five steps to secure big data

52
Five Steps to Secure Big Data Ulf Mattsson, CTO Protegrity ulf.mattsson AT protegrity.com

Upload: ulf-mattsson

Post on 08-May-2015

254 views

Category:

Technology


3 download

DESCRIPTION

database, security, big data, tokenization

TRANSCRIPT

Page 1: Five steps to secure big data

Five Steps to Secure Big Data

Ulf Mattsson, CTO

Protegrity

ulf.mattsson AT protegrity.com

Page 2: Five steps to secure big data

20 years with IBM • Research & Development & Global Services

Inventor • Encryption, Tokenization & Intrusion Prevention

Involvement

Ulf Mattsson, CTO Protegrity

2

• PCI Security Standards Council (PCI SSC)

• American National Standards Institute (ANSI) X9

• Encryption & Tokenization

• International Federation for Information Processing• IFIP WG 11.3 Data and Application Security

• ISACA New York Metro chapter

Page 3: Five steps to secure big data

Big Data

Page 4: Five steps to secure big data

Hadoop

• Designed to handle the emerging “4 V’s”

• Massively Parallel Processing (MPP)

• Elastic scale

• Usually Read-Only

• Allows for data insights on massive, heterogeneous data sets

What is Big Data?

data sets

• Includes an ecosystem of components:

4

Hive

MapReduce

HDFS

Physical Storage

Pig Other

Application Layers

Storage Layers

Page 5: Five steps to secure big data

Has Your Organization Already Invested in Big Data?

5

Source: Gartner

Page 6: Five steps to secure big data

6

http://www.ey.com/Publication/vwLUAssets/EY_-_2013_Global_Information_Security_Survey/$FILE/EY-GISS-Under-cyber-attack.pdf

Page 7: Five steps to secure big data

Holes in Big Data…

7

Source: Gartner

Page 8: Five steps to secure big data

Many Ways to Hack Big Data

MapReduce(Job Scheduling/Execution System)

Pig (Data Flow) Hive (SQL) Sqoop

ETL Tools BI Reporting RDBMS

Avr

o (S

eria

lizat

ion)

Zoo

keep

er (

Coo

rdin

atio

n)

Hackers

UnvettedApplications

OrAd Hoc

Processes

Source: http://nosql.mypopescu.com/post/1473423255/apache-hadoop-and-hbase

8

HDFS(Hadoop Distributed File System)

Hbase (Column DB)

Avr

o (S

eria

lizat

ion)

Zoo

keep

er (

Coo

rdin

atio

n)

PrivilegedUsers

Page 9: Five steps to secure big data

Current Data Security for Big data

Authentication

• Who am I and how do I prove it?

• Ensure the identity of the users, services and hosts that make up and use the system is authoritatively known

Authorization

• What am I allowed to see and do?

• Ensure services and data are accessed only by entitled identities

Data Protection

• How is my Data being Protected?

• Ensure data cannot be usefully stolen or undetectably tampered with

Auditing

• What have I attempted to do or done?

• Ensure a permanent record of who did what, when

Page 10: Five steps to secure big data

DataSecurity

Taking Data Security to the Next Level

10

Security

Page 11: Five steps to secure big data

Achieving Best Data Security for Big Data

Massively Scalable Data Security

Maximum Transparency

Maximum Performance

Easy to Use

Heterogeneous System Compatibility

Enterprise Ready

Page 12: Five steps to secure big data

Many Layers of Defense

Corporate Firewall

Corporate Enterprise

Kerberos Authentication

Authorization through ACLs

Big D

ataEncrypted Communications

Big Data Cluster

Authorization through ACLs

Coarse Grained

Fine Grained

Data Security Policy

Protegrity

8

Page 13: Five steps to secure big data

Protecting the Big Data Ecosystem

Data Access Framework

Pig Hive

Data Processing Framework

BI Applications

Java API enables Field Level data protection with Policy based access

User Defined Functions (UDFs) enable Field Level data protection with Policy based access controls with Monitoring.

BI Applications are authorized to access sensitive data through the policy.

Data Storage Framework(HDFS)

Data Processing Framework(MapReduce)

Volume or File Encryption with Policy based access controls at the OS file system level.

File level data protection with Policy based access controls for existing and new data.

protection with Policy based access controls with Monitoring.

