SlideShare a Scribd company logo
1 of 23
©2002-2016 Teladoc, Inc. All rights reserved.
Hexatier at Teladoc
9/8/2016
©2002-2016 Teladoc, Inc. All rights reserved.
2
Hexatier Architecture
• Hexatier is a network proxy process running
on a Linux server, designed to receive and
forward MySQL database connections
• Applications and MySQL clients see the
proxy as a MySQL database. Hexatier
receives the connections, applies rules and
passes approved connections and queries on
to the database
©2002-2016 Teladoc, Inc. All rights reserved.
3
Hexatier Architecture
App
Servers
Desktops
Hexatier
Proxy
(10.240.20.100)
MySQL
Database
App
Servers
Desktops
Hexatier
Proxy
(10.240.20.100)
MySQL
Database
X
Note – As MySQL database
accounts can be configured to
include a host address, the
architecture can be designed
to ensure the proxy cannot
be bypassed. All traffic will
be subject to Hexatier
authority.
©2002-2016 Teladoc, Inc. All rights reserved.
4
Hexatier Capabilities
Hexatier offers three security capabilities in
current use at Teladoc ;
• Table Access Control
• Data Masking
• Activity Auditing
©2002-2016 Teladoc, Inc. All rights reserved.
5
Table Access Control
• Hexatier allows users and groups of users to have
access only to assigned tables.
• Privileges are managed via a series of rules,
applied in a top-down manner to each data
request.
• MySQL privilege grants offer similar capability, but
are managed only at the user level.
• Hexatier’s use of rules and user-groups allows a
form of role-based security to operate, greatly
simplifying security management.
©2002-2016 Teladoc, Inc. All rights reserved.
6
Table Access Control – Users on MySQL
Corresponding Users on Database:
• Users are created on the database with full privileges, relying on Hexatier to apply security.
• This is secure as access is allowed ONLY through Hexatier proxy’s IP address (10.240.20.100)
©2002-2016 Teladoc, Inc. All rights reserved.
7
Table Access Control – Users on Hexatier
Users (inherited from database) :
Users Groups (can contain users or other user groups) :
©2002-2016 Teladoc, Inc. All rights reserved.
8
Table Access Control - Policies
• Ordering of rules is important, most restrictive at the bottom to catch “none of
the above” and block all access. People with no rules assigned have no access.
• Grantee’s can be individual users or pre-defined groups of users ( roles ! )
Policies define table access rules
©2002-2016 Teladoc, Inc. All rights reserved.
9
Table Access Control – Policy Contents
Contents of a Policy :
Users affected by policy
Restrictions can be database, table or column-based
Allowed privileges
Log violations?
©2002-2016 Teladoc, Inc. All rights reserved.
10
Table Access Control - Example using “nyug1”
User “nyug1” defined on database
Usergroup “dw_NYUG_members” created,
user “nyug1” added to group
Usergroup “dw_demo_hexatier_ro” created,
user “dw_NYUG_members” added to group
Note – Up to this point Hexatier
is authorizing no privileges, user
“nyug1” has no privs on the
database. Usergroups are just
logical constructions.
©2002-2016 Teladoc, Inc. All rights reserved.
11
Table Access Control – Policy Example
Goal – set up policy allowing select on database “demo_hexatier”
Who
What
Privs
©2002-2016 Teladoc, Inc. All rights reserved.
Table Access Control
Example using nyug1, effect of policy ;
1) Can see data in database “demo_hexatier”
2) No rows returned when querying database “DW“
3) Unable to update data in database “demo_hexatier”
©2002-2016 Teladoc, Inc. All rights reserved.
What We’ve Just Done
13
Created
user
nyug1
Created logical
group of users
dw_NYUG_members
Created group to relate
policies to user-groups
dw_demo_hexatier_ro
Created policy to
define rules
dw_demo_hexatier_ro
Database
demo_hexatier
Users can be easily moved between user-groups
User-groups can be moved between policies
= Role-Based
Security
©2002-2016 Teladoc, Inc. All rights reserved.
14
Table Access Control – New Role for DML
Create new user group to hold users allowed DML
Create new policy allowing DML, assign above user group to it
©2002-2016 Teladoc, Inc. All rights reserved.
What We’ve Just Done
15
dw_NYUG_members dw_demo_hexatier_ro dw_demo_hexatier_ro demo_hexatier
dw_WashDC_members
Moving users between groups, groups between rules
dw_demo_hexatier_rw dw_demo_hexatier_rw
©2002-2016 Teladoc, Inc. All rights reserved.
16
Data Masking
• Proxy holds rules describing which tables
and columns should have data masked
before being returned to client.
• Rules can be configured and granted
dynamically.
• Different rules can apply to different users
& user-groups.
• Data remains in the clear within database.
©2002-2016 Teladoc, Inc. All rights reserved.
17
Data Masking
Rule below instructs proxy to mask “first_nm”, “last_nm”, “user_nm” and “ssn” from role “dw_NYU_members;
If the data-types of the columns being masked by
the policy are the same, there is great flexibility
in how they are masked.
©2002-2016 Teladoc, Inc. All rights reserved.
18
Effect of Data Masking on “nyug1”
Designated columns masked for “nyug1”
Masked tables remain join-able
©2002-2016 Teladoc, Inc. All rights reserved.
19
Activity Auditing
• Each table access control rule can be set to
write audit records each time it is invoked.
• Each data masking rule can be set to write audit
records each time it is invoked.
• As each security installation will contain a rule to
deny access to any query not matching a
granting rule, auditing this rule records all
attempts to access prohibited data.
©2002-2016 Teladoc, Inc. All rights reserved.
20
Activity Auditing
Audit Record of a Policy Violation :
©2002-2016 Teladoc, Inc. All rights reserved.
21
Performance Benchmarking
Industry-standard TPCC benchmarks were run against
the Hexatier POC deployment with the following
feature combinations enabled;
1. Baseline (proxy bypassed)
2. Hexatier controling table access
3. Hexatier access control and PHI masking
4. Hexatier access control, PHI masking & full
transaction logging
©2002-2016 Teladoc, Inc. All rights reserved.
22
Performance Benchmarking
System Details
• Database
– AWS RDS MySQL, m3xlarge (4 CPU, 15GB ram, prov
io ssd)
• Proxy Server
– AWS EC2 Centos, m4large (2 CPU, 8GB ram, prov io ssd)
# Virtual Users
Transactions
Per Minute
0
100000
200000
300000
400000
500000
600000
700000
800000
900000
1000000
10 20 30 40 50 60 70 80 90 100
Baseline, Proxy Bypassed
Proxy, Table Access
Control, No Masking
Proxy, Table Access
Control, PHI Masking
Proxy, Table Access
Control, PHI Masking, all
transactions logged
Note : Teladoc’s production database
db1a.us1 averages approx. 35,000 TpM
during business hours
©2002-2016 Teladoc, Inc. All rights reserved.
Features in Hexatier not in use currently at Teladoc
23
Can’t speak knowledgably of these, but mentioning anyway;
• Access via query-groups
• Queries can be tracked and “learned” over a given period.
• Once all common queries have been learned, queries outside of this set can
be either prohibited or reported.
• Access limited by ip address
• Any policy can be set to allow access from specific ip addresses only.
• Similar limits possible for known applications, schedules, etc…
• Injection attack detection & reporting

