SlideShare a Scribd company logo
Building a Scalable, Modern Cyber Intelligence
Platform with Apache Kafka®
Presenter: Jac Noel
Kafka Summit Europe – May 2021
IT@Intel 2
Notices and Disclaimers
This presentation is for informationalpurposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Intel, the Intel logo, Intel Core, Intel Optane and Xeon are trademarks of Intel Corporation or its subsidiaries.
Other names and brands may be claimed as the propertyof others.
Copyright © 2021, Intel Corporation.All rights reserved.
2
IT@Intel 3
Jac Noel has over 25 years of Information Technology and
Cyber Security experience across the military, government,
and corporate environments.
He started his technical career in the United States Air Force
supporting defense intelligence systems for the AF mission in
EMEA. He has spent the past 20 years serving in various
technical roles in Intel’s IT organization. He’s currently serving
as a Security Solutions Architect focusing on security
intelligence and response capabilities. He’s the lead architect
for Intel’s Cyber Intelligence Platform (CIP), which is a next-
gen architecture combining a data lake, message bus, stream
processing, machine-learning, orchestration, and workflow
automation into a single platform.
Jac holds a Bachelor of Science degree from Chico State
University and has earned numerous professional certifications
over the years, including CISSP, GCFW, CCNA, and MCSE.
He’s also a proud inventor, patent holder, and author of several
white papers.
Jac Noel
Security Solutions Architect
IT@Intel 4
Intel Information Security’s Mission
4
Our mission is to keep Intel
legal and secure.
This mission is never
“done.”
Best ways to measure our success:
 Reduce Mean Time to Detect (MTTD)
and Mean Time to Respond (MTTR)
 Identify and implement more effective
preventative controls
 Improve our agility to respond to new and
changing threats and regulations
IT@Intel 5
API Data Virtualization Layer
Information Security
Business Role
Incident Response
Vulnerability
Management
Compliance
Enforcement
Data Protection
Threat Intelligence
Common Work
Surface Layer
Query
Search
Reporting
Dashboards
Visualizations
Analytics Workbench
Workflow Automation
Infrastructure
Clients
Servers
Network
Infrastructure
Other Data
Sources
Data
Blueprint
Security
Data Lake
Control Layer
Security Event Management
User Event Behavior Analytics
Vulnerability Scanning
Threat Intelligence
Advanced Analytics
Deceptions
Intrusion Detection
Firewalls
Intrusion Prevention
Endpoint Detection and Response
Data Loss Prevention
Intrusion Scanning
Connectors
Enterprise Security Message Bus
Topics, Publish/Subscribe, Transform, Enrich, Filter, Join
CyberIntelligencePlatform-ReferenceArchitecture
A platform that supports our entire InfoSec organization
5
IT@Intel 6
High Performance Compute & Storage
BU
Partners
IT
Ops
Partners
Confluent Platform
Message Bus
Stream Processing
Cyber Intelligence Platform - Solution Stack
Our partners produce and consume data, too!
6
7
Cyber Intelligence Platform – Solution Stack (cont)
Built with industry leading technologies Splunk and Kafka
IT@Intel 8
The Power of the Kafka Bus
No Message Bus
 Point to point, complex
 Slow to implement
 Increased technical debt due to tightly-coupled solutions and brittle integrations
 No orchestration (custom-code it, multiple times)
 No transformation (custom-code it, multiple times)
 Slow to move data between multiple capabilities
 Harder to monitor and govern
With Message Bus
 Data Transformation (enrich, aggregate, normalize)
 Near real-time integration (streaming)
 Resilient, robust, scalable, available
 Orchestrate multiple activities in one place
 Cross-capability consumption
 Platform independent, plug and play
 Apps loosely coupled but tightly integrated
 Common architectural element for large enterprises
App App App App App App
App App App App App App
App App App App App App
App App App App App App
Message Bus
Abstraction, Resiliency, Scalability, Availability
Transform Orchestrate
IT@Intel 9
Improving Data Availability with Confluent MRC
9
Single Cluster
Data Center 3
Producers Consumers
Streaming Apps
Consumers Producers
Data Center 1
Leaders (ISR)
Zookeeper 1
Zookeeper 2
Broker n
Broker 2
Broker 1
Broker 3
…
Mirroring
Data Center 2
Observers
Zookeeper 3
Zookeeper 4
Broker n
Broker 2
Broker 1
Broker 3
…
Zookeeper 5
IT@Intel 10
Asynchronous Replication for Faster Recovery
10
Single Cluster
Data Center 3
Producers Consumers
Streaming Apps
Consumers Producers
Data Center 1
Zookeeper 1
Zookeeper 2
Broker n
Broker 2
Broker 1
Broker 3
…
Mirroring
Data Center 2
Leaders (ISR)
Zookeeper 3
Zookeeper 4
Broker n
Broker 2
Broker 1
Broker 3
…
Zookeeper 5
Confluent Platform with Multi Region Clusters
IT@Intel 11
TLS
Confluent Control
Center
LDAP/TLS Schema
Registry
SASL
Digest MD5
Admin User SASL
TLS Digest MD5
Zookeeper 1
Broker Cluster
TLS
Zookeeper 2
Connectors
SASL
Digest MD5 Zookeeper 3
Authorization
ACL Zookeeper
Broker 1
Producers
(Client App) Broker 2
TLS Stream Processor 1
Broker 3 Stream Processor 2
… TLS
Consumers Stream Processor 3
Broker n
(Client App) TLS
Stream
Processor
Securing Our Confluent Platform
11
IT@Intel 12
Monitoring Our Kafka Clusters
12
Our C3 server requires Intel 2nd gen Xeon processors for high-performance compute
and Intel Optane DC SSDs for low latency and high-endurance storage.
Kafka
Admins
All-in-One Kafka Cluster
Confluent Control Center Server (C3)
(Broker, ZooKeeper, Connect, Kafka Streams)
Kafka Streams App
“Stream Processor”
C3 Web App
Consumers UI
Trouble-
shooting
Producers
Producers
Kafka
Production
Monitoring Data
Metrics Data
Metrics
Reporter
Monitoring
Interceptor
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Topics
Consumers
Metrics Topic
Monitoring Topic Transformed Topics
Health
Monitoring
IT@Intel 13
Managing Vulnerabilities with Stream Processing
13
Confluent Platform
Producers Kafka Streams API
Stream Processing
Kafka Bus
Vulnerability
Topic Filter
Vulnerabilities by
Business Unit
IP Address
Range Topic
Join Asset
Asset Inventory
Topic
Ownership with Consumers
Vulnerable Assets
BU #1’s
Vulnerabilities Topic
Data Lake
BU Partners
BU #2’s
Vulnerabilities Topic
IT Partners
BU #3’s
Vulnerabilities Topic
SIEM
Vulnerabilities
with Owners Topic Enforcement
SOAR
Scanning
Engine
IP Address
Management
Asset Management
Inventory
Vulnerabilities
Asset configuration, CVEs, CVSS
IP Address Ranges
Ownership, Business Units
Asset Ownership
IT@Intel 14
Kafka Maturity
Timeline
14
Acquire once-consume many
Integration efficiency
Remove the noise, and
duplication
Cost savings for downstream consumers
Join multiple sources
Contextually rich + clean data downstream
ACQUIRE
DATA
FILTERING
ENRICHMENT
SUMMARIZATION
ADVANCED Autonomous Actions
e.g. Cluster analysis, ML
Produce summary statistics
State information, performance benefit
and downstream cost savings
IT@Intel 15
Kafka By The Numbers
15
20+
TB/DAY
135+
32+
CONSUMERS DATA
SOURCES
320+
TOPICS
90+
PRODUCERS
>18B
EVENTS/DAY
Kafka
by the
Numbers
~8 trillion events indexed by Splunk in 2020
IT@Intel 16
Kafka - Benefits to Intel
16
KAFKA LEADERSHIP
THROUGH CONFLUENT
EXPERTISE
GENERATES
CONTEXTUALLY RICH
DATA
MODERN
ARCHITECTURE WITH
THRIVING COMMUNITY
GLOBAL
SCALE AND REACH
OPERATE ON DATA
IN STREAM
ECONOMIES
OF SCALE
REDUCE TECHNICAL
DEBT AND
DOWNSTREAM COSTS
ALWAYS
ON
IT@Intel 17
People + Technology + Data
Transforming How Information Security Works
17
Reduced Risk
to Intel
Greater Insight
and Tighter
Collaboration
Highly
Integrated
and
Automated
A Force
Multiplier
Faster
Detection and
Response
Speaking a
Common
Language
A Platform
for the Future
IT@Intel 18
Additional Resources
18
Solution Brief and
Reference
Architecture
19
IT@Intel
Questions & Answers

