SlideShare a Scribd company logo
1 of 22
Download to read offline
Data Security Challenges and Its
Solutions in Cloud Environment
Threats, Security Responsibilities, Compliances, Solutions
WAREVALLEY
http://www.warevalley.com
www.warevalley.com
1. Excessive and Unused Privileges
2. Privileges Abuse
3. Input Injection (Formerly SQL Injection)
4. Malware
5. Weak Audit Trail
6. Storage Media Exposure
7. Exploitation of Vulnerable, Misconfigured Databases
8. Unmanaged Sensitive Data
9. Denial of Service
10. Limited Security Expertise and Education
Top Ten Database Security Threat
Source : 2014 Verizon Data Breach Report
Traditional databases, Big Data / On-Premise or Cloud
www.warevalley.com
1. Default, Blank & Weak Username/Password
2. SQL Injections in the DBMS
3. Excessive User & Group Privilege
4. Unnecessary Enabled Database Features
5. Broken Configuration Management
6. Buffer Overflows
7. Privilege Escalation
8. Denial of Service Attack DoS
9. Unpatched Databases
10. Unencrypted Sensitive data – at rest and in motion
Top Ten Database Vulnerabilities and
Misconfigurations
Source : Team SHATTER
www.warevalley.com
Database Security on Cloud
1. What data are you moving ?
• Sensitive Data Discovery
• IT Compliances after you move data to cloud
• Security Hole in data migration
2. Who is accessing the database?
• Administrators, Developers and Applications
• DAP, Masking, Encryption, Approval Process
3. To where are you moving the data?
• Physical and Network Security infrastructures
• Who has administration access to the database ?
• Different geographic locations = Different regulations, laws and standards
Source : Security Week
www.warevalley.com
Responsibility Challenge on Cloud
1. Protecting the data as it moves to the cloud
• Data-in-motion encryption : SSL or VPN
2. Hardening instances
• With IaaS, the customer is responsible for securing the operating
system. This includes hardening processes, patches, security software
installation and following the database vendor’s security guidelines.
3. Protect management console access
• Role-based access to dashboard
• Data recovery plan to an external location
4. Prepare plan for availability, backups, DR and Business Continuity
• Using IaaS provider’s tools for backup and DR
• Customer is responsible for deploying others
Source : Security Week
www.warevalley.com
Shared Responsibility Model for Abstracted Services
Customer
Responsible for
Security ‘IN’ the Cloud
AWS
Responsible for
Security ‘OF’ the Cloud
www.warevalley.com
Shared Responsibility Model – Microsoft Azure
www.warevalley.com
Shared Responsibility Model by Service Type
www.warevalley.com
Compliance Challenge on Cloud
1. Understanding where the data
• Regulated data should be mapped to exact locations.
2. Separation of duties
• Between production and test environment data
• Between non-regulated and regulated applications
• Between the different roles involved with handling the data
3. Identity Management
4. Access controls should be in place
• All sensitive data should be governed, monitored and approved.
Source : Security Week
www.warevalley.com
Compliance Challenge on Cloud
5. Encryption and encryption alternatives
• Data encryption, tokenization, data masking
6. Detecting, Preventing and mitigating attacks
• Detect and prevent attacks on the database (e.g., SQL injection attacks)
• Adequate controls and audit infrastructure
7. Operational Security
• Govern asset management,
• Change management, production access,
• Periodic vulnerability scanning,
• Adequate remediation procedures,
• User access audit, management operation
• Event response procedures
Source : Security Week
www.warevalley.com
Considering database security on cloud
 Database Access Management
 Database Firewall
 Sensitive Data Discovery
 Database Encryption
 Dynamic Data Masking
 Database Authentication
 SQL Injection Attacks
 Database Compliance Reports
www.warevalley.com
Amazon RDS Security Features
• Run your DB instance in an Amazon Virtual Private Cloud (VPC)
– Network Access Control
• Use AWS Identity and Access Management (IAM) - assign
permissions that determine who is allowed to manage RDS resources
• Use security groups - control what IP addresses or EC2 instances can
connect to your databases on a DB instance
• Use Secure Socket Layer (SSL) connections with DB instances
• Use RDS encryption - AES-256 encryption algorithm to encrypt your
data
• Use network encryption and transparent data encryption with
Oracle DB instances
• Use the security features of your DB engine
Source : AWS
www.warevalley.com
Azure Database Security Features
• Firewall - IP addresses, can access a logical Azure SQL Server or a
specific database
• Secure Connection - Secure communication from clients based
on the TDS protocol over TLS (Transport Layer Security)
• Auditing - auditing events include insert, update, and delete
events on tables /Audit logs in Azure table storage and build
reports on top of them
• Data masking - SQL users excluded from masking, Masking rules
& functions
• Row-level Security - Aimed at multi-tenant applications that
share data in a single table within the same database.
Source : blogs.msdn.microsoft.com
www.warevalley.com
DCAP Capabilities offered by Vendors
Source : Gartner (Nov. 2014)
Data-Centric Audit and Protection
www.warevalley.com
Chakra MAX V2
• Database(System) Audit and Protection
• Database(System) Activity Monitoring
• Database(System) Work Approval Process
• Dynamic Data Masking
• Sensitive Data Discovery
• Compliance Reports
Systems
Windows
HP-UX
AIX
Solaris
Linux
Mainframe
Databases
Oracle / Time-Stan /Exadata
Microsoft SQL Server
IBM DB2 (Mainframe, UDB)
SAP Sybase IQ/ASE
SAP HANA
Mysql / MariaDB
IBM Netezza
TeraData
PostgreSQL / Greenplum
Altibase / Tibero / Cubrid / Kairos / SunDB
Amazon RedShift / Aurora
Dameng DM7
Fujitsu Symfoware
PetaSQL
Chakra MAX(Database Audit and Protection) on Cloud
www.warevalley.com
Chakra MAX(Database Audit and Protection) on Cloud
DB service
STAP
Chakra MAX for AWS RDS(DB as a service)
• Sniffing is Impossible - Port Mirror (X), TAP(X), STAP(X)
• Gateway(Proxy Sever) is OK
Chakra MAX for EC2 (Infrastructure as a service)
• Sniffing is Possible – STAP
• Gateway(Proxy Server) is OK
DB service
STAP
RDS
EC2
Gateway Only
Gateway + Sniffing
www.warevalley.com
Chakra MAX(Database Audit and Protection) on Cloud
Client A
AWS
Client B
WAS (EC2)
DB (RDS)
Chakra Max SAGENT
Chakra Max (EC2)
SAGENT analyze end user’s information
and notify it to Chakra MAX
Client A
Client B
WEB Users
Internet
DB Users
①
①
①
②
Internet
②
DB users connect to DB
through Chakra MAX server
as gateway(Proxy) mode.
Blocking backdoor
connection
User Access Control
DNS
Mapping DNS to real IP Address
Sniffing Mode (Database Activity Monitoring)
Gateway Mode (Database Audit and Protection)
www.warevalley.com
Systems DatabasesWeb
Cyclone V3
• Auto Service Discovery
• Sensitive Data Discovery in System/DB
• Database Audit / Change Management
• DB Vulnerability Assessment
• Compliance Reports
Cyclone(Database Security Assessment) on Cloud
www.warevalley.com
Cyclone(Database Security Assessment) on Cloud
Sensitive Data, Security Holes, Vulnerabilities on your Database !
www.warevalley.com
Plugin
Authorized User (Plain Text)
Unauthorized User (Cipher Text or Masked)
Sensitive Data (Columns)
has been Encrypted
End User (Plain Text)
Galea(Database Encryption-Column Level) on Cloud
API
Authorized Applications
www.warevalley.com
Galea(Database Encryption-Column Level) on Cloud
Column-Level Encryption Plan
(Algorithm, Keys ..)
Authorization Policies to Decrypt
(Client IP, DB User, Application, Time & Date)
Return Masked Data
Return Encrypted Data
Return Decrypted Data
Unauthorized Users
Authorized Users
No need to modify customer’s application !
www.warevalley.com
WAREVALLEY : Database Security and Management
DB Encryption (Plugin) DB Encryption (API)
DB (System) Audit and Protection
Dynamic Data Masking
Work Flow Process
DB Administration, Performance Monitoring
Data Quality Assessment
Sensitive Data Discovery
DB Security Assessment
DB Vulnerability Assessment
Big Data Analysis
Datawarehouse

