[Live Workshop] Streams on Tour: Hands-On Deep Dive into Confluent | Register Now

Presentation

Attacking (and Defending) Apache Kafka

« Kafka Summit London 2024

When attacking any system, taking control of its central nervous system is the first step in infiltrating the core infrastructure and gaining control over its vital functions. Translating this to organization data, a clear target is Apache Kafka, the data hub increasingly adopted for mission-critical systems. This session explores the topic of attacking and defending Apache Kafka, shedding light on potential threats, attack vectors, and countermeasures.

Initially we’ll focus on understanding the potential attack surface of Apache Kafka. Defining attackers' objectives and vectors, including unauthorized access, injection attacks, misconfigurations, and distributed denial-of-service (DDoS). With the fundamental threat surface and actors understood, we’ll shift our focus to defensive strategies that protect Apache Kafka deployments. We will discuss and demonstrate best practices and security measures including ACLs, encryption, and monitoring that can help reduce the potential attacks.

Whether you’re directly managing Apache Kafka or it’s part of your data infrastructure, this talk will give you an idea of the security threats involved and how to be ready for them.

Related Links

How Confluent Completes Apache Kafka eBook

Leverage a cloud-native service 10x better than Apache Kafka

Confluent Developer Center

Spend less on Kafka with Confluent, come see how