Top Banner
Securing Native Big Data Deployments Steven C. Markey, MSIS, PMP, CISSP, CIPP/US , CISM, CISA, STS-EV, CCSK, Cloud + Principal, nControl, LLC Adjunct Professor
48
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securing_Native_Big_Data_v1

Securing Native Big Data Deployments

Steven C. Markey, MSIS, PMP, CISSP, CIPP/US , CISM, CISA, STS-EV, CCSK, Cloud +

Principal, nControl, LLCAdjunct Professor

Page 2: Securing_Native_Big_Data_v1

• Presentation Overview– Why Should You Care?– Big Data Overview– Securing Native Big Data Deployments

Securing Big Data

Page 3: Securing_Native_Big_Data_v1

• Why Should You Care– Organizational Cost Reduction Requirements

• Justify Investments• Improve Efficiencies (Productivity, Time to Market)

– Digital Information – 60%~ Annual Growth Rate (AGR)– Data Storage – 15-20% AGR Capital Expense (CapEx)– Categorization, Classification & Retention Magnify

• Compliance, Legal & Privacy Regulations

– Prevalent & Interconnected Business Ecosystems• Supply Chains• Business Process Outsourcers (BPO)• Information Technology Outsourcers (ITO)• Vendor’s Vendors

Source: IDC

Securing Big Data

Page 4: Securing_Native_Big_Data_v1

Securing Big Data

Source: Flickr

Page 5: Securing_Native_Big_Data_v1

Securing Big Data

• Big Data Overview– Aggregated Data from the Following Sources

• Traditional• Sensory / Source• Social

Page 6: Securing_Native_Big_Data_v1

Securing Big Data• Traditional Data

– Database Management Systems• Relational Database Management Systems (RDBMS)• Object-Oriented Database Management Systems (OODBMS)• Non-Relational, Distributed DB Management Systems (NRDBMS)• Mobile Databases (SQLite, Oracle Lite)

– Online Transaction Processing (OLTP)• Real-Time Data Warehousing

– Online Analytical Processing (OLAP)• Operational Data Stores (ODS)• Enterprise Data Warehouses (EDW)

Page 7: Securing_Native_Big_Data_v1

Securing Big Data• Traditional Data

– OLAP• Business Intelligence (BI)

– Data Mining– Reporting– OLAP (Continued)

» Relational OLAP (ROLAP)» Multi-Dimensional OLAP (MOLAP)» Hybrid OLAP (HOLAP)

OLTPODSEDW (Data Marts)BI (Data Mining)OLTPODSEDW (Data Marts)BI (Reporting)OLTPODSEDW (Data Marts)BI (OLAP)

Page 8: Securing_Native_Big_Data_v1

Securing Big Data• Sensory / Source Data

– Log Files• Event Logs / Operating System (OS) - Level• Appliance / Peripherals• Analyzers / Sniffers

– Multimedia• Image Logs• Video Logs

– Web Content Management (WCM)• Web Logs• Search Engine Optimization (SEO)

– Web Metadata

Page 9: Securing_Native_Big_Data_v1
Page 10: Securing_Native_Big_Data_v1

OpenStack

User Interface (Horizon)

Object Store (Swift)

Image Store (Glance)

Compute (Nova) Block Storage (Cinder)

Network Services (Neutron)

Key Service (Barbican)

Trusted Compute Pools

(Extended with Geo Tagging)

OVF Meta-Data Import

Intel® DPDK vSwitch

Enhanced Platform AwarenessErasure

Code

Expose Enhancements

Filter Scheduler

Monitoring/Metering (Ceilometer)

Object Storage Policy

Key Encryption & Management

Advanced Services in VMsIntelligent Workload Scheduling

Metrics

10

VPN-as-a-Service (with Intel® QuickAssist Technology)

Web Messaging (Zaqar)

Messaging (Oslo)

Page 11: Securing_Native_Big_Data_v1

Securing Big Data

• Big Data Overview– Aggregators

• Mostly NRDBMS Implemtations– Not only – Structured Query Language (NoSQL)

• NRDBMS Examples– Column Family Stores: BigTable (Google), Cassandra & HBase (Apache)– Key-Values Stores: App Engine DataStore (Google) & DynamoDB– Document Databases: CouchDB, MongoDB– Graph Databases: Neo4J

