Access Transparency on Confluent Cloud

Note

Limited Availability

Access Transparency is in Limited Availability to Confluent customers as a fully supported feature and recommended for production use. To get access, contact Confluent Support.

Access Transparency is a Confluent Cloud feature that provides visibility into when your Dedicated Kafka clusters were accessed by Confluent personnel and why. This feature helps you maintain compliance with regulatory requirements and demonstrate proper governance controls.

Access Transparency provides the following capabilities:

  • Real-time visibility into when Confluent personnel access your Dedicated Kafka clusters
  • Comprehensive audit trails with detailed access information
  • Regulatory compliance support for transparency requirements
  • Integration with your existing SIEM and log management systems

Overview

Access Transparency provides near real-time visibility into when Confluent personnel access your Dedicated Kafka clusters, including:

  • What activity was performed
  • When the access occurred
  • Why the access was necessary
  • Where the access originated from (country/location)

This transparency helps you maintain compliance with various regulatory requirements and provides assurance that your data is being accessed only for legitimate operational purposes.

Requirements

To use Access Transparency, you must meet the following requirements:

  • Premier support plan: You must be subscribed to the Premier support plan.
  • Audit Logs enabled: You must be actively consuming Confluent Cloud audit logs (enabled by default).
  • Explicit enablement: Access transparency logs are disabled by default and must be explicitly enabled.
  • Support request: Request Access Transparency logging from Confluent Support.
  • Dedicated Kafka clusters only: Available only on Dedicated Kafka clusters.
  • Supported cloud service providers: Available on AWS, Azure, and Google Cloud.

Enable Access Transparency logging

To enable Access Transparency logging:

  1. Contact your account executive (AE) or Confluent Support.
  2. Request Access Transparency logs to be enabled in your organization.
  3. Ensure you have the Premier support plan.

Log fields

Access transparency logs include the following fields:

Field Description
Event ID A unique number to identify each event
Timestamp When the action happened
Employee job family The job role of the Confluent employee
Location Where the action was done (country)
Result The outcome of the action

Event type

Access transparency logs are generated with the event type:

io.confluent.cloud/access-transparency

Event method

The following event method is used for Access Transparency:

Method name Description
confluent.privileged.access Generated when Confluent personnel access your Dedicated Kafka cluster for support, maintenance, or other operational purposes.

Note

There are no failure logs for Access Transparency events. Only successful access events are logged.

For details about the Access Transparency event methods, see Access Transparency Auditable Event Methods.

Consume Access Transparency logs

To consume Access Transparency logs:

  1. Ensure you have the Premier support plan.
  2. Contact Confluent Support to enable Access Transparency logs.
  3. Use the same audit log consumption methods you use for regular audit logs.
  4. Filter for events with type io.confluent.cloud/access-transparency.

For detailed information about the event structure and examples, see Access Transparency Auditable Event Methods.

Use cases

Access Transparency is particularly valuable for:

  • Compliance Requirements: Meeting regulatory requirements that mandate transparency into data access, including DORA, FCA/PRA, BaFin, APRA, and other financial services regulations.
  • Security Auditing: Maintaining detailed audit trails of all access to your infrastructure for security monitoring and incident response.
  • Trust and Transparency: Building trust with customers by providing visibility into operational access and demonstrating proper governance controls.
  • Incident Investigation: Understanding what actions were taken during support incidents to facilitate root cause analysis and resolution.