Question
Morgan Stanley
IN
Last activity: 5 Jul 2022 15:31 EDT
Enabling kafka on the servers leads to Java JMX vulnerabilities
Hi,
Whenever we enable the Stream service on our Pega environments, we get java jmx multiple vulnerabilities because of the below settings found in the kafka diagnostics. This raises an alarm as an enterprise security violation from Pega environments
contents={key=com.sun.management.jmxremote.authenticate, value=false}
,items=((itemName=key,itemType=javax.management.openmbean.SimpleType(name=java.lang.String)),(itemName=value,itemType=javax.management.openmbean.SimpleType(name=java.lang.String)))),contents={key=com.sun.management.jmxremote.ssl, value=false}
we dont have any tomcat properties which sets these properties to false on the prconfig. For now we have disabled the Stream service but it is required to be re-enabled. Is there a way, we can avoid these statements to be printed in kafka diagnostics. Is there any configuration which can enable authentication for kafka.