More Related Content

What's hot

5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-Ready5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-ReadyEDB
 
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and Roadmap
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and RoadmapDenodo DataFest 2016: What’s New in Denodo Platform – Demo and Roadmap
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and RoadmapDenodo
 
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with OktopusDenodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with OktopusDenodo
 
Future of Data Strategy
Future of Data StrategyFuture of Data Strategy
Future of Data StrategyDenodo
 
Gdpr ccpa automated compliance - spark java application features and functi...
Gdpr   ccpa automated compliance - spark java application features and functi...Gdpr   ccpa automated compliance - spark java application features and functi...
Gdpr ccpa automated compliance - spark java application features and functi...Steven Meister
 
White paper making an-operational_data_store_(ods)_the_center_of_your_data_...
White paper   making an-operational_data_store_(ods)_the_center_of_your_data_...White paper   making an-operational_data_store_(ods)_the_center_of_your_data_...
White paper making an-operational_data_store_(ods)_the_center_of_your_data_...Eric Javier Espino Man
 
Reconciling your Enterprise Data Warehouse to Source Systems
Reconciling your Enterprise Data Warehouse to Source SystemsReconciling your Enterprise Data Warehouse to Source Systems
Reconciling your Enterprise Data Warehouse to Source SystemsMethod360
 
Metastudio DRM. Product presentation (en)
Metastudio DRM. Product presentation (en)Metastudio DRM. Product presentation (en)
Metastudio DRM. Product presentation (en)Ireneusz Chmielak
 
Big Data: SQL query federation for Hadoop and RDBMS data
Big Data:  SQL query federation for Hadoop and RDBMS dataBig Data:  SQL query federation for Hadoop and RDBMS data
Big Data: SQL query federation for Hadoop and RDBMS dataCynthia Saracco
 
Next gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forteNext gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forteMicrosoft Singapore
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopCitiusTech
 
Components of a Data-Warehouse
Components of a Data-WarehouseComponents of a Data-Warehouse
Components of a Data-WarehouseAbdul Aslam
 
Knowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your diseaseKnowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your diseaseeHealth Forum
 
2013 OHSUG - Clinical Data Warehouse Implementation
2013 OHSUG - Clinical Data Warehouse Implementation2013 OHSUG - Clinical Data Warehouse Implementation
2013 OHSUG - Clinical Data Warehouse ImplementationPerficient
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityGeorgi Kodinov
 
A3 oracle database 12c extreme performance for cloud computing
A3   oracle database 12c extreme performance for cloud computingA3   oracle database 12c extreme performance for cloud computing
A3 oracle database 12c extreme performance for cloud computingDr. Wilfred Lin (Ph.D.)
 

What's hot (20)

5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-Ready5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-Ready
 
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and Roadmap
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and RoadmapDenodo DataFest 2016: What’s New in Denodo Platform – Demo and Roadmap
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and Roadmap
 
Dbm630_Lecture02-03
Dbm630_Lecture02-03Dbm630_Lecture02-03
Dbm630_Lecture02-03
 
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with OktopusDenodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
 
EDB Guide
EDB GuideEDB Guide
EDB Guide
 
Future of Data Strategy
Future of Data StrategyFuture of Data Strategy
Future of Data Strategy
 
Gdpr ccpa automated compliance - spark java application features and functi...
Gdpr   ccpa automated compliance - spark java application features and functi...Gdpr   ccpa automated compliance - spark java application features and functi...
Gdpr ccpa automated compliance - spark java application features and functi...
 
