Chapter 10. Securing Kafka


A secure deployment of Streams for Apache Kafka might encompass one or more of the following security measures:

Encryption

Streams for Apache Kafka supports Transport Layer Security (TLS), a protocol for encrypted communication.

  • Communication is always encrypted between Streams for Apache Kafka components.
  • To set up TLS-encrypted communication between Kafka and clients, you configure listeners in the Kafka custom resource.
Authentication

Kafka listeners use authentication to ensure a secure client connection to the Kafka cluster. Clients can also be configured for mutual authentication. Security credentials are created and managed by the Cluster and User Operator.

Supported authentication mechanisms:

  • mTLS authentication (on listeners with TLS-enabled encryption)
  • SASL SCRAM-SHA-512
  • OAuth 2.0 token based authentication
  • Custom authentication (supported by Kafka)
Authorization

Authorization controls the operations that are permitted on Kafka brokers by specific clients or users.

Supported authorization mechanisms:

  • Simple authorization using ACL rules
  • OAuth 2.0 authorization (if you are using OAuth 2.0 token-based authentication)
  • Open Policy Agent (OPA) authorization
  • Custom authorization (supported by Kafka)
Federal Information Processing Standards (FIPS)
Streams for Apache Kafka is designed to run on FIPS-enabled Kubernetes clusters to ensure data security and system interoperability. For more information about the NIST validation program and validated modules, see Cryptographic Module Validation Program on the NIST website.
Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat