{"version":"1.0","provider_name":"DevSecOps School","provider_url":"http:\/\/devsecopsschool.com\/blog","author_name":"Rajesh Kumar","author_url":"http:\/\/devsecopsschool.com\/blog\/author\/admin\/","title":"Complete Implementation Guide for Securing Confluent Kafka - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"IsAirT5UjN\"><a href=\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\">Complete Implementation Guide for Securing Confluent Kafka<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/embed\/#?secret=IsAirT5UjN\" width=\"600\" height=\"338\" title=\"&#8220;Complete Implementation Guide for Securing Confluent Kafka&#8221; &#8212; DevSecOps School\" data-secret=\"IsAirT5UjN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=http:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Implementing \u201ccomplete security\u201d for Confluent Kafka involves multiple layers and controls. Here is a comprehensive scope of work for such an implementation: 1. Identity and Access Management 2. Authentication 3. Authorization 4. Encryption 5. Network Security To restrict access to your Confluent Kafka Cluster so that it is accessible only from your OFFICE, VPN Network, ... Read more"}