Top Banner
Slide No: 1 Data Security for Couchbase Don Pinto Arun Gowda
22

Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Jul 26, 2015

Download

Technology

Couchbase
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Slide No: 1

Data Security for Couchbase

Don Pinto Arun Gowda

Page 2: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Agenda

NoSQL/Couchbase Overview Encryption/Data Security Drivers Vormetric Overview Protecting Sensitive Data in Couchbase Sample Security Policy for Couchbase Summary

Page 3: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Why NoSQL security ?

Big data not only means..

Volume Velocity Variety

But also

Value

NoSQL is a popular solution for big data apps.90%

STRUCTURED UNSTRUCTURED

Structured information is only 10% of the story

90% of big data is unstructured and is made up of information like emails, videos, tweets, facebook posts, web clicks, and so on..

Because your information is valuable

10%

Page 4: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

©2014 Couchbase, Inc.

4

Pro

d

De

v, Q

A,

Test

StorageStorage

Backup Server

Sensitive

hAck3rs

Which ports are

open through

the firewall?

What if an operator steals a disk?

Is sensitive data encrypted?

Is there admin access and data

access separation? Is your data encrypted in the cloud?

Common security questions

Are backups encrypted ?

XDCR to remote Cluster

Is XDCR Secure?

What Vulnerabilities?

Page 5: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Sensitive Data is Dispersing and GrowingBecoming harder to secure

• Physical

• Virtual

• Outsourced

• Sources

• Nodes

• Analytics

Enterprise Data Centers Private, Public, Hybrid Clouds

Big DataRemote Servers

• 2013: 1 Zettabyte of sensitive data not protected

• 2020: 10 Zettabytes of exposed sensitive data

- IDC 2014

Page 6: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Top Concerns for Cloud and Big DataSecurity and compliance

“By 2018 …25% of corporate data traffic will bypass traditional perimeter security defenses - up from 4% today.”

“By 2018, 25% of corporate data traffic will bypass traditional perimeter security defenses – up from 4% today.” - Gartner, Nov 2013

Top Security Concerns With Cloud Computing

March 2014

41%

35%

32%

26%

18%

15%

11%

10%

4%

Data Privacy and Security

Access and Control

Auditing and Compliance

Control of Data

Security Models/ Toolsets

Contractual/ Legal Issues

Internal Issues

Network Connection Security

Geographical Coverage

“The biggest growth inhibitors for Big Data market are security and privacy concerns. ” - Wikibon, Jan 2014

Big Data Market Forecast

Page 7: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Traditional IT Security Challenges Never Subside

Slide No: 7

Page 8: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Vormetric Data Security PlatformCentralized Encryption, Tokenization, Key Management

Best Encryptio

n

Security &Compliance

Page 9: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Protecting Sensitive Data in Couchbase

Sensitive data (e.g. PII/PHI) resides in many locations inside the enterprise (and in the cloud) in structured and unstructured formats

Sensitive data is required by state and national regulations to be encrypted at rest

Sensitive data should also be monitored and protected from insider threats, malware, and APTs which can lead to data breaches

Page 10: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Reporting & Analytics

Storage

Database

Application

User

File Systems

VolumeManagers

• Allow/Block• Encrypt/

Decrypt

VormetricData Security Managervirtual or physical appliance

Cloud Admin, Storage

Admin, etc

*$^!@#)(-|”_}?$%-:>>

Encrypted & Controlled

DSM

*$^!@#)(-|”_}?$%-:>>

Encrypted& Controlled

Privileged Users

John Smith 401 Main Street

Clear Text

Approved Processes and

Users

Server

DSM

Storage

Database

Application

User

File Systems

VolumeManagers

External key management

- SS Tables / Data- Saved Caches- Commit Logs / Error logs,

etc- Configuration files

Au

dit L

og

s

Vormetric Transparent EncryptionFile Level Encryption

Page 11: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

*$^!@#)(

-|”_}?$%-:>>

John Smith 401 Main Street

Clear Text

Storage

Database

Application

User

File Systems

VolumeManagers

Big Data, Databases or Files

VormetricData Security ManagerVirtual or Physical Appliance

Cloud Provider /Outsource

Administrators

*$^!@#)(

-|”_}?$%-:>>

Name: Jon DoughSS: if030jcl

PO: Jan395-2014

Approved Applications

Privileged Users

• Allow/Block• Encrypt/

Decrypt

External key management

Reporting & Analytics

Au

dit L

og

s

Encrypted& Controlled

Encrypted& Controlled

Vormetric Application EncryptionField Level Encryption

Page 12: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Couchbase encryption – clientEncryption at the application

Leverage Vormetric encryption and key management

APIs, libraries, and sample code in Java, .NET, C/C++.

VAEApplication Vormetric

Application Encryption

S S N : 1 1 2 -1 1 1 - 6 7 6 2

J o n D o u g h

Vormetric APIEncryption Key

Request / Response*

$ # A d # $ g & * j% J 1 T J C Z

J o n D o u g h DSM

Co

uc

hb

as

eC

lien

t-se

rve

r S

SL

Via Couchbase SDKs

Page 13: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Setting up Couchbase Enterprise Access Control and Security Policies

Page 14: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Creating 2 User Set Lists – Couchbase Approved User and Privileged User (root)

Page 15: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

User Policies

Page 16: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Protecting Directories That Potentially Contain Sensitive Data

Page 17: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Intended User Can See File Metadata and Read couchdb.log Data Content

Vormetric Security Intelligence Event Log:

Page 18: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Privileged User Can See File Metadata, and couchdb.log Log Data is Encrypted

Vormetric Security Intelligence Event Log:

Page 19: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Any Other User Is Denied Any Access

Vormetric Security Intelligence Event Log:

Page 20: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Summary

Couchbase provides a powerful NoSQL platform

Data security including encryption should be addressed proactively

Vormetric & Couchbase have partnered to enable customers to build high-performance, highly-secure applications

Visit www.vormetric.com for more information http://www.vormetric.com/compliance/pci-dss

Page 21: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Protect What Matters,Where it Matters

[email protected] | @[email protected] | @vormetric

Page 22: Securing Your Couchbase Server Deployment Using Vormetric: Couchbase Connect 2015

Don’t forget to fill out the Connect Session Survey on the Connect App

Get Started with Couchbase Server 4.0: www.couchbase.com/beta

Test drive vormetric @ http://testdrive.vormetric.com/

Get trained on Couchbase: training.couchbase.com