White paper making an-operational_data_store_(ods)_the_center_of_your_data_...
White paper   making an-operational_data_store_(ods)_the_center_of_your_data_...White paper   making an-operational_data_store_(ods)_the_center_of_your_data_...
White paper making an-operational_data_store_(ods)_the_center_of_your_data_...
 
Reconciling your Enterprise Data Warehouse to Source Systems
Reconciling your Enterprise Data Warehouse to Source SystemsReconciling your Enterprise Data Warehouse to Source Systems
Reconciling your Enterprise Data Warehouse to Source Systems
 
Metastudio DRM. Product presentation (en)
Metastudio DRM. Product presentation (en)Metastudio DRM. Product presentation (en)
Metastudio DRM. Product presentation (en)
 
Big Data: SQL query federation for Hadoop and RDBMS data
Big Data:  SQL query federation for Hadoop and RDBMS dataBig Data:  SQL query federation for Hadoop and RDBMS data
Big Data: SQL query federation for Hadoop and RDBMS data
 
Data warehouse testing
Data warehouse testingData warehouse testing
Data warehouse testing
 
Next gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forteNext gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forte
 
3 dw architectures
3 dw architectures3 dw architectures
3 dw architectures
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on Hadoop
 
Components of a Data-Warehouse
Components of a Data-WarehouseComponents of a Data-Warehouse
Components of a Data-Warehouse
 
Knowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your diseaseKnowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your disease
 
2013 OHSUG - Clinical Data Warehouse Implementation
2013 OHSUG - Clinical Data Warehouse Implementation2013 OHSUG - Clinical Data Warehouse Implementation
2013 OHSUG - Clinical Data Warehouse Implementation
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
 
A3 oracle database 12c extreme performance for cloud computing
A3   oracle database 12c extreme performance for cloud computingA3   oracle database 12c extreme performance for cloud computing
A3 oracle database 12c extreme performance for cloud computing
 

Viewers also liked

[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료
[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료
[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료K data
 
PHP and database functionality
PHP and database functionalityPHP and database functionality
PHP and database functionalitySayed Ahmed
 
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안K data
 
跨平台開發從測試到架構
跨平台開發從測試到架構跨平台開發從測試到架構
跨平台開發從測試到架構Chris Jeng
 
2016 네이버sw기술소개
2016 네이버sw기술소개2016 네이버sw기술소개
2016 네이버sw기술소개NAVER Engineering
 
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대강 민우
 
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbotK data
 
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측K data
 
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스K data
 
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론K data
 
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...K data
 
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with dataK data
 
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...K data
 
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안K data
 
저성장 시대 데이터 경제만이 살길이다
저성장 시대 데이터 경제만이 살길이다저성장 시대 데이터 경제만이 살길이다
저성장 시대 데이터 경제만이 살길이다eungjin cho
 
Data Science Driven Malware Detection
Data Science Driven Malware DetectionData Science Driven Malware Detection
Data Science Driven Malware DetectionVMware Tanzu
 
[FAST CAMPUS] 1강 data science overview
[FAST CAMPUS] 1강 data science overview [FAST CAMPUS] 1강 data science overview
[FAST CAMPUS] 1강 data science overview chanyoonkim
 

Viewers also liked (18)

[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료
[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료
[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료
 
Trees in RDBs
Trees in RDBsTrees in RDBs
Trees in RDBs
 
PHP and database functionality
PHP and database functionalityPHP and database functionality
PHP and database functionality
 
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안
 
跨平台開發從測試到架構
跨平台開發從測試到架構跨平台開發從測試到架構
跨平台開發從測試到架構
 
2016 네이버sw기술소개
2016 네이버sw기술소개2016 네이버sw기술소개
2016 네이버sw기술소개
 
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대
 
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot
 
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측
 
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스
 
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론
 
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...
 