More Related Content

What's hot

MySQL Utilities -- PyTexas 2015
MySQL Utilities -- PyTexas 2015MySQL Utilities -- PyTexas 2015
MySQL Utilities -- PyTexas 2015Dave Stokes
 
MySQL Performance Best Practices
MySQL Performance Best PracticesMySQL Performance Best Practices
MySQL Performance Best PracticesOlivier DASINI
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Stefan Oehrli
 
Upgrade from MySQL 5.7 to MySQL 8.0
Upgrade from MySQL 5.7 to MySQL 8.0Upgrade from MySQL 5.7 to MySQL 8.0
Upgrade from MySQL 5.7 to MySQL 8.0Olivier DASINI
 
MySQL Document Store for Modern Applications
MySQL Document Store for Modern ApplicationsMySQL Document Store for Modern Applications
MySQL Document Store for Modern ApplicationsOlivier DASINI
 
MySQL Cluster 8.0 tutorial
MySQL Cluster 8.0 tutorialMySQL Cluster 8.0 tutorial
MySQL Cluster 8.0 tutorialFrazer Clement
 
JoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies
 
MySQL 5.6 Updates
MySQL 5.6 UpdatesMySQL 5.6 Updates
MySQL 5.6 UpdatesDave Stokes
 
MySQL Utilities -- Cool Tools For You: PHP World Nov 16 2016
MySQL Utilities -- Cool Tools For You: PHP World Nov 16 2016MySQL Utilities -- Cool Tools For You: PHP World Nov 16 2016
MySQL Utilities -- Cool Tools For You: PHP World Nov 16 2016Dave Stokes
 
