StreamNative Cloud provides comprehensive security features to help you manage access control, data protection, and network security, ensuring that your data is secure and your resources are protected. This section describes the key areas of managing security on StreamNative Cloud, including authentication, access control, data protection, and activity monitoring.

Manage authentication

Authentication ensures that only authorized users and applications can access your StreamNative Cloud resources. This includes managing user accounts, service accounts, and integrating with external identity providers for Single Sign-On (SSO), OAuth/OIDC, mTLS, and more.

See Authenticate to StreamNative Cloud for more details.

Control access to StreamNative Cloud resources

Use authorization mechanisms, such as role-based access control (RBAC), to control access to StreamNative Cloud resources. This ensures only authorized entities can access specific resources and perform certain actions.

See Control access to StreamNative Cloud for more details.

Encrypt and protect data

Data encryption protects your data at rest and in transit, to help you comply with data protection regulations and ensure the security of your sensitive information. StreamNative Cloud supports various encryption methods, including TLS encryption for data in transit, encryption at rest for data stored, and end-to-end encryption to protect your most sensitive data.

See Encrypt and protect data on StreamNative Cloud for more details.

Monitor and audit activities

Monitoring activities helps tracking and auditing access and actions performed on your StreamNative Cloud resources. This helps you detect and respond to potential security incidents and ensure compliance with security policies.

See Audit log for more details.

Manage secrets

Secret management enables you to securely store and manage sensitive data such as passwords, tokens, and private keys. You can create secrets and reference them in your computing workloads, including connectors, functions, and Flink jobs, without exposing the sensitive values directly in your configurations.

See Work with Secrets for more details.