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data
 
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...
 
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안
 
저성장 시대 데이터 경제만이 살길이다
저성장 시대 데이터 경제만이 살길이다저성장 시대 데이터 경제만이 살길이다
저성장 시대 데이터 경제만이 살길이다
 
Data Science Driven Malware Detection
Data Science Driven Malware DetectionData Science Driven Malware Detection
Data Science Driven Malware Detection
 
[FAST CAMPUS] 1강 data science overview
[FAST CAMPUS] 1강 data science overview [FAST CAMPUS] 1강 data science overview
[FAST CAMPUS] 1강 data science overview
 

Similar to [2016 데이터 그랜드 컨퍼런스] 5 1(보안,품질). 웨어밸리 data security challenges and its solutions in cloud environment

Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practicesSundeep Roxx
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureMarketingArrowECS_CZ
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersTobias Koprowski
 
Cloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWSCloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWSCloudHesive
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...Amazon Web Services
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayAWS Germany
 
Rackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSRackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSAmazon Web Services
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanNCCOMMS
 
Aws Architecture Fundamentals | Dallas
Aws Architecture Fundamentals | DallasAws Architecture Fundamentals | Dallas
Aws Architecture Fundamentals | DallasNicole Maus
 
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAmazon Web Services
 
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...Amazon Web Services
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...Amazon Web Services
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeHimani Singh
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresAmazon Web Services
 
Big data security in AWS.pptx
Big data security in AWS.pptxBig data security in AWS.pptx
Big data security in AWS.pptxAshish210583
 

Similar to [2016 데이터 그랜드 컨퍼런스] 5 1(보안,품질). 웨어밸리 data security challenges and its solutions in cloud environment (20)

Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud Infrastructure
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginners
 
Cloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWSCloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWS
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 
HIPAA Compliance in the Cloud
HIPAA Compliance in the CloudHIPAA Compliance in the Cloud
HIPAA Compliance in the Cloud
 
Rackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSRackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWS
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
Aws Architecture Fundamentals | Dallas
Aws Architecture Fundamentals | DallasAws Architecture Fundamentals | Dallas
Aws Architecture Fundamentals | Dallas
 
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
 
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account Structures
 
Big data security in AWS.pptx
Big data security in AWS.pptxBig data security in AWS.pptx
Big data security in AWS.pptx
 

More from K data

[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향
[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향
[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향K data
 
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상K data
 
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질K data
 
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안K data
 
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화K data
 
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이 데이터정제와품질검증을위한mdm 시스템의기능과역할
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이  데이터정제와품질검증을위한mdm 시스템의기능과역할[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이  데이터정제와품질검증을위한mdm 시스템의기능과역할
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이 데이터정제와품질검증을위한mdm 시스템의기능과역할K data
 
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다K data
 
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...K data
 
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남K data
 
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상K data
 
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현K data
 
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big dataK data
 
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략K data
 
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아K data
 
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-finalK data
 

More from K data (15)

[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향
[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향
[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향
 
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상
 
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질
 
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안
 
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화
 
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이 데이터정제와품질검증을위한mdm 시스템의기능과역할
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이  데이터정제와품질검증을위한mdm 시스템의기능과역할[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이  데이터정제와품질검증을위한mdm 시스템의기능과역할
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이 데이터정제와품질검증을위한mdm 시스템의기능과역할
 
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다
 
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...
 
