SlideShare a Scribd company logo
1 of 15
Understanding Database 
Encryption & Protecting 
Against the Insider Threat with 
MongoDB 
Eric Brown 
Senior Systems Engineer, Vormetric 
@er1cb
The Concern is Real 
Insider threat on the rise 
Webcast: Best Practices – #InsiderThreat
What do they want?
How do tthey gett iitt? 
> 
Bypassing traditional security solutions 
Slow provisioning and de-provisioning
Insiders Harder to Detect 
Lots of Logs 
Check-In-The-Box 
Consequences
Data Security Survival Tactics 
A disjointed, expensive collection of point products 
Customer 
Records 
Database 
Encryption 
PII 
Compliance 
App 
Encryption 
Cloud 
Migration 
Cloud 
Encryption 
Physical 
Security 
Full Disk 
Encryption 
Tape 
Archives 
Key 
Management 
Privileged 
User Control 
Each use case requires individual infrastructure, management consoles and training 
• Acquire 
• Install/Rollout 
• Configure 
• Integrate 
• Set policy 
• Train 
• Enforce 
• Monitor 
• DR / Failover 
• Maintain 
• Audit 
• Backup …. 
Time X Money X Manpower 
Expense 
Reports 
File 
Encryption 
+ + + + + + 
Access 
Policies 
… 
9 Copyright 2014 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
Reduce the Attack Surface from Privileged 
Users and APTs by Firewalling Data 
APT and 
Malicious Insiders 
Mission 
User 
Enterprise System 
Administrator 
(Privileged User) 
Virtual Machine Layer 
Hypervisor Layer 
Encrypted Multi-Tenant Storage 
Hypervisor 
Administrator 
Storage 
Administrator 
Business Unit 
Virtualized/Cloud 
Infrastructure 
10 
Security Intelligence
Vormetric Data Security 
#DEFENDEROFDATA 
Vision 
To Secure the World’s Information 
Purpose 
To Protect What Matters, Where it Matters. 
Customers 
1400+ Customers Worldwide 
17 of Fortune 25 
Global Presence 
Global Headquarters - San Jose, CA, USA 
EMEA Headquarters - Reading, United Kingdom 
APAC Headquarters -, Gangnam-gu, Seoul 
Best 
Encryption 
Solution 
11 Copyright 2014 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
Why Vormetric for MongoDB? 
Transparent Encryption 
No changes to application or database 
Field Level Encryption 
Encrypt selected fields (i.e. social security numbers) 
Blind the DBA 
Block Administrative Users 
Root level users can access data files but can’t view raw text (user based access 
control + process based access control) 
Centralized key management 
Policy and key management on separate device from where the encrypted data 
is located 
Protect ingress data, egress reports, configuration, and log 
files
Vormetric Transparent Encryption 
Simplified encryption and access control 
Allow/Block 
Encrypt/Decrypt 
User 
Database 
Application 
File 
Systems 
Volume 
Managers 
Storage 
Big Data, Databases or Files 
Approved Processes 
and Users 
Privileged 
Users SA 
root user 
*$^!@#)( 
-|”_}?$%-:>> 
John Smith 
401 Main Street 
Cloud Provider / 
Outsource 
Administrators 
*$^!@#)( 
-|”_}?$%-:>> 
Vormetric 
Security 
Intelligence 
Logs to SIEM 
DSM 
Vormetric 
Data Security Manager 
on Enterprise premise or in cloud 
virtual or physical appliance 
1 
2
Vormetric Data Security Platform 
Single Platform– Multiple Solutions 
Vormetric 
Transparent Encryption 
Unstructured 
Files 
Structured 
Databases 
Big Data 
Environment Support 
Physical 
Public Cloud 
Hybrid 
Private Cloud 
Data 
Centers 
Vormetric 
Data Security Manager Appliance 
Virtual 
or 
Integrated Key and Policy Manager 
• File and Volume Level Encryption 
• Access Control 
Vormetric 
Application Encryption 
Name: Jon Dough 
SS: if030jcl 
PO: Jan395-2014 
Data at Rest 
Apps 
Cloud 
Big Data 
• Flexible – Environment 
& Field Encryption
Encryption still works! 
Source: blogs.intel.com
Vormetric Security Intelligence 
Accelerate Insider Threat and APT Detection 
• Log and audit data access 
• Alarm abnormal access patterns 
• Identify compromised users, administrators and applications 
• Accelerate APT and malicious insider recognition 
• Supports compliance and contractual mandate reporting
Vormetric Security Intelligence
Value of Vormetric Security Intelligence 
and SIEM Integration 
“In order to be effective for early breach detection, the analytics capability must 
incorporate context about users, assets, threats, and network activity, and must also 
provide query performance that supports an iterative approach to investigation.” 
- Kelly Kavanagh 
Greater visibility into protected file access attempts 
Granular details of who is accessing directories and files 
Awareness to root impersonation of users attempting file access 
Compliance and security inherent to the Vormetric Solution 
Access Controls 
Encryption 
Structured and unstructured data security 
Centralized management across virtual, cloud and physical environments

More Related Content

What's hot

Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
Phillip Stalnaker
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
vfmindia
 

What's hot (20)

Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 
Big data security
Big data securityBig data security
Big data security
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
Crypto academy
Crypto academyCrypto academy
Crypto academy
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
Network security
Network securityNetwork security
Network security
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with Sparrow
 
