{"id":346,"date":"2025-08-21T00:34:47","date_gmt":"2025-08-21T00:34:47","guid":{"rendered":"https:\/\/devsecopsschool.com\/blog\/?p=346"},"modified":"2025-08-21T00:40:05","modified_gmt":"2025-08-21T00:40:05","slug":"complete-implementation-guide-for-securing-confluent-kafka","status":"publish","type":"post","link":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/","title":{"rendered":"Complete Implementation Guide for Securing Confluent Kafka"},"content":{"rendered":"\n<p>Implementing \u201ccomplete security\u201d for Confluent Kafka involves multiple layers and controls. Here is a comprehensive scope of work for such an implementation:<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">1. <strong>Identity and Access Management<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enable Role-Based Access Control (RBAC):<\/strong>\n<ul class=\"wp-block-list\">\n<li>Assign granular roles (e.g., ClusterAdmin, DeveloperRead) to users and service accounts at topic, cluster, and group levels.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Configure Access Control Lists (ACLs):<\/strong>\n<ul class=\"wp-block-list\">\n<li>Define and enforce topic\/group-level read\/write permissions for users, applications, and services.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Integrate with Identity Providers:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Use OAuth 2.0 SSO with providers like Okta, Keycloak, or Entra ID for centralized identity and access control.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">2. <strong>Authentication<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enable Secure Authentication Mechanisms:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Deploy SASL\/SCRAM, SASL\/OAUTH, or mutual TLS (mTLS).<\/li>\n\n\n\n<li>Disable or avoid plaintext listeners\u2014always require authentication and encrypt credentials.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">3. <strong>Authorization<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implement Principle of Least Privilege:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Review and restrict ACLs so every user\/service has only the minimal necessary permissions.<\/li>\n\n\n\n<li>Document and review ACLs regularly and deny by default (allow only if permission exists).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4. <strong>Encryption<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data-in-Transit Encryption:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Enforce TLS 1.2+ for all client\u2013broker and broker\u2013broker communications, with strong cipher suites.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Data-at-Rest Encryption:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Enable encryption for persisted messages, integrating with KMS solutions like AWS KMS to manage and rotate encryption keys.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">5. <strong>Network Security<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Restrict Network Access:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Use IP allowlists or network policies (IP filtering) to limit Kafka cluster access to trusted locations.<\/li>\n\n\n\n<li>Deploy PrivateLink (AWS) or Private Service Connect (GCP) for secure, private cloud network connectivity.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Firewall and Segmentation:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Implement internal firewalls and network segmentation for all cluster components.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>To restrict access to your <strong>Confluent Kafka Cluster<\/strong> so that it is accessible <strong>only from your OFFICE, VPN Network, AWS VPC, and Google Cloud network<\/strong>, you must configure several security features provided by Confluent:<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">1. Use <strong>IP Filtering<\/strong> on Confluent Cloud<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Confluent Cloud supports configuring an <strong>IP Allowlist<\/strong> (IP filtering) to restrict which source IP addresses can access the cluster.<\/li>\n\n\n\n<li>You will need to:\n<ul class=\"wp-block-list\">\n<li>Collect the public IP ranges (in CIDR notation) for your office, VPN, AWS VPC, and Google Cloud network.<\/li>\n\n\n\n<li>Create <strong>IP Groups<\/strong> for each network segment (e.g., &#8220;Office IPs&#8221;, &#8220;VPN IPs&#8221;, &#8220;AWS VPC&#8221;, &#8220;Google Cloud VPC&#8221;).<\/li>\n\n\n\n<li>Combine those IP groups into an <strong>IP Filter<\/strong> policy that grants access only for listed IPs\/networks.<\/li>\n\n\n\n<li>Apply this filter at the Kafka cluster or organizational level in Confluent Cloud.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Note:<\/strong> As of the latest docs, IP Filtering applies primarily to Confluent Cloud resource and management APIs, not directly to Kafka topic data. Ensure you review the current product limitations.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">2. Use <strong>Private Networking Features<\/strong> for Direct VPC Integration<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For direct and private connectivity (rather than public internet), Confluent Cloud supports:\n<ul class=\"wp-block-list\">\n<li><strong>AWS PrivateLink<\/strong> for AWS VPCs.<\/li>\n\n\n\n<li><strong>Google Cloud Private Service Connect<\/strong> for Google Cloud VPCs.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>These let you establish private endpoints, so traffic between your VPCs and Kafka never leaves the cloud provider\u2019s backbone network.