Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data Protection Regulation. Clients are solely responsible for obtaining advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulations that may affect the clients’ business and any actions the clients may need to take to comply with such laws and regulations.
The products, services, and other capabilities described herein are not suitable for all client situations and may have restricted availability. IBM does not provide legal, accounting, or auditing advice or represent or warrant that its services or products will ensure that clients are in compliance with any law or regulation.
What is GDPR?
GDPR stands for General Data Protection Regulation.
GDPR has been adopted by the European Union and will apply from May 25, 2018.
Why is GDPR important?
GDPR establishes a stronger data protection regulatory framework for processing of personal data of individuals. GDPR brings:
- New and enhanced rights for individuals
- Widened definition of personal data
- New obligations for companies and organisations handling personal data
- Potential for significant financial penalties for non-compliance
- Compulsory data breach notification
This document is intended to help you in your preparations for GDPR readiness.
Read more about GDPR
Product Configuration for GDPR
Configuration to support data handling requirements
The GDPR legislation requires that personal data is strictly controlled and that the integrity of the data is maintained. This requires the data to be secured against loss through system failure and also through unauthorized access or via theft of computer equipment or storage media. The exact requirements will depend on the nature of the information that will be stored or transmitted by Event Streams. Areas for consideration to address these aspects of the GDPR legislation include:
- Physical access to the assets where the product is installed
- Encryption of data both at rest and in flight
- Managing access to topics which hold sensitive material.
Data Life Cycle
IBM Event Streams is a general purpose pub-sub technology built on Apache Kafka® which can be used for the purpose of connecting applications. Some of these applications may be IBM-owned but others may be third-party products provided by other technology suppliers. As a result, IBM Event Streams can be used to exchange many forms of data, some of which could potentially be subject to GDPR.
What types of data flow through IBM Event Streams?
There is no one definitive answer to this question because use cases vary through application deployment.
Where is data stored?
As messages flow through the system, message data is stored on physical storage media configured by the deployment. It may also reside in logs collected by pods within the deployment. This information may include data governed by GDPR.
Personal data used for online contact with IBM
IBM Event Streams clients can submit online comments/feedback requests to contact IBM about IBM Event Streams in a variety of ways, primarily:
- Public issue reporting and feature suggestions via IBM Event Streams Git Hub portal
- Private issue reporting via IBM Support
- Public general comment via the IBM Event Streams slack channel
Typically, only the client name and email address are used to enable personal replies for the subject of the contact. The use of personal data conforms to the IBM Online Privacy Statement.
IBM Event Streams can be used to collect personal data. When assessing your use of IBM Event Streams and the demands of GDPR, you should consider the types of personal data which in your circumstances are passing through the system. You may wish to consider aspects such as:
- How is data being passed to an IBM Event Streams topic? Has it been encrypted or digitally signed beforehand?
- What type of storage has been configured within the IBM Event Streams? Has encryption been enabled?
- How does data flow between nodes in the IBM Event Streams deployment? Has internal network traffic been encrypted?
When messages are published to topics, IBM Event Streams will store the message data on stateful media within the cluster for one or more nodes within the deployment. Consideration should be given to securing this data when at rest.
The following items highlight areas where IBM Event Streams may indirectly persist application provided data which users may also wish to consider when ensuring compliance with GDPR.
- Kubernetes activity logs for containers running within the Pods that make up the IBM Event Streams deployment
- Logs captured on the local file system for the Kafka container running in the Kakfa pod for each node
By default, messages published to topics are retained for a week after their initial receipt, but this can be configured by modifying Kafka broker settings. These settings are configured using the
EventStreams custom resource.
The Kafka core APIs can be used to access message data within the IBM Event Streams system:
- Producer API to allow data to be sent to a topic
- Consumer API to allow data to be read from a topic
- Streams API to allow transformation of data from an input topic to an output topic
- Connect API to allow connectors to continually move data in or out of a topic from an external system
For more information about controlling access to data stored in IBM Event Streams, see managing access.
Access and authorization controls can be used to control which users are able to access this cluster-level information.
Encryption of connection to IBM Event Streams
Connections to IBM Event Streams are secured using TLS. If you want to use your own CA certificates instead of those generated by the operator, you can provide them in the
EventStreams custom resource settings.
Encryption of connections within IBM Event Streams
Internal communication between Event Streams pods is encrypted by default using TLS.
IBM Event Streams provides a range of monitoring features that users can exploit to gain a better understanding of how applications are performing.