Top Banner
Securely explore your data BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY Joe Travaglini, Director of Product Marketing May 27, 2014
25

Sqrrl May Webinar: Data-Centric Security

Jan 15, 2015

Download

Data & Analytics

sqrrl

This webinar discusses the dissolution of the "trusted zone" and shares insights on how you can build secure applications on Hadoop by adopting best practices in Data-Centric Security with Sqrrl Enterprise.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Sqrrl May Webinar: Data-Centric Security

Securely explore your data

BULLET-PROOF YOUR BIG APPS

WITH DATA-CENTRIC SECURITY

Joe Travaglini, Director of Product Marketing May 27, 2014

Page 2: Sqrrl May Webinar: Data-Centric Security

OUTLINE

•  The Context •  Stakes of security in Big Data •  Breakdown of the “Trusted Zone”

•  Data-Centric Security •  What is it and why should I care? •  Examples in practice with Sqrrl Enterprise

•  Wrap Up

2 © 2014 Sqrrl Data, Inc. | All Rights Reserved

Page 3: Sqrrl May Webinar: Data-Centric Security

SETTING CONTEXT

SOME DIFFICULT REALITIES

© 2014 Sqrrl Data, Inc. | All Rights Reserved 3

Page 4: Sqrrl May Webinar: Data-Centric Security

THERE IS NO SECURE PERIMETER

•  Corporate intranets are dirty •  Cloud Computing •  Bring your own device

•  Sophistication of threats: APT / malicious insider

•  Know thy network •  Embrace the chaos, change the game

The changing face of the “trusted zone”

4 © 2014 Sqrrl Data, Inc. | All Rights Reserved

Page 5: Sqrrl May Webinar: Data-Centric Security

UPPING THE ANTE

•  The “Big Promise” – keep everything, mine it, strike gold

•  Consolidating data means compounding risk •  Traditional protection is insufficient •  Breach events have larger blast radius

•  We can’t protect data, why not let it protect itself?

Big Data amplifies the stakes of security

5 © 2014 Sqrrl Data, Inc. | All Rights Reserved

Page 6: Sqrrl May Webinar: Data-Centric Security

THE IMPORTANCE OF

DATA-CENTRIC SECURITY

© 2014 Sqrrl Data, Inc. | All Rights Reserved 6

Page 7: Sqrrl May Webinar: Data-Centric Security

DCS REFERENCE ARCHITECTURE Things to consider when protecting data

7 © 2014 Sqrrl Data, Inc. | All Rights Reserved

Page 8: Sqrrl May Webinar: Data-Centric Security

REFERENCE IMPLEMENTATION How Sqrrl manifests Data-Centric Security

8 © 2014 Sqrrl Data, Inc. | All Rights Reserved

Page 9: Sqrrl May Webinar: Data-Centric Security

ACCUMULO DATUM RECORD

Example Accumulo Row

© 2014 Sqrrl Data, Inc. | All Rights Reserved 9

Visibility Labels, BigTable style

Page 10: Sqrrl May Webinar: Data-Centric Security

SQRRL DATUM RECORD

Example Nested Sqrrl Document

© 2014 Sqrrl Data, Inc. | All Rights Reserved 10

Visibility Labels, Sqrrl style

Page 11: Sqrrl May Webinar: Data-Centric Security

SQRRL LABELING ENGINE

{ “message-id” : “129434”, “message” : { “from” : “Dr. Bob Doctor <[email protected]>”, “subject” : “Test Results”, “importance” : 10, “body” : “Everything came back OK.\n\nI will see you in the office on Friday.” } }

© 2014 Sqrrl Data, Inc. | All Rights Reserved 11

Rule-based assignment of labels to data

{ “message-id” : “129434”, “message@[veryimportant]” : { “from” : “Dr. Bob Doctor <[email protected]>”, “subject” : “Test Results”, “importance” : 10, “body” : “Everything came back OK.\n\nI will see you in the office on Friday.” } }

APPLY veryimportant to //mailbox/messages[**]/message WHERE CHILD importance >= 10