<\/li>\n\n\n\n<li>You can combine private networking for AWS\/Google with public IP allowlist for your office and VPN if those are not in the cloud.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">3. Combine IP Filtering and Private Networking<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For <strong>office\/VPN access<\/strong>, set up IP allowlists as above.<\/li>\n\n\n\n<li>For <strong>cloud-native workloads<\/strong> within your AWS or Google Cloud VPC, use cloud private networking integrations (i.e., PrivateLink, Private Service Connect).<\/li>\n\n\n\n<li>This dual setup ensures:\n<ul class=\"wp-block-list\">\n<li>Internet-based\/conventional traffic is allowed only from your permitted offices\/VPN IPs.<\/li>\n\n\n\n<li>Cloud-based workloads use secure direct network paths.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"summary-steps\">Summary Steps<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>List the public IP\/CIDR ranges for all locations to be allowed.<\/li>\n\n\n\n<li>Set up <strong>IP Allowlist<\/strong> in Confluent Cloud for these ranges.<\/li>\n\n\n\n<li>For AWS\/GCP workloads, configure <strong>Private Networking<\/strong> (PrivateLink\/Private Service Connect).<\/li>\n\n\n\n<li>Set up Kafka <strong>ACLs<\/strong> and RBAC for finer access control.<\/li>\n\n\n\n<li><strong>Test<\/strong>: Attempt to access from inside\/outside allowed ranges to verify restrictions work as intended.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">6. <strong>Secret Management<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protect Sensitive Configurations:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Use vault solutions (e.g., HashiCorp Vault, AWS Secrets Manager) to manage passwords, API keys, and certificates securely.<\/li>\n\n\n\n<li>Regularly rotate credentials.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">7. <strong>Monitoring and Auditing<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enable and Retain Audit Logs:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Track authentication, authorization, config changes, and admin operations.<\/li>\n\n\n\n<li>Integrate logs with SIEM systems for proactive monitoring and alerting.<\/li>\n\n\n\n<li>Monitor security metrics: failed auth, unusual access patterns, privilege escalation attempts.<\/li>\n\n\n\n<li>Retain logs per compliance requirements (e.g., more than 7 days).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">8. <strong>Patching and Hardening<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Keep All Components Up to Date:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Apply patches and upgrades to Kafka, connectors, and dependencies.<\/li>\n\n\n\n<li>Perform regular reviews and vulnerability scans.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">9. <strong>End-to-End Encryption (Optional\/Advanced)<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implement E2E Message Encryption:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Encrypt message payloads before sending to Kafka, so only intended consumers can decrypt, adding another layer beyond Kafka\u2019s built-in encryption.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">10. <strong>Operational Security and Training<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Restrict Admin Tool Access:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Limit access to Confluent Control Center, CLI, and management endpoints to authorized personnel.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Develop Incident Response Procedures:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Document steps for detecting, responding to, and recovering from security incidents.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Conduct Security Awareness Training:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Educate teams on secure usage policies and threat awareness.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Implementing \u201ccomplete security\u201d for Confluent Kafka involves multiple layers and controls. Here is a comprehensive scope of work for such an implementation: 1. Identity and Access Management 2. Authentication 3. Authorization 4. Encryption 5. Network Security To restrict access to your Confluent Kafka Cluster so that it is accessible only from your OFFICE, VPN Network, &#8230; <a title=\"Complete Implementation Guide for Securing Confluent Kafka\" class=\"read-more\" href=\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\" aria-label=\"Read more about Complete Implementation Guide for Securing Confluent Kafka\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-346","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Complete Implementation Guide for Securing Confluent Kafka - DevSecOps School<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Complete Implementation Guide for Securing Confluent Kafka - DevSecOps School\" \/>\n<meta property=\"og:description\" content=\"Implementing \u201ccomplete security\u201d for Confluent Kafka involves multiple layers and controls. Here is a comprehensive scope of work for such an implementation: 1. Identity and Access Management 2. Authentication 3. Authorization 4. Encryption 5. Network Security To restrict access to your Confluent Kafka Cluster so that it is accessible only from your OFFICE, VPN Network, ... Read more\" \/>\n<meta property=\"og:url\" content=\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\" \/>\n<meta property=\"og:site_name\" content=\"DevSecOps School\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-21T00:34:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-21T00:40:05+00:00\" \/>\n<meta name=\"author\" content=\"Rajesh Kumar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rajesh