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남
 
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상
 
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현
 
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data
 
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략
 
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아
 
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

[2016 데이터 그랜드 컨퍼런스] 5 1(보안,품질). 웨어밸리 data security challenges and its solutions in cloud environment

  • 1. Data Security Challenges and Its Solutions in Cloud Environment Threats, Security Responsibilities, Compliances, Solutions WAREVALLEY http://www.warevalley.com
  • 2. www.warevalley.com 1. Excessive and Unused Privileges 2. Privileges Abuse 3. Input Injection (Formerly SQL Injection) 4. Malware 5. Weak Audit Trail 6. Storage Media Exposure 7. Exploitation of Vulnerable, Misconfigured Databases 8. Unmanaged Sensitive Data 9. Denial of Service 10. Limited Security Expertise and Education Top Ten Database Security Threat Source : 2014 Verizon Data Breach Report Traditional databases, Big Data / On-Premise or Cloud
  • 3. www.warevalley.com 1. Default, Blank & Weak Username/Password 2. SQL Injections in the DBMS 3. Excessive User & Group Privilege 4. Unnecessary Enabled Database Features 5. Broken Configuration Management 6. Buffer Overflows 7. Privilege Escalation 8. Denial of Service Attack DoS 9. Unpatched Databases 10. Unencrypted Sensitive data – at rest and in motion Top Ten Database Vulnerabilities and Misconfigurations Source : Team SHATTER
  • 4. www.warevalley.com Database Security on Cloud 1. What data are you moving ? • Sensitive Data Discovery • IT Compliances after you move data to cloud • Security Hole in data migration 2. Who is accessing the database? • Administrators, Developers and Applications • DAP, Masking, Encryption, Approval Process 3. To where are you moving the data? • Physical and Network Security infrastructures • Who has administration access to the database ? • Different geographic locations = Different regulations, laws and standards Source : Security Week
  • 5. www.warevalley.com Responsibility Challenge on Cloud 1. Protecting the data as it moves to the cloud • Data-in-motion encryption : SSL or VPN 2. Hardening instances • With IaaS, the customer is responsible for securing the operating system. This includes hardening processes, patches, security software installation and following the database vendor’s security guidelines. 3. Protect management console access • Role-based access to dashboard • Data recovery plan to an external location 4. Prepare plan for availability, backups, DR and Business Continuity • Using IaaS provider’s tools for backup and DR • Customer is responsible for deploying others Source : Security Week
  • 6. www.warevalley.com Shared Responsibility Model for Abstracted Services Customer Responsible for Security ‘IN’ the Cloud AWS Responsible for Security ‘OF’ the Cloud
  • 9. www.warevalley.com Compliance Challenge on Cloud 1. Understanding where the data • Regulated data should be mapped to exact locations. 2. Separation of duties • Between production and test environment data • Between non-regulated and regulated applications • Between the different roles involved with handling the data 3. Identity Management 4. Access controls should be in place • All sensitive data should be governed, monitored and approved. Source : Security Week
  • 10. www.warevalley.com Compliance Challenge on Cloud 5. Encryption and encryption alternatives • Data encryption, tokenization, data masking 6. Detecting, Preventing and mitigating attacks • Detect and prevent attacks on the database (e.g., SQL injection attacks) • Adequate controls and audit infrastructure 7. Operational Security • Govern asset management, • Change management, production access, • Periodic vulnerability scanning, • Adequate remediation procedures, • User access audit, management operation • Event response procedures Source : Security Week
  • 11. www.warevalley.com Considering database security on cloud  Database Access Management  Database Firewall  Sensitive Data Discovery  Database Encryption  Dynamic Data Masking  Database Authentication  SQL Injection Attacks  Database Compliance Reports