Page 12: Sqrrl May Webinar: Data-Centric Security

ENCRYPTION CAPABILITIES

•  Encryption at rest

•  Encryption in motion

•  Pluggable Encryption

© 2014 Sqrrl Data, Inc. | All Rights Reserved 12

Page 13: Sqrrl May Webinar: Data-Centric Security

ENCRYPTION AT REST

© 2014 Sqrrl Data, Inc. | All Rights Reserved 13

Page 14: Sqrrl May Webinar: Data-Centric Security

ENCRYPTION IN MOTION

•  Encrypt all network traffic with SSL •  Sqrrl client to Sqrrl server •  Sqrrl server to Accumulo server •  Accumulo server to Accumulo server

© 2014 Sqrrl Data, Inc. | All Rights Reserved 14

Sqrrl Enterprise was never vulnerable to Heartbleed

Page 15: Sqrrl May Webinar: Data-Centric Security

CRYPTO CONTRIBUTIONS

•  ACCUMULO-958: Pluggable encryption to Write-Ahead Logs

•  ACCUMULO-980: Pluggable encryption to RFiles •  ACCUMULO-1009: Encryption in motion

Sqrrl contributed each to open-source Accumulo

© 2014 Sqrrl Data, Inc. | All Rights Reserved 15

Page 16: Sqrrl May Webinar: Data-Centric Security

SECURE SEARCH

•  Search can be a source of leakage •  Revealing existence of data elements, names… •  …or worse, more information

•  Indexes are data too •  Protections should mirror underlying data

Sqrrl Enterprise is the only Big Data Solution

with term-level security on search indexes

© 2014 Sqrrl Data, Inc. | All Rights Reserved 16

Preserving data security in search indexes

Page 17: Sqrrl May Webinar: Data-Centric Security

SQRRL AUDIT

•  Records every client action against system

•  Provides info on request, security operations attempted

•  Stored securely to prevent tampering

© 2014 Sqrrl Data, Inc. | All Rights Reserved 17

Immutable history for compliance purposes

Page 18: Sqrrl May Webinar: Data-Centric Security

WRAPPING UP

© 2014 Sqrrl Data, Inc. | All Rights Reserved 18

Page 19: Sqrrl May Webinar: Data-Centric Security

RECAP

•  Changing technology landscape •  Perimeter controls not keeping pace

•  Big Data security is hard •  Technology velocity, data gravity •  Unknown unknowns

•  Adopt Data-Centric Security principles for best chances at success

•  (Sqrrl has them)

© 2014 Sqrrl Data, Inc. | All Rights Reserved 19

Page 20: Sqrrl May Webinar: Data-Centric Security

NARROWING THE BOUNDARY

© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

Page 21: Sqrrl May Webinar: Data-Centric Security

NARROWING THE BOUNDARY

© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

Page 22: Sqrrl May Webinar: Data-Centric Security

TOWARDS THE FUTURE

© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

Page 23: Sqrrl May Webinar: Data-Centric Security

DCS MATURITY CHART

© 2014 Sqrrl Data, Inc. | All Rights Reserved | Proprietary and Confidential 23

Sqrrl leads the NoSQL pack Apache HBase

Apache Accumulo

Datastax Enterprise

MongoDB Enterprise

Sqrrl Enterprise

Secure Full-Text Search Non-secure Non-secure ✔ Secure Graph Search ✔ Cell-Level Security ✔ ✔ Not robust ✔ Labeling + Policy Engines ✔ Native Encryption At rest ✔ ✔ In motion,

client-server only ✔

ABAC ✔

Audit 3rd Party ✔ Unauthorized only ✔

Page 24: Sqrrl May Webinar: Data-Centric Security

THANKS!

Brought to you by: Sqrrl Data, Inc. [email protected]

@SqrrlData http://www.sqrrl.com

Presented by: Joe Travaglini [email protected] @joe_travaglini http://www.linkedin.com/in/jtrav

© 2014 Sqrrl Data, Inc. | All Rights Reserved 24

Follow us to keep up with the latest

Page 25: Sqrrl May Webinar: Data-Centric Security

Q&A

© 2014 Sqrrl Data, Inc. | All Rights Reserved 25