Skip to main content

Self-Assessment Checklist

Use this checklist to evaluate the maturity of your Kafka backup architecture across all six pillars. Score each item honestly — the goal is to identify improvement areas, not to achieve a perfect score on day one.

How to Score

Rate each item on a 0–3 scale:

ScoreLevelDescription
0Not implementedNo action taken
1BasicPartially implemented, manual processes
2AdvancedFully implemented, mostly automated
3ExpertFully automated, continuously improved, measured

Scoring Thresholds

Total ScoreMaturityAction
0–25Critical gapsAddress immediately — your backup infrastructure has significant risk
26–50DevelopingCreate a prioritised improvement plan targeting the lowest-scoring pillars
51–70MatureFocus on optimisation and automation of remaining manual processes
71–87Well-ArchitectedMaintain through continuous improvement and regular reassessment
Reassess Regularly

Re-run this assessment quarterly, or after significant changes to your Kafka environment (new topics, increased throughput, new compliance requirements). Track your score over time to measure improvement.


Operational Excellence

#CheckScore (0–3)
1Backup operations have a designated owner with clear escalation paths
2Backup schedules are fully automated (no manual runs required)
3Monitoring and alerting covers all key backup metrics (lag, throughput, errors, checkpoint age)
4DR runbooks exist with exact kafka-backup CLI commands and have been tested
5All backup configuration is version-controlled and deployed via GitOps or CI/CD

Pillar subtotal: ___ / 15


Security

#CheckScore (0–3)
6Least-privilege IAM policies are enforced for backup and restore processes separately
7All backup data is encrypted at rest (SSE or client-side encryption)
8All connections are encrypted in transit (TLS 1.2+ for Kafka, HTTPS for storage)
9No hardcoded credentials — all secrets managed via a secrets manager or environment variables
10Audit logging is enabled for all backup and restore operations

Pillar subtotal: ___ / 15


Reliability

#CheckScore (0–3)
11Backup integrity is validated automatically after every run (kafka-backup validate --deep)
12RPO and RTO targets are defined per topic tier and documented
13Consumer offset recovery has been tested and is part of the restore procedure
14DR drills are conducted at least quarterly with documented results
15Backup storage is geographically separated from the primary Kafka cluster

Pillar subtotal: ___ / 15


Performance Efficiency

#CheckScore (0–3)
16Backup throughput has been benchmarked and meets RPO requirements
17Compression algorithm and level have been optimised for your data formats
18kafka-backup is co-located with Kafka brokers (same AZ/region)
19Compute resources are right-sized based on measured utilisation
20Restore performance has been benchmarked and meets RTO requirements

Pillar subtotal: ___ / 15


Cost Optimisation

#CheckScore (0–3)
21Storage lifecycle policies are active (tiering from Standard → IA → Glacier)
22Retention policies are defined per topic tier and enforced automatically
23Backup costs are tracked, tagged, and attributed to teams or projects
24VPC endpoints are used for storage access (no public internet transfer costs)
25Compute is right-sized and scales down when not actively backing up

Pillar subtotal: ___ / 15


Sustainability

#CheckScore (0–3)
26Compute resources scale down or terminate when not in use
27Topic filtering excludes unnecessary topics from backup
28Cold storage tiers are used for long-term retention
29Compression is enabled to reduce storage and network resource consumption

Pillar subtotal: ___ / 12


Total Score

PillarScore
Operational Excellence___ / 15
Security___ / 15
Reliability___ / 15
Performance Efficiency___ / 15
Cost Optimisation___ / 15
Sustainability___ / 12
Total___ / 87

Next Steps

Based on your score, prioritise improvements in the lowest-scoring pillars:

  1. Identify the pillar with the lowest score — this is your highest-risk area
  2. Review the corresponding pillar page for detailed best practices and implementation guidance
  3. Start with the highest-impact, lowest-effort items — typically monitoring (OE-03), encryption at rest (SEC-02), and backup validation (REL-01)
  4. Set a target score for your next quarterly assessment
  5. Track progress over time and celebrate improvements
Need Help?

If your assessment reveals critical gaps, the Reference Architectures provide proven deployment patterns you can adopt. For Enterprise features like encryption, RBAC, and audit logging, contact OSO for a consultation.