  • 12. www.warevalley.com Amazon RDS Security Features • Run your DB instance in an Amazon Virtual Private Cloud (VPC) – Network Access Control • Use AWS Identity and Access Management (IAM) - assign permissions that determine who is allowed to manage RDS resources • Use security groups - control what IP addresses or EC2 instances can connect to your databases on a DB instance • Use Secure Socket Layer (SSL) connections with DB instances • Use RDS encryption - AES-256 encryption algorithm to encrypt your data • Use network encryption and transparent data encryption with Oracle DB instances • Use the security features of your DB engine Source : AWS
  • 13. www.warevalley.com Azure Database Security Features • Firewall - IP addresses, can access a logical Azure SQL Server or a specific database • Secure Connection - Secure communication from clients based on the TDS protocol over TLS (Transport Layer Security) • Auditing - auditing events include insert, update, and delete events on tables /Audit logs in Azure table storage and build reports on top of them • Data masking - SQL users excluded from masking, Masking rules & functions • Row-level Security - Aimed at multi-tenant applications that share data in a single table within the same database. Source : blogs.msdn.microsoft.com
  • 14. www.warevalley.com DCAP Capabilities offered by Vendors Source : Gartner (Nov. 2014) Data-Centric Audit and Protection
  • 15. www.warevalley.com Chakra MAX V2 • Database(System) Audit and Protection • Database(System) Activity Monitoring • Database(System) Work Approval Process • Dynamic Data Masking • Sensitive Data Discovery • Compliance Reports Systems Windows HP-UX AIX Solaris Linux Mainframe Databases Oracle / Time-Stan /Exadata Microsoft SQL Server IBM DB2 (Mainframe, UDB) SAP Sybase IQ/ASE SAP HANA Mysql / MariaDB IBM Netezza TeraData PostgreSQL / Greenplum Altibase / Tibero / Cubrid / Kairos / SunDB Amazon RedShift / Aurora Dameng DM7 Fujitsu Symfoware PetaSQL Chakra MAX(Database Audit and Protection) on Cloud
  • 16. www.warevalley.com Chakra MAX(Database Audit and Protection) on Cloud DB service STAP Chakra MAX for AWS RDS(DB as a service) • Sniffing is Impossible - Port Mirror (X), TAP(X), STAP(X) • Gateway(Proxy Sever) is OK Chakra MAX for EC2 (Infrastructure as a service) • Sniffing is Possible – STAP • Gateway(Proxy Server) is OK DB service STAP RDS EC2 Gateway Only Gateway + Sniffing
  • 17. www.warevalley.com Chakra MAX(Database Audit and Protection) on Cloud Client A AWS Client B WAS (EC2) DB (RDS) Chakra Max SAGENT Chakra Max (EC2) SAGENT analyze end user’s information and notify it to Chakra MAX Client A Client B WEB Users Internet DB Users ① ① ① ② Internet ② DB users connect to DB through Chakra MAX server as gateway(Proxy) mode. Blocking backdoor connection User Access Control DNS Mapping DNS to real IP Address Sniffing Mode (Database Activity Monitoring) Gateway Mode (Database Audit and Protection)
  • 18. www.warevalley.com Systems DatabasesWeb Cyclone V3 • Auto Service Discovery • Sensitive Data Discovery in System/DB • Database Audit / Change Management • DB Vulnerability Assessment • Compliance Reports Cyclone(Database Security Assessment) on Cloud
  • 19. www.warevalley.com Cyclone(Database Security Assessment) on Cloud Sensitive Data, Security Holes, Vulnerabilities on your Database !
  • 20. www.warevalley.com Plugin Authorized User (Plain Text) Unauthorized User (Cipher Text or Masked) Sensitive Data (Columns) has been Encrypted End User (Plain Text) Galea(Database Encryption-Column Level) on Cloud API Authorized Applications
  • 21. www.warevalley.com Galea(Database Encryption-Column Level) on Cloud Column-Level Encryption Plan (Algorithm, Keys ..) Authorization Policies to Decrypt (Client IP, DB User, Application, Time & Date) Return Masked Data Return Encrypted Data Return Decrypted Data Unauthorized Users Authorized Users No need to modify customer’s application !
  • 22. www.warevalley.com WAREVALLEY : Database Security and Management DB Encryption (Plugin) DB Encryption (API) DB (System) Audit and Protection Dynamic Data Masking Work Flow Process DB Administration, Performance Monitoring Data Quality Assessment Sensitive Data Discovery DB Security Assessment DB Vulnerability Assessment Big Data Analysis Datawarehouse