Secure your data by using Data Protection Policies, Data Masking and ACL Management
Sometimes it seems like we’re still living in the Dark Ages when it comes to securing data. This is especially true when it comes to streaming applications, where the potential to send large amounts of sensitive data through the network, non-stop, can be overwhelming for IT security administrators.
Unfortunately, I’ve seen far too many companies and agencies deal with streaming data security in MC Hammer style-by strictly locking down access to it. I’ve seen it locked down so tightly that developers cannot access the data for development and troubleshooting issues. Analysts cannot access it either, which reduces the ROI on real-time data.
When access to data streams is blocked or limited, it means that not only the developers but the business in general is flying blind. Applications take longer to build and are infinitely less robust and useful. And real-time data takes longer to be put to use in new ways or on an ad hoc basis within the organization, which lowers the company’s agility.
Ironically, with necessity being the mother of invention, developers sometimes work around the security barriers by simply logging the data in order to gain insight for troubleshooting. This results in the data ending up in Elasticsearch, which is accessible to all. Ouch!
A data policy comprises four parts, namely:
These policies are applied on key, value and headers (converted to string) directly after decoding the data. In the case of a decoding failure, no raw data is sent for troubleshooting.
You can assign rights and roles to your data teams and individual engineers that give fine-grain access to data and functions in Kadeck for individual data streams or entire environments such as production and development. These can also be assigned automatically via groups in Directory Services.
Kadeck follows the philosophy of self-service teams, which means that all access rights required by application development teams can be restricted so that they can operate independently in their own team space.
This gives teams access only to the data streams and consumer groups they need for their project, and allows them to create and manage ACLs for their own application without seeing the ACLs of other teams.
Every time a user accesses data or executes functions in Kadeck, the activity is stored in Kadeck's audit log. This way, you won't miss anything and you'll always be on the safe side.
For a more in depth look on how to set up your Data Protection Policies visit our Support center: Data Protection Policies and Data Masking