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...Ludovico Caldara
 
Southeast Linuxfest -- MySQL User Admin Tips & Tricks
Southeast Linuxfest -- MySQL User Admin Tips & TricksSoutheast Linuxfest -- MySQL User Admin Tips & Tricks
Southeast Linuxfest -- MySQL User Admin Tips & TricksDave Stokes
 
MySQL Database Service - 100% Developed, Managed and Supported by the MySQL Team
MySQL Database Service - 100% Developed, Managed and Supported by the MySQL TeamMySQL Database Service - 100% Developed, Managed and Supported by the MySQL Team
MySQL Database Service - 100% Developed, Managed and Supported by the MySQL TeamOlivier DASINI
 
MySQL 5.7 -- SCaLE Feb 2014
MySQL 5.7 -- SCaLE Feb 2014MySQL 5.7 -- SCaLE Feb 2014
MySQL 5.7 -- SCaLE Feb 2014Dave Stokes
 
DOAG Oracle Database Vault
DOAG Oracle Database VaultDOAG Oracle Database Vault
DOAG Oracle Database VaultStefan Oehrli
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsOlivier DASINI
 
TechEvent 2019: Oracle PDB Isolation and Security; Stefan Oehrli - Trivadis
TechEvent 2019: Oracle PDB Isolation and Security; Stefan Oehrli - TrivadisTechEvent 2019: Oracle PDB Isolation and Security; Stefan Oehrli - Trivadis
TechEvent 2019: Oracle PDB Isolation and Security; Stefan Oehrli - TrivadisTrivadis
 
Mysql 8 vs Mariadb 10.4 Webinar 2020 Feb
Mysql 8 vs Mariadb 10.4 Webinar 2020 FebMysql 8 vs Mariadb 10.4 Webinar 2020 Feb
Mysql 8 vs Mariadb 10.4 Webinar 2020 FebAlkin Tezuysal
 

What's hot (20)

MySQL Utilities -- PyTexas 2015
MySQL Utilities -- PyTexas 2015MySQL Utilities -- PyTexas 2015
MySQL Utilities -- PyTexas 2015
 
MySQL Performance Best Practices
MySQL Performance Best PracticesMySQL Performance Best Practices
MySQL Performance Best Practices
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!
 
Upgrade from MySQL 5.7 to MySQL 8.0
Upgrade from MySQL 5.7 to MySQL 8.0Upgrade from MySQL 5.7 to MySQL 8.0
Upgrade from MySQL 5.7 to MySQL 8.0
 
My sql 5.6&MySQL Cluster 7.3
My sql 5.6&MySQL Cluster 7.3My sql 5.6&MySQL Cluster 7.3
My sql 5.6&MySQL Cluster 7.3
 
MySQL Document Store for Modern Applications
MySQL Document Store for Modern ApplicationsMySQL Document Store for Modern Applications
MySQL Document Store for Modern Applications
 
MySQL Cluster 8.0 tutorial
MySQL Cluster 8.0 tutorialMySQL Cluster 8.0 tutorial
MySQL Cluster 8.0 tutorial
 
JoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies - Azure SQL DB
JoTechies - Azure SQL DB
 
MySQL 5.6 Updates
MySQL 5.6 UpdatesMySQL 5.6 Updates
MySQL 5.6 Updates
 
MySQL Utilities -- Cool Tools For You: PHP World Nov 16 2016
MySQL Utilities -- Cool Tools For You: PHP World Nov 16 2016MySQL Utilities -- Cool Tools For You: PHP World Nov 16 2016
MySQL Utilities -- Cool Tools For You: PHP World Nov 16 2016
 
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
 
Southeast Linuxfest -- MySQL User Admin Tips & Tricks
Southeast Linuxfest -- MySQL User Admin Tips & TricksSoutheast Linuxfest -- MySQL User Admin Tips & Tricks
Southeast Linuxfest -- MySQL User Admin Tips & Tricks
 
MySQL Database Service - 100% Developed, Managed and Supported by the MySQL Team
MySQL Database Service - 100% Developed, Managed and Supported by the MySQL TeamMySQL Database Service - 100% Developed, Managed and Supported by the MySQL Team
MySQL Database Service - 100% Developed, Managed and Supported by the MySQL Team
 