Page 12: Securing_Native_Big_Data_v1

Securing Big Data• Big Data Overview

– Serial Processing• Hadoop

– Hadoop Distributed File System (HDFS)– Hive – DW– Pig – Querying Language

• Riak

– Parallel Processing• HadoopDB

– Analytics• Google MapReduce• Apache MapReduce• Splunk (for Security Information / Event Management [SIEM])

Page 13: Securing_Native_Big_Data_v1

Securing Big Data

Page 14: Securing_Native_Big_Data_v1

Securing Big Data

Page 15: Securing_Native_Big_Data_v1

Securing Big Data

Page 16: Securing_Native_Big_Data_v1

Securing Big Data

Page 17: Securing_Native_Big_Data_v1

Securing Big Data

Page 18: Securing_Native_Big_Data_v1

Source: Cloudera

Page 19: Securing_Native_Big_Data_v1

Source: Wikispaces

Page 20: Securing_Native_Big_Data_v1

Source: Google

Page 21: Securing_Native_Big_Data_v1

Source: Cloudera

Page 22: Securing_Native_Big_Data_v1

Source: Flickr

Page 23: Securing_Native_Big_Data_v1

Securing Big Data• Securing Cloud-Based NRDBMS Solutions

– General• Focus on Application / Middleware-Level Security

– Single Sign-on (SSO)– SQL Injections Are Still Possible– Leverage Application IAM for NRDBMS User Rights Mgmt (URM)– Leverage Application & System Logging for Accounting

• Segregation of Duties– Read / Write Namespaces– Read-Only Namespaces

– Specific• Cryptography & Obfuscation

– Homomorphic Encryption (HE)– Stateless Tokenization

Page 24: Securing_Native_Big_Data_v1

• SSO Standards & Categories:– Network: LDAP, Kerberos, RADIUS, RDBMS

–e.g., OpenLDAP, AD, Tivoli Access Manager– Federated: SAML, OpenID, OAuth, WS-Federated, XACML

–e.g., Keycloak, PingFederate, ADFS, RSA Federated

SSO: Good, Bad & Ugly

Page 25: Securing_Native_Big_Data_v1

SSO: Good, Bad & Ugly

Source: Microsoft

Page 26: Securing_Native_Big_Data_v1

SSO: Good, Bad & Ugly

Source: OASIS

Page 27: Securing_Native_Big_Data_v1

SSO: Good, Bad & Ugly

Source: OASIS

Page 28: Securing_Native_Big_Data_v1

Source: Apache

Page 29: Securing_Native_Big_Data_v1
Page 30: Securing_Native_Big_Data_v1
Page 31: Securing_Native_Big_Data_v1
Page 32: Securing_Native_Big_Data_v1

Securing Big Data

Page 33: Securing_Native_Big_Data_v1

Securing Big Data

Page 34: Securing_Native_Big_Data_v1

Securing Big Data

Page 35: Securing_Native_Big_Data_v1

Securing Big Data

Page 36: Securing_Native_Big_Data_v1

Securing Big Data

+ =

Page 37: Securing_Native_Big_Data_v1

Securing Big Data

Page 38: Securing_Native_Big_Data_v1

Securing Big Data

Page 39: Securing_Native_Big_Data_v1

Securing Big Data

Page 40: Securing_Native_Big_Data_v1

Securing Big Data

Page 41: Securing_Native_Big_Data_v1

Securing Big Data

Page 42: Securing_Native_Big_Data_v1

Securing Big Data

Page 43: Securing_Native_Big_Data_v1

Crypto v2.0

Page 44: Securing_Native_Big_Data_v1

Crypto v2.0

Page 45: Securing_Native_Big_Data_v1

Crypto v2.0

Page 46: Securing_Native_Big_Data_v1

Crypto v2.0

Page 47: Securing_Native_Big_Data_v1

• Presentation Take-Aways– Big Data is Here to Stay– It Has to be Secure

–Segregation of Data–Access Controls

–Separation / Segregation of Duties–Federated Identities–Logging

–Crypto v2.0–Homomorphic Encryption–Stateless Tokenization

Securing Big Data

Page 48: Securing_Native_Big_Data_v1

• Questions?• Contact

– Email: [email protected]– Twitter: markes1– LI: http://www.linkedin.com/in/smarkey