More Related Content

What's hot (20)

PPTX
Stream processing IoT time series data with Kafka & InfluxDB | Al Sargent, In...
HostedbyConfluent
 
PPTX
IoT Data Streaming - Why MQTT and Kafka are a match made in heaven | Dominik ...
HostedbyConfluent
 
PDF
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
HostedbyConfluent
 
PDF
Mind the App: How to Monitor Your Kafka Streams Applications | Bruno Cadonna,...
HostedbyConfluent
 
PDF
Fan-out, fan-in & the multiplexer: Replication recipes for global platform di...
HostedbyConfluent
 
PDF
Availability of Kafka - Beyond the Brokers | Andrew Borley and Emma Humber, IBM
HostedbyConfluent
 
PDF
Streaming Data Analytics with ksqlDB and Superset | Robert Stolz, Preset
HostedbyConfluent
 
PDF
Distributed Data Storage & Streaming for Real-time Decisioning Using Kafka, S...
HostedbyConfluent
 
PDF
Data in Motion: Building Stream-Based Architectures with Qlik Replicate & Kaf...
HostedbyConfluent
 
PDF
Supercharge Your Real-time Event Processing with Neo4j's Streams Kafka Connec...
HostedbyConfluent
 
PDF
Lessons from the field: Catalog of Kafka Deployments | Joseph Niemiec, Cloudera
HostedbyConfluent
 
PDF
Introducing Events and Stream Processing into Nationwide Building Society (Ro...
confluent
 
PDF
How a distributed graph analytics platform uses Apache Kafka for data ingesti...
HostedbyConfluent
 
PDF
Kafka at the core of an AIOps pipeline | Sunanda Kommula, Selector.ai and Ala...
HostedbyConfluent
 
PDF
5 lessons learned for successful migration to Confluent cloud | Natan Silinit...
HostedbyConfluent
 
PDF
Building Stateful applications on Streaming Platforms | Premjit Mishra, Dell ...
HostedbyConfluent
 
PDF
Kafka Excellence at Scale – Cloud, Kubernetes, Infrastructure as Code (Vik Wa...
HostedbyConfluent
 
PDF
Achieve Sub-Second Analytics on Apache Kafka with Confluent and Imply
confluent
 
PPTX
Cloud-Based Event Stream Processing Architectures and Patterns with Apache Ka...
HostedbyConfluent
 
PPTX
Navigating the obdervability storm with Kafka | Jose Manuel Cristobal, Adidas
HostedbyConfluent
 
Stream processing IoT time series data with Kafka & InfluxDB | Al Sargent, In...
HostedbyConfluent
 
IoT Data Streaming - Why MQTT and Kafka are a match made in heaven | Dominik ...
HostedbyConfluent
 
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
HostedbyConfluent
 
Mind the App: How to Monitor Your Kafka Streams Applications | Bruno Cadonna,...
HostedbyConfluent
 
Fan-out, fan-in & the multiplexer: Replication recipes for global platform di...
HostedbyConfluent
 
Availability of Kafka - Beyond the Brokers | Andrew Borley and Emma Humber, IBM
HostedbyConfluent
 
Streaming Data Analytics with ksqlDB and Superset | Robert Stolz, Preset
HostedbyConfluent
 
Distributed Data Storage & Streaming for Real-time Decisioning Using Kafka, S...
HostedbyConfluent
 
Data in Motion: Building Stream-Based Architectures with Qlik Replicate & Kaf...
HostedbyConfluent
 
Supercharge Your Real-time Event Processing with Neo4j's Streams Kafka Connec...
HostedbyConfluent
 
Lessons from the field: Catalog of Kafka Deployments | Joseph Niemiec, Cloudera
HostedbyConfluent
 
Introducing Events and Stream Processing into Nationwide Building Society (Ro...
confluent
 
How a distributed graph analytics platform uses Apache Kafka for data ingesti...
HostedbyConfluent
 
Kafka at the core of an AIOps pipeline | Sunanda Kommula, Selector.ai and Ala...
HostedbyConfluent
 