Page 14: Five steps to secure big data

CoarseGrained

Policy Based File and Disk Encryption

14

Grained

Page 15: Five steps to secure big data

File Based Encryption Example

Files with personal identifiable informationStored in Hadoop cluster

Root user logged-in to one of the nodes

Search for sensitive information on disk

Page 16: Five steps to secure big data

FineGrained

Policy BasedField Level Data Protection

16

Grained

Page 17: Five steps to secure big data

Fine Grained Protection: Field Protection

Production SystemsEncryption• Reversible• Policy Control (Authorized / Unauthorized Access)• Lacks Integration Transparency• Complex Key Management• Example

Tokenization / Pseudonymization• Reversible• Policy Control (Authorized / Unauthorized Access)

!@#$%a^.,mhu7///&*B()_+!@

17

Non-Production SystemsMasking• Not reversible• No Policy, Everyone Can Access the Data• Integrates Transparently• No Complex Key Management• Example 0389 3778 3652 0038

• Policy Control (Authorized / Unauthorized Access)• Integrates Transparently• No Complex Key Management• Business Intelligence Credit Card: 0389 3778 3652 0038

Page 18: Five steps to secure big data

Field Level Protection Example

Files with personal identifiable informationLoaded in to a Hive table

Select data from that table

Root user logged-in to one of the nodes

Search for sensitive information on disk

Page 19: Five steps to secure big data

SecurityPolicy

Take Control Of Data Security

19

Policy

Page 20: Five steps to secure big data

Policy Based Access Control

What is the sensitive data that needs to be protected. Data Element.

Who should have access to sensitive data and who should not. Security access control. Roles & Members.

What

Who

Combination of what data needs to be protected and who has access to that data is the key to creating a meaningful policy

20

Members.meaningful policy

Page 21: Five steps to secure big data

Protegrity Data Security Policy

What

Who

How

What is the sensitive data that needs to be protected. Data Element.

How you want to protect and present sensitive data. There are several methods for protecting sensitive data. Encryption, tokenization, monitoring, etc.

Who should have access to sensitive data and who should not. Security access control. Roles & Members.

When

Where

Audit

When should sensitive data access be granted to those who have access. Day of week, time of day.

Where is the sensitive data stored? This will be where the policy is enforced. At the protector.

Audit authorized or un-authorized access to sensitive data. Optional audit of protect/unprotect.

Page 22: Five steps to secure big data

Policy Based Filed Protection Example

Files with personal identifiable informationLoaded in to a Hive table

Create a view on that table

Select data as authorized user

Select data as privileged user

Page 23: Five steps to secure big data

Enterprise

Enterprise Strength

Protection platforms must protect sensitive data end to

23

Enterprise protect sensitive data end to end – at rest, in transit and on any technology platform

Page 24: Five steps to secure big data

End to End Data Security Across the Enterprise

24

Enterprise Heterogeneous Coverage

• File Protectors: AIX, HPUX, Linux, Solaris, Windows

• Database Protectors : DB2, SQL Server, Oracle, Teradata, Informix, Netezza, Greenplum

• Big Data Protectors: BigInsights, Cloudera, Greenplum, mapR, Aster, Apache Hadoop, Hortonworks

• Big Iron Platform: zSeries, HP Non-Stop

Page 25: Five steps to secure big data

Best Practices for Protecting Big Data

Start Early

Fine Grained protection

Select the optimal protection for the future

Enterprise coverage

Protection against insider threatProtection against insider threat

Transparent protection to the analysis process

Policy based protection and audit

25

Page 26: Five steps to secure big data

Five Point Data Protection Methodology

26

1. Classify 2. Discovery 3. Protect 4. Enforce 5. Monitor

Page 27: Five steps to secure big data

Classify

Determine what data is sensitive to your organization.

27

sensitive to your organization.

Page 28: Five steps to secure big data

Financial Services

Healthcare and Pharmaceuticals

Infrastructure and Energy

Federal Government

Select US Regulations for Security and Privacy

Federal Government

28

Page 29: Five steps to secure big data

1. Classify: Examples of Sensitive Data

Sensitive Information Compliance Regulation / Laws

Credit Card Numbers PCI DSS

Names HIPAA, State Privacy Laws

Address HIPAA, State Privacy Laws

Dates HIPAA, State Privacy Laws

Phone Numbers HIPAA, State Privacy Laws

29

Personal ID Numbers HIPAA, State Privacy Laws

Personally owned property numbers HIPAA, State Privacy Laws

Personal Characteristics HIPAA, State Privacy Laws

Asset Information HIPAA, State Privacy Laws

Page 30: Five steps to secure big data

Discovery

Discover where the sensitive data is located and how it flows

30

data is located and how it flows

Page 31: Five steps to secure big data

2. Discovery in a large enterprise with many systems

System

SystemSystem

System

System

System

031

System

Corporate Firewall

System

System

031

System

System System

System

Page 32: Five steps to secure big data

2. Discovery: Determine the context to the Business

System

System System

Retail

Employees

032

System

Corporate Firewall

System

032

System

System

Employees

Corporate IP

Healthcare

Page 33: Five steps to secure big data

2. Discover: Context to the Business and to Security

Stores & Ecommerce

Data Protection Solution

File Server

Databases

Collecting transactions

033

Corporate Firewall

Applications

Research Databases

Solution Requirements

File Server containing IP

Hadoop

Page 34: Five steps to secure big data

Protect

Protect the sensitive data at rest and in transit.

34

rest and in transit.

