Top Banner
© Hortonworks Inc. 2015 Protecting Enterprise Data in Apache Hadoop September2015 Page 1 Owen O’Malley [email protected] @owen_omalley
28

Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

Mar 08, 2018

Download

Documents

vuongque
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Protecting Enterprise Data in Apache Hadoop

September2015

Page 1

Owen O’Malley [email protected] @owen_omalley

Page 2: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Security

Page 2

Page 3: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Security Architecture

Page 3

Page 4: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Attack Vectors

Page 4

Page 5: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Attack Vectors

Page 5

Page 6: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: Accidental Damage

Page 6

Page 7: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: Remote Access

Page 7

Page 8: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: Eavesdropping

Page 8

Page 9: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: User accesses private data

Page 9

Page 10: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: Physical access

Page 10

Page 11: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: Hadoop Admin in Cluster

Page 11

Page 12: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

HDFS Encryption

Page 12

Page 13: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

KeyProvider API

Page 13

Page 14: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Encryption Scheme

Page 14

Page 15: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Original Hive Architecture

Page 15

Page 16: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: User Accesses DB directly

Page 16

Page 17: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Hive Architecture with Metastore

Page 17

Page 18: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: User Deletes Hive tables

Page 18

Page 19: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Hive Architecture with Storage-Based Auth

Page 19

Page 20: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: User reads private columns

Page 20

Page 21: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Hive Architecture with Hive Server 2

Page 21

Page 22: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: User reads private columns

Page 22

Page 23: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

ORC File Layout

Page 23

File Footer

Postscript

Index Data

Row Data

Stripe Footer25

6 M

B St

ripe

Index Data

Row Data

Stripe Footer

256

MB

Strip

e

Index Data

Row Data

Stripe Footer

256

MB

Strip

e

Column 1

Column 2

Column 7

Column 8

Column 3

Column 6

Column 4

Column 5

Column 1

Column 2

Column 7

Column 8

Column 3

Column 6

Column 4

Column 5

Stream 2.1

Stream 2.2

Stream 2.3

Stream 2.4

Page 24: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: User reads hidden values

Page 24

Page 25: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Threat: Shadow Security

Page 25

Page 26: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Resources

Page 26

Page 27: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Other talks

Page 27

Page 28: Protecting Enterprise Data in Apache Hadoop · PDF fileThreat: Hadoop Admin in Cluster Page 11 © Hortonworks Inc. 2015 HDFS Encryption Page 12 © Hortonworks Inc. 2015 KeyProvider

© Hortonworks Inc. 2015

Thank You!

Page 28