5 lessons learned for successful migration to Confluent cloud | Natan Silinit...
HostedbyConfluent
 
Building Stateful applications on Streaming Platforms | Premjit Mishra, Dell ...
HostedbyConfluent
 
Kafka Excellence at Scale – Cloud, Kubernetes, Infrastructure as Code (Vik Wa...
HostedbyConfluent
 
Achieve Sub-Second Analytics on Apache Kafka with Confluent and Imply
confluent
 
Cloud-Based Event Stream Processing Architectures and Patterns with Apache Ka...
HostedbyConfluent
 
Navigating the obdervability storm with Kafka | Jose Manuel Cristobal, Adidas
HostedbyConfluent
 

Similar to Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | Jac Noel, Intel Corp (20)

PDF
Give Your Confluent Platform Superpowers! (Sandeep Togrika, Intel and Bert Ha...
HostedbyConfluent
 
PDF
Evolving Hadoop for the Data Society
ciphertext
 
PDF
Intel APJ Enterprise Day - Keynote by RK Hiremane
IntelAPAC
 
PDF
Leveraging Mainframe Data for Modern Analytics
confluent
 
PDF
Fast Data – Fast Cars: Wie Apache Kafka die Datenwelt revolutioniert
confluent
 
PPTX
Possibility Thinking about Cloud Computing
Society of Women Engineers
 
PDF
Preparing the Data Center for the Internet of Things
Intel IoT
 
PPTX
SIEM Modernization: Build a Situationally Aware Organization with Apache Kafka®
confluent
 
PPTX
Splunk for Industrial Data and the Internet of Things
Splunk
 
PPTX
Keine Angst vorm Dinosaurier: Mainframe-Integration und -Offloading mit Confl...
Precisely
 
PPTX
SplunkLive! - Splunk for Security
Splunk
 
PPTX
Splunk for ITOA Breakout Session
Splunk
 
PPTX
Shaping a Digital Vision
DataWorks Summit/Hadoop Summit
 
PDF
ING CoreIntel - collect and process network logs across data centers in near ...
Evention
 
PPTX
Core intel
Krzysztof Adamski
 
PPTX
AWS & Intel Webinar Series - Accelerating AI Research
Intel® Software
 
PPTX
Building a Security Information and Event Management platform at Travis Per...
Splunk
 
PDF
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
NetworkCollaborators
 
PPTX
Splunk for Security Breakout Session
Splunk
 
PPTX
Operational Security Intelligence
Splunk
 
Give Your Confluent Platform Superpowers! (Sandeep Togrika, Intel and Bert Ha...
HostedbyConfluent
 
Evolving Hadoop for the Data Society
ciphertext
 
Intel APJ Enterprise Day - Keynote by RK Hiremane
IntelAPAC
 
Leveraging Mainframe Data for Modern Analytics
confluent
 
Fast Data – Fast Cars: Wie Apache Kafka die Datenwelt revolutioniert
confluent
 
Possibility Thinking about Cloud Computing
Society of Women Engineers
 
Preparing the Data Center for the Internet of Things
Intel IoT
 
SIEM Modernization: Build a Situationally Aware Organization with Apache Kafka®
confluent
 
Splunk for Industrial Data and the Internet of Things
Splunk
 
Keine Angst vorm Dinosaurier: Mainframe-Integration und -Offloading mit Confl...
Precisely
 
SplunkLive! - Splunk for Security
Splunk
 
Splunk for ITOA Breakout Session
Splunk
 
Shaping a Digital Vision
DataWorks Summit/Hadoop Summit
 
ING CoreIntel - collect and process network logs across data centers in near ...
Evention
 
Core intel
Krzysztof Adamski
 
AWS & Intel Webinar Series - Accelerating AI Research
Intel® Software
 
Building a Security Information and Event Management platform at Travis Per...
Splunk
 
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
NetworkCollaborators
 
Splunk for Security Breakout Session
Splunk
 
Operational Security Intelligence
Splunk
 
Ad

More from HostedbyConfluent (20)

PDF
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
 
PDF
Renaming a Kafka Topic | Kafka Summit London
HostedbyConfluent
 
PDF
Evolution of NRT Data Ingestion Pipeline at Trendyol
HostedbyConfluent
 
PDF
Ensuring Kafka Service Resilience: A Dive into Health-Checking Techniques
HostedbyConfluent
 