MySQL 5.7 -- SCaLE Feb 2014
MySQL 5.7 -- SCaLE Feb 2014MySQL 5.7 -- SCaLE Feb 2014
MySQL 5.7 -- SCaLE Feb 2014
 
Postgre sql best_practices
Postgre sql best_practicesPostgre sql best_practices
Postgre sql best_practices
 
DOAG Oracle Database Vault
DOAG Oracle Database VaultDOAG Oracle Database Vault
DOAG Oracle Database Vault
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
 
TechEvent 2019: Oracle PDB Isolation and Security; Stefan Oehrli - Trivadis
TechEvent 2019: Oracle PDB Isolation and Security; Stefan Oehrli - TrivadisTechEvent 2019: Oracle PDB Isolation and Security; Stefan Oehrli - Trivadis
TechEvent 2019: Oracle PDB Isolation and Security; Stefan Oehrli - Trivadis
 
Mysql 8 vs Mariadb 10.4 Webinar 2020 Feb
Mysql 8 vs Mariadb 10.4 Webinar 2020 FebMysql 8 vs Mariadb 10.4 Webinar 2020 Feb
Mysql 8 vs Mariadb 10.4 Webinar 2020 Feb
 
My sql
My sqlMy sql
My sql
 

Similar to Hexatier - MySQL Role-based Security & Data Masking

Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudSathya Moorthy
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax
 
Webinar: The Performance Challenge: Providing an Amazing Customer Experience ...
Webinar: The Performance Challenge: Providing an Amazing Customer Experience ...Webinar: The Performance Challenge: Providing an Amazing Customer Experience ...
Webinar: The Performance Challenge: Providing an Amazing Customer Experience ...DataStax
 
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...Neo4j
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityGeorgi Kodinov
 
Upgrading to my sql 8.0
Upgrading to my sql 8.0Upgrading to my sql 8.0
Upgrading to my sql 8.0Ståle Deraas
 
Saving the elephant—now, not later
Saving the elephant—now, not laterSaving the elephant—now, not later
Saving the elephant—now, not laterDataWorks Summit
 
RDBP - Remote Dabase Backup Protocol
RDBP - Remote Dabase Backup ProtocolRDBP - Remote Dabase Backup Protocol
RDBP - Remote Dabase Backup ProtocolMayank Sinha
 
Pl17: MySQL 8.0: security
Pl17: MySQL 8.0: securityPl17: MySQL 8.0: security
Pl17: MySQL 8.0: securityGeorgi Kodinov
 
Managing enterprise users in Hadoop ecosystem
Managing enterprise users in Hadoop ecosystemManaging enterprise users in Hadoop ecosystem
Managing enterprise users in Hadoop ecosystemDataWorks Summit
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Andrejs Prokopjevs
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]
Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]
Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]Accumulo Summit
 
Enhanced Data Visualization provided for 200,000 Machines with OpenTSDB and C...
Enhanced Data Visualization provided for 200,000 Machines with OpenTSDB and C...Enhanced Data Visualization provided for 200,000 Machines with OpenTSDB and C...
Enhanced Data Visualization provided for 200,000 Machines with OpenTSDB and C...YASH Technologies
 
Druid and Hive Together : Use Cases and Best Practices
Druid and Hive Together : Use Cases and Best PracticesDruid and Hive Together : Use Cases and Best Practices
Druid and Hive Together : Use Cases and Best PracticesDataWorks Summit
 
Bilbao oracle12c keynote
Bilbao  oracle12c keynoteBilbao  oracle12c keynote
Bilbao oracle12c keynoteAitor Ibañez
 
Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...
Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...
Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...Big Data Spain
 
011 Neo4j Ops Manager Intro and Roadmap - NODES2022 AMERICAS Advanced 3 - Chr...
011 Neo4j Ops Manager Intro and Roadmap - NODES2022 AMERICAS Advanced 3 - Chr...011 Neo4j Ops Manager Intro and Roadmap - NODES2022 AMERICAS Advanced 3 - Chr...
011 Neo4j Ops Manager Intro and Roadmap - NODES2022 AMERICAS Advanced 3 - Chr...Neo4j
 

Similar to Hexatier - MySQL Role-based Security & Data Masking (20)

Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
 
Webinar: The Performance Challenge: Providing an Amazing Customer Experience ...
Webinar: The Performance Challenge: Providing an Amazing Customer Experience ...Webinar: The Performance Challenge: Providing an Amazing Customer Experience ...
Webinar: The Performance Challenge: Providing an Amazing Customer Experience ...
 
