Apache Kafka® with Confluent - YouTube
- Secure Data Streams with Confluent Cloud's Security Controls
- Building-Trust-With-Confluent-Cloud-WP.pdf
- Kafka Security 101 | Secure and Maintain Your Apache Kafka® Systems - YouTube
- Automatically Secure Kafka Clusters
- Manage security in Confluent Platform | Confluent Documentation