Download presentation
Presentation is loading. Please wait.
Published byMarylou Morris Modified over 9 years ago
1
1 © 2014 Cloudera, Inc. All rights reserved. Preventing a Big Data Security Breach
2
2 © Cloudera, Inc. All rights reserved. Speakers Ritu Kama, Director Product Management, Big Data Intel Twitter: @ritukama @ritukama Nick Curcuru VP Big Data Practice Mastercard Advisors Sam Heywood Director Product Management, Security Cloudera Twitter: @sam_heywood @sam_heywood
3
3 © 2014 Cloudera, Inc. All rights reserved. The Benefits of Hadoop... One place for unlimited data All types More sources Faster, larger ingestion Unified, multi-framework data access More users More tools Faster changes
4
4 © 2014 Cloudera, Inc. All rights reserved. Business Manager Run high value workloads in cluster Quickly adopt new innovations Information Security Follow established policies and procedures Maintain compliance IT/Operations Integrate with existing IT investments Minimize end-user support Automate configuration …Can Create Information Security Challenges
5
5 © 2014 Cloudera, Inc. All rights reserved. Big Data = Sensitive Data © 2015 The SANS™ Institute – www.sans.org 5
6
6 © 2014 Cloudera, Inc. All rights reserved. Comprehensive, Compliance-Ready Security Authentication, Authorization, Audit, and Compliance Perimeter Guarding access to the cluster itself Access Defining what users and applications can do with data InfoSec Concept: Authentication InfoSec Concept: Authorization Visibility Reporting on where data came from and how it’s being used InfoSec Concept: Audit Data Protecting data in the cluster from unauthorized visibility InfoSec Concept: Compliance
7
7 © 2014 Cloudera, Inc. All rights reserved. Data Free-for-All: Available & Error-Prone Basic Security Controls: Authorization Authentication Comprehensive Auditing Data Security & Governance: Lineage Visibility Metadata Discovery Encryption & Key Management Start with the Hadoop Security Maturity Model Achieve Scale and Cost Effectiveness via a Secure Data Vault Fully Compliance Ready: Audit-Ready & Protected Audit Ready For: EU Data Protection Directive PCI DSS HIPAA FERPA FISMA PII Full encryption, key management, transparency, and enforcement for all data-at-rest and data-in-motion Data Volume & Sensitivity Security Compliance & Risk Mitigation 0 Highly Vulnerable Data at Risk 1 Reduced Risk Exposure 2 Managed, Secure, Protected 3 Enterprise Data Hub Secure Data Vault
8
8 © 2014 Cloudera, Inc. All rights reserved. Comprehensive, Compliance-Ready Security Authentication, Authorization, Audit, and Compliance Perimeter Guarding access to the cluster itself InfoSec Concept: Authentication Access Defining what users and applications can do with data InfoSec Concept: Authorization Cloudera Manager Apache Sentry & RecordService Visibility Reporting on where data came from and how it’s being used InfoSec Concept: Audit Cloudera Navigator Data Protecting data in the cluster from unauthorized visibility InfoSec Concept: Compliance Navigator Encrypt & Key Trustee
9
9 © 2014 Cloudera, Inc. All rights reserved. RecordService (Beta) Unified Access Control Enforcement New high performance security layer that centrally enforces fine trained access control in HDFS Complements Apache Sentry’s unified policy definition Row- and column-based security Dynamic data masking Apache-licensed open source Beta now available FILESYSTEM HDFS NoSQL HBase SECURITY – Sentry, RecordService
10
10 © 2014 Cloudera, Inc. All rights reserved. Data Free-for-All: Basic Security Controls: Data Security & Governance: MasterCard’s Journey from pilot to compliance Fully Compliance Ready: Data Volume & Sensitivity Security Compliance & Risk Mitigation 0 Highly Vulnerable Data at Risk 1 Reduced Risk Exposure 2 Managed, Secure, Protected 3 Enterprise Data Hub Secure Data Vault
11
11 © 2014 Cloudera, Inc. All rights reserved. MasterCard’s journey to PCI certification 2016 –> Discovery May 2012 Proof of Concept July –> Oct. 2012 Roadmap Oct. –> Nov. 2012 Mainstream EOY 2012 PCI Certified June 2014 Recertified Jun 2015 Wide Adoption 2013 –> Security
12
12 © 2014 Cloudera, Inc. All rights reserved. Security goes beyond technology Install, modify, and support Technology Act within the guidelines of Process to ensure security Create and revise Process and polices as required Are ultimately accountable for ongoing security People Are the yardstick by which configurations and actions is measured and reported against Are governed by People with authority to set best practices and define policy within an organisation Change over time to address evolving security concerns and needs of the business Process Tools for security that are installed and configured by People, governed by Process Provide the audit, data protection, and user administraiton capabilties delivered by People, within the framework of established and documented Process Technology
13
13 © 2014 Cloudera, Inc. All rights reserved. People and Process – Segregation of Duties – Segregation of Data Access – Process documentation – controls, response and continuity planning – Continuous knowledge transfer, training and awareness Technology – Strong Authentication & Authorisation – Security Logging – Penetration Testing Best practices
14
14 © 2014 Cloudera, Inc. All rights reserved. Hadoop isn’t one thing, but a “collection of things” Education & documentation is 60-70% of the effort This isn’t a database, don’t expect similar controls Security is neither quick nor easy Technology is still maturing Close collaboration with your partner is critical This is just the beginning – it is continuous Lessons learned
15
15 © 2014 Cloudera, Inc. All rights reserved. Table stakes for big data security Native data encryption Security embedded in metadata Integrated key management Authorisation Authentication – Multi-Factor Strong role based access Monitoring in real time Audit and data lineage Hardware-enabled security Enterprise Identity management integration
16
16 © 2014 Cloudera, Inc. All rights reserved. Where to Start Assess security maturity Review data and information strategy Layout data protection strategy Identify education and training needs
17
17 © 2014 Cloudera, Inc. All rights reserved. Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.