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
 
Upgrading to my sql 8.0
Upgrading to my sql 8.0Upgrading to my sql 8.0
Upgrading to my sql 8.0
 
Saving the elephant—now, not later
Saving the elephant—now, not laterSaving the elephant—now, not later
Saving the elephant—now, not later
 
RDBP - Remote Dabase Backup Protocol
RDBP - Remote Dabase Backup ProtocolRDBP - Remote Dabase Backup Protocol
RDBP - Remote Dabase Backup Protocol
 
Pl17: MySQL 8.0: security
Pl17: MySQL 8.0: securityPl17: MySQL 8.0: security
Pl17: MySQL 8.0: security
 
Managing enterprise users in Hadoop ecosystem
Managing enterprise users in Hadoop ecosystemManaging enterprise users in Hadoop ecosystem
Managing enterprise users in Hadoop ecosystem
 
Big Data DB for AI+Blockchain Integration
Big Data DB for AI+Blockchain IntegrationBig Data DB for AI+Blockchain Integration
Big Data DB for AI+Blockchain Integration
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]
Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]
Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]
 
MySQL Quick Dive
MySQL Quick DiveMySQL Quick Dive
MySQL Quick Dive
 
Enhanced Data Visualization provided for 200,000 Machines with OpenTSDB and C...
Enhanced Data Visualization provided for 200,000 Machines with OpenTSDB and C...Enhanced Data Visualization provided for 200,000 Machines with OpenTSDB and C...
Enhanced Data Visualization provided for 200,000 Machines with OpenTSDB and C...
 
Druid and Hive Together : Use Cases and Best Practices
Druid and Hive Together : Use Cases and Best PracticesDruid and Hive Together : Use Cases and Best Practices
Druid and Hive Together : Use Cases and Best Practices
 
Bilbao oracle12c keynote
Bilbao  oracle12c keynoteBilbao  oracle12c keynote
Bilbao oracle12c keynote
 
Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...
Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...
Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...
 
011 Neo4j Ops Manager Intro and Roadmap - NODES2022 AMERICAS Advanced 3 - Chr...
011 Neo4j Ops Manager Intro and Roadmap - NODES2022 AMERICAS Advanced 3 - Chr...011 Neo4j Ops Manager Intro and Roadmap - NODES2022 AMERICAS Advanced 3 - Chr...
011 Neo4j Ops Manager Intro and Roadmap - NODES2022 AMERICAS Advanced 3 - Chr...
 