PDF
Exactly-once Stream Processing with Arroyo and Kafka
HostedbyConfluent
 
PDF
Fish Plays Pokemon | Kafka Summit London
HostedbyConfluent
 
PDF
Tiered Storage 101 | Kafla Summit London
HostedbyConfluent
 
PDF
Building a Self-Service Stream Processing Portal: How And Why
HostedbyConfluent
 
PDF
From the Trenches: Improving Kafka Connect Source Connector Ingestion from 7 ...
HostedbyConfluent
 
PDF
Future with Zero Down-Time: End-to-end Resiliency with Chaos Engineering and ...
HostedbyConfluent
 
PDF
Navigating Private Network Connectivity Options for Kafka Clusters
HostedbyConfluent
 
PDF
Apache Flink: Building a Company-wide Self-service Streaming Data Platform
HostedbyConfluent
 
PDF
Explaining How Real-Time GenAI Works in a Noisy Pub
HostedbyConfluent
 
PDF
TL;DR Kafka Metrics | Kafka Summit London
HostedbyConfluent
 
PDF
A Window Into Your Kafka Streams Tasks | KSL
HostedbyConfluent
 
PDF
Mastering Kafka Producer Configs: A Guide to Optimizing Performance
HostedbyConfluent
 
PDF
Data Contracts Management: Schema Registry and Beyond
HostedbyConfluent
 
PDF
Code-First Approach: Crafting Efficient Flink Apps
HostedbyConfluent
 
PDF
Debezium vs. the World: An Overview of the CDC Ecosystem
HostedbyConfluent
 
PDF
Beyond Tiered Storage: Serverless Kafka with No Local Disks
HostedbyConfluent
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
 
Renaming a Kafka Topic | Kafka Summit London
HostedbyConfluent
 
Evolution of NRT Data Ingestion Pipeline at Trendyol
HostedbyConfluent
 
Ensuring Kafka Service Resilience: A Dive into Health-Checking Techniques
HostedbyConfluent
 
Exactly-once Stream Processing with Arroyo and Kafka
HostedbyConfluent
 
Fish Plays Pokemon | Kafka Summit London
HostedbyConfluent
 
Tiered Storage 101 | Kafla Summit London
HostedbyConfluent
 
Building a Self-Service Stream Processing Portal: How And Why
HostedbyConfluent
 
From the Trenches: Improving Kafka Connect Source Connector Ingestion from 7 ...
HostedbyConfluent
 
Future with Zero Down-Time: End-to-end Resiliency with Chaos Engineering and ...
HostedbyConfluent
 
Navigating Private Network Connectivity Options for Kafka Clusters
HostedbyConfluent
 
Apache Flink: Building a Company-wide Self-service Streaming Data Platform
HostedbyConfluent
 
Explaining How Real-Time GenAI Works in a Noisy Pub
HostedbyConfluent
 
TL;DR Kafka Metrics | Kafka Summit London
HostedbyConfluent
 
A Window Into Your Kafka Streams Tasks | KSL
HostedbyConfluent
 
Mastering Kafka Producer Configs: A Guide to Optimizing Performance
HostedbyConfluent
 
Data Contracts Management: Schema Registry and Beyond
HostedbyConfluent
 
Code-First Approach: Crafting Efficient Flink Apps
HostedbyConfluent
 
Debezium vs. the World: An Overview of the CDC Ecosystem
HostedbyConfluent
 
Beyond Tiered Storage: Serverless Kafka with No Local Disks
HostedbyConfluent
 
Ad

Recently uploaded (20)

PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Python basic programing language for automation
DanialHabibi2
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Python basic programing language for automation
DanialHabibi2
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 

Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | Jac Noel, Intel Corp

  • 1. Building a Scalable, Modern Cyber Intelligence Platform with Apache Kafka® Presenter: Jac Noel Kafka Summit Europe – May 2021
  • 2. IT@Intel 2 Notices and Disclaimers This presentation is for informationalpurposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel, the Intel logo, Intel Core, Intel Optane and Xeon are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the propertyof others. Copyright © 2021, Intel Corporation.All rights reserved. 2
  • 3. IT@Intel 3 Jac Noel has over 25 years of Information Technology and Cyber Security experience across the military, government, and corporate environments. He started his technical career in the United States Air Force supporting defense intelligence systems for the AF mission in EMEA. He has spent the past 20 years serving in various technical roles in Intel’s IT organization. He’s currently serving as a Security Solutions Architect focusing on security intelligence and response capabilities. He’s the lead architect for Intel’s Cyber Intelligence Platform (CIP), which is a next- gen architecture combining a data lake, message bus, stream processing, machine-learning, orchestration, and workflow automation into a single platform. Jac holds a Bachelor of Science degree from Chico State University and has earned numerous professional certifications over the years, including CISSP, GCFW, CCNA, and MCSE. He’s also a proud inventor, patent holder, and author of several white papers. Jac Noel Security Solutions Architect
  • 4. IT@Intel 4 Intel Information Security’s Mission 4 Our mission is to keep Intel legal and secure. This mission is never “done.” Best ways to measure our success:  Reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR)  Identify and implement more effective preventative controls  Improve our agility to respond to new and changing threats and regulations
  • 5. IT@Intel 5 API Data Virtualization Layer Information Security Business Role Incident Response Vulnerability Management Compliance Enforcement Data Protection Threat Intelligence Common Work Surface Layer Query Search Reporting Dashboards Visualizations Analytics Workbench Workflow Automation Infrastructure Clients Servers Network Infrastructure Other Data Sources Data Blueprint Security Data Lake Control Layer Security Event Management User Event Behavior Analytics Vulnerability Scanning Threat Intelligence Advanced Analytics Deceptions Intrusion Detection Firewalls Intrusion Prevention Endpoint Detection and Response Data Loss Prevention Intrusion Scanning Connectors Enterprise Security Message Bus Topics, Publish/Subscribe, Transform, Enrich, Filter, Join CyberIntelligencePlatform-ReferenceArchitecture A platform that supports our entire InfoSec organization 5
  • 6. IT@Intel 6 High Performance Compute & Storage BU Partners IT Ops Partners Confluent Platform Message Bus Stream Processing Cyber Intelligence Platform - Solution Stack Our partners produce and consume data, too! 6
  • 7. 7 Cyber Intelligence Platform – Solution Stack (cont) Built with industry leading technologies Splunk and Kafka
  • 8. IT@Intel 8 The Power of the Kafka Bus No Message Bus  Point to point, complex  Slow to implement  Increased technical debt due to tightly-coupled solutions and brittle integrations  No orchestration (custom-code it, multiple times)  No transformation (custom-code it, multiple times)  Slow to move data between multiple capabilities  Harder to monitor and govern With Message Bus  Data Transformation (enrich, aggregate, normalize)  Near real-time integration (streaming)  Resilient, robust, scalable, available  Orchestrate multiple activities in one place  Cross-capability consumption  Platform independent, plug and play  Apps loosely coupled but tightly integrated  Common architectural element for large enterprises App App App App App App App App App App App App App App App App App App App App App App App App Message Bus Abstraction, Resiliency, Scalability, Availability Transform Orchestrate
  • 9. IT@Intel 9 Improving Data Availability with Confluent MRC 9 Single Cluster Data Center 3 Producers Consumers Streaming Apps Consumers Producers Data Center 1 Leaders (ISR) Zookeeper 1 Zookeeper 2 Broker n Broker 2 Broker 1 Broker 3 … Mirroring Data Center 2 Observers Zookeeper 3 Zookeeper 4 Broker n Broker 2 Broker 1 Broker 3 … Zookeeper 5