Kumar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\"},\"author\":{\"name\":\"Rajesh Kumar\",\"@id\":\"http:\/\/devsecopsschool.com\/blog\/#\/schema\/person\/e414b640530af05905c2162ba4259f6c\"},\"headline\":\"Complete Implementation Guide for Securing Confluent Kafka\",\"datePublished\":\"2025-08-21T00:34:47+00:00\",\"dateModified\":\"2025-08-21T00:40:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\"},\"wordCount\":773,\"commentCount\":0,\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\",\"url\":\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\",\"name\":\"Complete Implementation Guide for Securing Confluent Kafka - DevSecOps School\",\"isPartOf\":{\"@id\":\"http:\/\/devsecopsschool.com\/blog\/#website\"},\"datePublished\":\"2025-08-21T00:34:47+00:00\",\"dateModified\":\"2025-08-21T00:40:05+00:00\",\"author\":{\"@id\":\"http:\/\/devsecopsschool.com\/blog\/#\/schema\/person\/e414b640530af05905c2162ba4259f6c\"},\"breadcrumb\":{\"@id\":\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/devsecopsschool.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Complete Implementation Guide for Securing Confluent Kafka\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/devsecopsschool.com\/blog\/#website\",\"url\":\"http:\/\/devsecopsschool.com\/blog\/\",\"name\":\"DevSecOps School\",\"description\":\"DevSecOps Redefined\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/devsecopsschool.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/devsecopsschool.com\/blog\/#\/schema\/person\/e414b640530af05905c2162ba4259f6c\",\"name\":\"Rajesh Kumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"http:\/\/devsecopsschool.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b02d9501846e698677d30ae5e3d8648980cdd60ebaab000d5001f4612c9f0ff7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b02d9501846e698677d30ae5e3d8648980cdd60ebaab000d5001f4612c9f0ff7?s=96&d=mm&r=g\",\"caption\":\"Rajesh Kumar\"},\"sameAs\":[\"http:\/\/devsecopsschool.com\/blog\"],\"url\":\"http:\/\/devsecopsschool.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Complete Implementation Guide for Securing Confluent Kafka - DevSecOps School","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/","og_locale":"en_US","og_type":"article","og_title":"Complete Implementation Guide for Securing Confluent Kafka - DevSecOps School","og_description":"Implementing \u201ccomplete security\u201d for Confluent Kafka involves multiple layers and controls. Here is a comprehensive scope of work for such an implementation: 1. Identity and Access Management 2. Authentication 3. Authorization 4. Encryption 5. Network Security To restrict access to your Confluent Kafka Cluster so that it is accessible only from your OFFICE, VPN Network, ... Read more","og_url":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/","og_site_name":"DevSecOps School","article_published_time":"2025-08-21T00:34:47+00:00","article_modified_time":"2025-08-21T00:40:05+00:00","author":"Rajesh Kumar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rajesh Kumar","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/#article","isPartOf":{"@id":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/"},"author":{"name":"Rajesh Kumar","@id":"http:\/\/devsecopsschool.com\/blog\/#\/schema\/person\/e414b640530af05905c2162ba4259f6c"},"headline":"Complete Implementation Guide for Securing Confluent Kafka","datePublished":"2025-08-21T00:34:47+00:00","dateModified":"2025-08-21T00:40:05+00:00","mainEntityOfPage":{"@id":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/"},"wordCount":773,"commentCount":0,"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/","url":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/","name":"Complete Implementation Guide for Securing Confluent Kafka - DevSecOps School","isPartOf":{"@id":"http:\/\/devsecopsschool.com\/blog\/#website"},"datePublished":"2025-08-21T00:34:47+00:00","dateModified":"2025-08-21T00:40:05+00:00","author":{"@id":"http:\/\/devsecopsschool.com\/blog\/#\/schema\/person\/e414b640530af05905c2162ba4259f6c"},"breadcrumb":{"@id":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/devsecopsschool.com\/blog\/complete-implementation-guide-for-securing-confluent-kafka\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/devsecopsschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Complete Implementation Guide for Securing Confluent Kafka"}]},{"@type":"WebSite","@id":"http:\/\/devsecopsschool.com\/blog\/#website","url":"http:\/\/devsecopsschool.com\/blog\/","name":"DevSecOps School","description":"DevSecOps Redefined","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/devsecopsschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"http:\/\/devsecopsschool.com\/blog\/#\/schema\/person\/e414b640530af05905c2162ba4259f6c","name":"Rajesh Kumar","image":{"@type":"ImageObject","inLanguage":"en","@id":"http:\/\/devsecopsschool.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b02d9501846e698677d30ae5e3d8648980cdd60ebaab000d5001f4612c9f0ff7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b02d9501846e698677d30ae5e3d8648980cdd60ebaab000d5001f4612c9f0ff7?s=96&d=mm&r=g","caption":"Rajesh Kumar"},"sameAs":["http:\/\/devsecopsschool.com\/blog"],"url":"http:\/\/devsecopsschool.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":4,"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/346\/revisions"}],"predecessor-version":[{"id":352,"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/346\/revisions\/352"}],"wp:attachment":[{"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=346"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/devsecopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}