|
| 1 | +// file included in the following: |
| 2 | +// |
| 3 | +// assembly-built-in-filters.adoc |
| 4 | + |
| 5 | +[id='assembly-record-encryption-filter-{context}'] |
| 6 | += Record Encryption filter |
| 7 | + |
| 8 | +[role="_abstract"] |
| 9 | +Kroxylicious's Record Encryption filter enhances the security of Kafka messages. |
| 10 | +The filter uses industry-standard cryptographic techniques to apply encryption to Kafka messages, ensuring the confidentiality of data stored in the Kafka Cluster. |
| 11 | +Kroxylicious centralizes topic-level encryption, ensuring streamlined encryption across Kafka clusters. |
| 12 | + |
| 13 | +There are three steps to using the filter: |
| 14 | + |
| 15 | +1. Setting up a Key Management System (KMS). |
| 16 | +2. Establishing the encryption keys within the KMS that will be used to encrypt the topics. |
| 17 | +3. Configuring the filter within Kroxylicious. |
| 18 | + |
| 19 | +The filter integrates with a Key Management Service (KMS), which has ultimate responsibility for the safe storage of sensitive key material. |
| 20 | +The filter relies on a KMS implementation. |
| 21 | +Currently, Kroxylicious integrates with either HashiCorp Vault or AWS Key Management Service. |
| 22 | +You can provide implementations for your specific KMS systems. |
| 23 | +Additional KMS support will be added based on demand. |
| 24 | + |
| 25 | +//overview of the record encryption process |
| 26 | +include::../modules/record-encryption/con-record-encryption-overview.adoc[leveloffset=+1] |
| 27 | +//setting up hashicorp vault |
| 28 | +include::assembly-hashicorp-vault.adoc[leveloffset=+1] |
| 29 | +//setting up AWS KMS |
| 30 | +include::assembly-aws-kms.adoc[leveloffset=+1] |
| 31 | +ifdef::include-fortanix-dsm-kms[] |
| 32 | +include::assembly-fortanix-dsm.adoc[leveloffset=+1] |
| 33 | +endif::[] |
| 34 | +//configuring the record encryption filter |
| 35 | +include::../modules/record-encryption/proc-configuring-record-encryption-filter.adoc[leveloffset=+1] |
0 commit comments