  • 10. IT@Intel 10 Asynchronous Replication for Faster Recovery 10 Single Cluster Data Center 3 Producers Consumers Streaming Apps Consumers Producers Data Center 1 Zookeeper 1 Zookeeper 2 Broker n Broker 2 Broker 1 Broker 3 … Mirroring Data Center 2 Leaders (ISR) Zookeeper 3 Zookeeper 4 Broker n Broker 2 Broker 1 Broker 3 … Zookeeper 5 Confluent Platform with Multi Region Clusters
  • 11. IT@Intel 11 TLS Confluent Control Center LDAP/TLS Schema Registry SASL Digest MD5 Admin User SASL TLS Digest MD5 Zookeeper 1 Broker Cluster TLS Zookeeper 2 Connectors SASL Digest MD5 Zookeeper 3 Authorization ACL Zookeeper Broker 1 Producers (Client App) Broker 2 TLS Stream Processor 1 Broker 3 Stream Processor 2 … TLS Consumers Stream Processor 3 Broker n (Client App) TLS Stream Processor Securing Our Confluent Platform 11
  • 12. IT@Intel 12 Monitoring Our Kafka Clusters 12 Our C3 server requires Intel 2nd gen Xeon processors for high-performance compute and Intel Optane DC SSDs for low latency and high-endurance storage. Kafka Admins All-in-One Kafka Cluster Confluent Control Center Server (C3) (Broker, ZooKeeper, Connect, Kafka Streams) Kafka Streams App “Stream Processor” C3 Web App Consumers UI Trouble- shooting Producers Producers Kafka Production Monitoring Data Metrics Data Metrics Reporter Monitoring Interceptor Topics Topics Topics Topics Topics Topics Topics Topics Topics Topics Topics Topics Topics Topics Topics Topics Topics Consumers Metrics Topic Monitoring Topic Transformed Topics Health Monitoring
  • 13. IT@Intel 13 Managing Vulnerabilities with Stream Processing 13 Confluent Platform Producers Kafka Streams API Stream Processing Kafka Bus Vulnerability Topic Filter Vulnerabilities by Business Unit IP Address Range Topic Join Asset Asset Inventory Topic Ownership with Consumers Vulnerable Assets BU #1’s Vulnerabilities Topic Data Lake BU Partners BU #2’s Vulnerabilities Topic IT Partners BU #3’s Vulnerabilities Topic SIEM Vulnerabilities with Owners Topic Enforcement SOAR Scanning Engine IP Address Management Asset Management Inventory Vulnerabilities Asset configuration, CVEs, CVSS IP Address Ranges Ownership, Business Units Asset Ownership
  • 14. IT@Intel 14 Kafka Maturity Timeline 14 Acquire once-consume many Integration efficiency Remove the noise, and duplication Cost savings for downstream consumers Join multiple sources Contextually rich + clean data downstream ACQUIRE DATA FILTERING ENRICHMENT SUMMARIZATION ADVANCED Autonomous Actions e.g. Cluster analysis, ML Produce summary statistics State information, performance benefit and downstream cost savings
  • 15. IT@Intel 15 Kafka By The Numbers 15 20+ TB/DAY 135+ 32+ CONSUMERS DATA SOURCES 320+ TOPICS 90+ PRODUCERS >18B EVENTS/DAY Kafka by the Numbers ~8 trillion events indexed by Splunk in 2020
  • 16. IT@Intel 16 Kafka - Benefits to Intel 16 KAFKA LEADERSHIP THROUGH CONFLUENT EXPERTISE GENERATES CONTEXTUALLY RICH DATA MODERN ARCHITECTURE WITH THRIVING COMMUNITY GLOBAL SCALE AND REACH OPERATE ON DATA IN STREAM ECONOMIES OF SCALE REDUCE TECHNICAL DEBT AND DOWNSTREAM COSTS ALWAYS ON
  • 17. IT@Intel 17 People + Technology + Data Transforming How Information Security Works 17 Reduced Risk to Intel Greater Insight and Tighter Collaboration Highly Integrated and Automated A Force Multiplier Faster Detection and Response Speaking a Common Language A Platform for the Future
  • 18. IT@Intel 18 Additional Resources 18 Solution Brief and Reference Architecture

Editor's Notes

  • #6: People + Technology + Data Transforming How Information Security Works
  • #9: Abstraction Layer
  • #17: Economies of Scale via acquire data once consume many Operate on Data In Stream – near real time identification and response to threats Reduce downstream costs, e.g. filtering data and transforming data (contextually rich) in kafka before applications and data lakes like Splunk, consumes Reduce technical Debt by eliminating custom connectors Generates Contextually rich data Global Scale and Reach – distributed bus technology that connects to cloud, IOT , other buses, kafka in backpack because records even when elements of assets are offline/separate Always On – no downtime, producers and consumers do not impact each other, kafka in backpack because it brings the data back online Modern Architecture with Thriving Community – great minds working across many distributed systems, data types, message bus systems, new APIs, always innovating Kafka leadership Through Confluent expertise – Confluent is technology leader and partnering with Intel to innovate
  • #19: 18