End-to-End Encryption with Confluent Cloud

Blank
Shadow
End-to-End Encryption with Confluent Cloud

Download the White Paper

Our Recommended Approach to Designing
for “End-to-End Encryption” into Kafka Clients

When an enterprise subscribes to Confluent Cloud™ services, their data is encrypted in motion and at rest. This document outlines our recommended approach to designing for “end-to-end encryption” into Kafka clients, in other words, for encryption both in motion and at rest. It is based on a symmetric encryption scheme. It is intended for engineering design teams who seek to implement end-to-end message payload encryption on the Confluent Cloud platform.

Author

Gwen_ATO5C9719-762475-edited

Jason Gustafson, Software Engineer, Confluent

Jason Gustafson is an engineer at Confluent and a member of the Apache Kafka PMC. He is one of the most active contributors to Kafka and has made many improvements including support for exactly-once semantics and core enhancements to the replication protocol.

サイトのご利用状況を把握しユーザーエクスペリエンスの改善へとつなげるため、当サイトでは Cookie (クッキー) を使用しています。Cookie についての詳細を確認するには、また Cookie 設定の変更をご希望の場合は、こちらをクリックしてください。閲覧を続行することにより、当社の Cookie 使用に同意されたものとみなされます。