Page 35: Five steps to secure big data

Balancing Security and Data Insight

Tug of war between security and data insight

Big Data is designed for access

Privacy regulations require de-identification

Granular data-level protectionGranular data-level protection

Traditional security don’t allow for seamless data use

35

Page 36: Five steps to secure big data

Protection Beyond Kerberos

API enabled Field level data protection

API enabled Field level data protection

MapReduce(Job Scheduling/Execution System)

Pig (Data Flow) Hive (SQL) Sqoop

ETL Tools BI Reporting RDBMS

36

Volume Encryption

Field level data protection for existing and new data.HDFS

(Hadoop Distributed File System)

Hbase (Column DB)

Page 37: Five steps to secure big data

Volume Encryption

MapReduceEntire file is in the clear when analyzed

37

HDFS

Protected with Volume Encryption

Page 38: Five steps to secure big data

File Encryption – Authorized User

MapReduceEntire file is in the clear when analyzed

38

HDFS

Protected with File Encryption

Page 39: Five steps to secure big data

File Encryption – Non Authorized User

MapReduceEntire file is in unreadable when analyzed

39

HDFS

Protected with File Encryption

Page 40: Five steps to secure big data

Volume Encryption + Gateway Field Protection

MapReduce

Kerberos

Granular Field Level Protection

40

HDFSKerberos AccessControl

Protected with Volume Encryption

Data Protection File Gateway

Page 41: Five steps to secure big data

Volume Encryption + Internal MapReduce Field Protection

MapReduce

Granular Field Level Protection

Hadoop Staging

Analytics

41

HDFSKerberos Access Control

Protected with Volume EncryptionMapReduce

Page 42: Five steps to secure big data

Enforce

Policies are used to enforce rules about how sensitive data

42

rules about how sensitive data should be treated in the enterprise.

Page 43: Five steps to secure big data

A Data Security Policy

What is the sensitive data that needs to be protected. Data Element.

How you want to protect and present sensitive data. There are several methods for protecting sensitive data. Encryption, tokenization, monitoring, etc.

Who should have access to sensitive data and who should not. Security access control. Roles & Members.

What

Who

How

43

When should sensitive data access be granted to those who have access. Day of week, time of day.

Where is the sensitive data stored? This will be where the policy is enforced. At the protector.

Audit authorized or un-authorized access to sensitive data. Optional audit of protect/unprotect.

When

Where

Audit

Page 44: Five steps to secure big data

Volume Encryption + Field Protection + Policy Enforcement

MapReduce

44

HDFSProtected with

Volume Encryption

Data Protection Policy

Page 45: Five steps to secure big data

Volume Encryption + Field Protection + Policy Enforcement

MapReduce

45

HDFSProtected with

Volume Encryption

Data Protection Policy

Page 46: Five steps to secure big data

4. Authorized User ExamplePresentation to requestorName: Joe SmithAddress: 100 Main Street, Pleasantville, CA

Selected data displayed (least privilege)

Data Scientist, Business Analyst

PolicyEnforcement

Does the requestor have the authority to access the protected data?

Authorized

Request

Response

46

Protection at restName: csu wusojAddress: 476 srta coetse, cysieondusbak, CA

Page 47: Five steps to secure big data

4. Un-Authorized User Example

Request

Response

Presentation to requestorName: csu wusojAddress: 476 srta coetse, cysieondusbak, CA

Privileged Used, DBA, System Administrators, Bad Guy

PolicyEnforcement

Does the requestor have the authority to access the protected data?

Not Authorized

47

Protection at restName: csu wusojAddress: 476 srta coetse, cysieondusbak, CA

Page 48: Five steps to secure big data

Monitor

A critically important part of a security solution is the ongoing

48

security solution is the ongoing monitoring of any activity on sensitive data.

Page 49: Five steps to secure big data

Best Practices for Protecting Big Data

Start early

Granular protection

Select the optimal protection

Enterprise coverage

Protection against insider threat Protection against insider threat

Protect highly sensitive data in a way that is mostly transparent to the analysis process

Policy based protection

Record data access events

49

Page 50: Five steps to secure big data

How Protegrity Can Help

1

2

3

We can help you Classify the sensitive data

We can help you Discover where the sensitive data sits

We can help you Protect your sensitive data in a flexible way

50

3

4

5

We can help you Protect your sensitive data in a flexible way

We can help you Enforce policies that will enable business functions and preventing sensitive data from the wrong hands.

We can help you Monitor sensitive data to gain insights on abnormal behaviors.

Page 51: Five steps to secure big data

Protegrity Summary

Proven enterprise data security software and innovation leader

• Sole focus on the protection of data

• Patented Technology, Continuing to Drive Innovation

Cross-industry applicability• Retail, Hospitality, Travel and

TransportationTransportation

• Financial Services, Insurance, Banking

• Healthcare

• Telecommunications, Media and Entertainment

• Manufacturing and Government

51

Page 52: Five steps to secure big data

Please contact us for more information

[email protected]

[email protected]