Encryption: Fact and Fiction
Encryption: Fact and FictionEncryption: Fact and Fiction
Encryption: Fact and Fiction
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security Infographic
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration Testing
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 

Similar to Understanding Database Encryption & Protecting Against the Insider Threat with MongoDB

Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
stefanjung
 

Similar to Understanding Database Encryption & Protecting Against the Insider Threat with MongoDB (20)

Dstca
DstcaDstca
Dstca
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 

More from MongoDB

More from MongoDB (20)

MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
MongoDB SoCal 2020: Migrate Anything* to MongoDB AtlasMongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
 
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
 
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
 
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDBMongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
 
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
 
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series DataMongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
 
MongoDB SoCal 2020: MongoDB Atlas Jump Start
 MongoDB SoCal 2020: MongoDB Atlas Jump Start MongoDB SoCal 2020: MongoDB Atlas Jump Start
MongoDB SoCal 2020: MongoDB Atlas Jump Start
 
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
 
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
 
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
 
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
 
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your MindsetMongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
 
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
MongoDB .local San Francisco 2020: MongoDB Atlas JumpstartMongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
 
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
 
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
 
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
 
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep DiveMongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
 
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & GolangMongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
 
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
 
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Understanding Database Encryption & Protecting Against the Insider Threat with MongoDB

  • 1. Understanding Database Encryption & Protecting Against the Insider Threat with MongoDB Eric Brown Senior Systems Engineer, Vormetric @er1cb
  • 2. The Concern is Real Insider threat on the rise Webcast: Best Practices – #InsiderThreat
  • 3. What do they want?
  • 4. How do tthey gett iitt? > Bypassing traditional security solutions Slow provisioning and de-provisioning
  • 5. Insiders Harder to Detect Lots of Logs Check-In-The-Box Consequences
  • 6. Data Security Survival Tactics A disjointed, expensive collection of point products Customer Records Database Encryption PII Compliance App Encryption Cloud Migration Cloud Encryption Physical Security Full Disk Encryption Tape Archives Key Management Privileged User Control Each use case requires individual infrastructure, management consoles and training • Acquire • Install/Rollout • Configure • Integrate • Set policy • Train • Enforce • Monitor • DR / Failover • Maintain • Audit • Backup …. Time X Money X Manpower Expense Reports File Encryption + + + + + + Access Policies … 9 Copyright 2014 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  • 7. Reduce the Attack Surface from Privileged Users and APTs by Firewalling Data APT and Malicious Insiders Mission User Enterprise System Administrator (Privileged User) Virtual Machine Layer Hypervisor Layer Encrypted Multi-Tenant Storage Hypervisor Administrator Storage Administrator Business Unit Virtualized/Cloud Infrastructure 10 Security Intelligence
  • 8. Vormetric Data Security #DEFENDEROFDATA Vision To Secure the World’s Information Purpose To Protect What Matters, Where it Matters. Customers 1400+ Customers Worldwide 17 of Fortune 25 Global Presence Global Headquarters - San Jose, CA, USA EMEA Headquarters - Reading, United Kingdom APAC Headquarters -, Gangnam-gu, Seoul Best Encryption Solution 11 Copyright 2014 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  • 9. Why Vormetric for MongoDB? Transparent Encryption No changes to application or database Field Level Encryption Encrypt selected fields (i.e. social security numbers) Blind the DBA Block Administrative Users Root level users can access data files but can’t view raw text (user based access control + process based access control) Centralized key management Policy and key management on separate device from where the encrypted data is located Protect ingress data, egress reports, configuration, and log files
  • 10. Vormetric Transparent Encryption Simplified encryption and access control Allow/Block Encrypt/Decrypt User Database Application File Systems Volume Managers Storage Big Data, Databases or Files Approved Processes and Users Privileged Users SA root user *$^!@#)( -|”_}?$%-:>> John Smith 401 Main Street Cloud Provider / Outsource Administrators *$^!@#)( -|”_}?$%-:>> Vormetric Security Intelligence Logs to SIEM DSM Vormetric Data Security Manager on Enterprise premise or in cloud virtual or physical appliance 1 2
  • 11. Vormetric Data Security Platform Single Platform– Multiple Solutions Vormetric Transparent Encryption Unstructured Files Structured Databases Big Data Environment Support Physical Public Cloud Hybrid Private Cloud Data Centers Vormetric Data Security Manager Appliance Virtual or Integrated Key and Policy Manager • File and Volume Level Encryption • Access Control Vormetric Application Encryption Name: Jon Dough SS: if030jcl PO: Jan395-2014 Data at Rest Apps Cloud Big Data • Flexible – Environment & Field Encryption
  • 12. Encryption still works! Source: blogs.intel.com
  • 13. Vormetric Security Intelligence Accelerate Insider Threat and APT Detection • Log and audit data access • Alarm abnormal access patterns • Identify compromised users, administrators and applications • Accelerate APT and malicious insider recognition • Supports compliance and contractual mandate reporting
  • 15. Value of Vormetric Security Intelligence and SIEM Integration “In order to be effective for early breach detection, the analytics capability must incorporate context about users, assets, threats, and network activity, and must also provide query performance that supports an iterative approach to investigation.” - Kelly Kavanagh Greater visibility into protected file access attempts Granular details of who is accessing directories and files Awareness to root impersonation of users attempting file access Compliance and security inherent to the Vormetric Solution Access Controls Encryption Structured and unstructured data security Centralized management across virtual, cloud and physical environments