Recently uploaded

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 

Recently uploaded (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 

Hexatier - MySQL Role-based Security & Data Masking

  • 1. ©2002-2016 Teladoc, Inc. All rights reserved. Hexatier at Teladoc 9/8/2016
  • 2. ©2002-2016 Teladoc, Inc. All rights reserved. 2 Hexatier Architecture • Hexatier is a network proxy process running on a Linux server, designed to receive and forward MySQL database connections • Applications and MySQL clients see the proxy as a MySQL database. Hexatier receives the connections, applies rules and passes approved connections and queries on to the database
  • 3. ©2002-2016 Teladoc, Inc. All rights reserved. 3 Hexatier Architecture App Servers Desktops Hexatier Proxy (10.240.20.100) MySQL Database App Servers Desktops Hexatier Proxy (10.240.20.100) MySQL Database X Note – As MySQL database accounts can be configured to include a host address, the architecture can be designed to ensure the proxy cannot be bypassed. All traffic will be subject to Hexatier authority.
  • 4. ©2002-2016 Teladoc, Inc. All rights reserved. 4 Hexatier Capabilities Hexatier offers three security capabilities in current use at Teladoc ; • Table Access Control • Data Masking • Activity Auditing
  • 5. ©2002-2016 Teladoc, Inc. All rights reserved. 5 Table Access Control • Hexatier allows users and groups of users to have access only to assigned tables. • Privileges are managed via a series of rules, applied in a top-down manner to each data request. • MySQL privilege grants offer similar capability, but are managed only at the user level. • Hexatier’s use of rules and user-groups allows a form of role-based security to operate, greatly simplifying security management.
  • 6. ©2002-2016 Teladoc, Inc. All rights reserved. 6 Table Access Control – Users on MySQL Corresponding Users on Database: • Users are created on the database with full privileges, relying on Hexatier to apply security. • This is secure as access is allowed ONLY through Hexatier proxy’s IP address (10.240.20.100)
  • 7. ©2002-2016 Teladoc, Inc. All rights reserved. 7 Table Access Control – Users on Hexatier Users (inherited from database) : Users Groups (can contain users or other user groups) :
  • 8. ©2002-2016 Teladoc, Inc. All rights reserved. 8 Table Access Control - Policies • Ordering of rules is important, most restrictive at the bottom to catch “none of the above” and block all access. People with no rules assigned have no access. • Grantee’s can be individual users or pre-defined groups of users ( roles ! ) Policies define table access rules
  • 9. ©2002-2016 Teladoc, Inc. All rights reserved. 9 Table Access Control – Policy Contents Contents of a Policy : Users affected by policy Restrictions can be database, table or column-based Allowed privileges Log violations?
  • 10. ©2002-2016 Teladoc, Inc. All rights reserved. 10 Table Access Control - Example using “nyug1” User “nyug1” defined on database Usergroup “dw_NYUG_members” created, user “nyug1” added to group Usergroup “dw_demo_hexatier_ro” created, user “dw_NYUG_members” added to group Note – Up to this point Hexatier is authorizing no privileges, user “nyug1” has no privs on the database. Usergroups are just logical constructions.
  • 11. ©2002-2016 Teladoc, Inc. All rights reserved. 11 Table Access Control – Policy Example Goal – set up policy allowing select on database “demo_hexatier” Who What Privs
  • 12. ©2002-2016 Teladoc, Inc. All rights reserved. Table Access Control Example using nyug1, effect of policy ; 1) Can see data in database “demo_hexatier” 2) No rows returned when querying database “DW“ 3) Unable to update data in database “demo_hexatier”
  • 13. ©2002-2016 Teladoc, Inc. All rights reserved. What We’ve Just Done 13 Created user nyug1 Created logical group of users dw_NYUG_members Created group to relate policies to user-groups dw_demo_hexatier_ro Created policy to define rules dw_demo_hexatier_ro Database demo_hexatier Users can be easily moved between user-groups User-groups can be moved between policies = Role-Based Security
  • 14. ©2002-2016 Teladoc, Inc. All rights reserved. 14 Table Access Control – New Role for DML Create new user group to hold users allowed DML Create new policy allowing DML, assign above user group to it
  • 15. ©2002-2016 Teladoc, Inc. All rights reserved. What We’ve Just Done 15 dw_NYUG_members dw_demo_hexatier_ro dw_demo_hexatier_ro demo_hexatier dw_WashDC_members Moving users between groups, groups between rules dw_demo_hexatier_rw dw_demo_hexatier_rw
  • 16. ©2002-2016 Teladoc, Inc. All rights reserved. 16 Data Masking • Proxy holds rules describing which tables and columns should have data masked before being returned to client. • Rules can be configured and granted dynamically. • Different rules can apply to different users & user-groups. • Data remains in the clear within database.
  • 17. ©2002-2016 Teladoc, Inc. All rights reserved. 17 Data Masking Rule below instructs proxy to mask “first_nm”, “last_nm”, “user_nm” and “ssn” from role “dw_NYU_members; If the data-types of the columns being masked by the policy are the same, there is great flexibility in how they are masked.
  • 18. ©2002-2016 Teladoc, Inc. All rights reserved. 18 Effect of Data Masking on “nyug1” Designated columns masked for “nyug1” Masked tables remain join-able
  • 19. ©2002-2016 Teladoc, Inc. All rights reserved. 19 Activity Auditing • Each table access control rule can be set to write audit records each time it is invoked. • Each data masking rule can be set to write audit records each time it is invoked. • As each security installation will contain a rule to deny access to any query not matching a granting rule, auditing this rule records all attempts to access prohibited data.
  • 20. ©2002-2016 Teladoc, Inc. All rights reserved. 20 Activity Auditing Audit Record of a Policy Violation :
  • 21. ©2002-2016 Teladoc, Inc. All rights reserved. 21 Performance Benchmarking Industry-standard TPCC benchmarks were run against the Hexatier POC deployment with the following feature combinations enabled; 1. Baseline (proxy bypassed) 2. Hexatier controling table access 3. Hexatier access control and PHI masking 4. Hexatier access control, PHI masking & full transaction logging
  • 22. ©2002-2016 Teladoc, Inc. All rights reserved. 22 Performance Benchmarking System Details • Database – AWS RDS MySQL, m3xlarge (4 CPU, 15GB ram, prov io ssd) • Proxy Server – AWS EC2 Centos, m4large (2 CPU, 8GB ram, prov io ssd) # Virtual Users Transactions Per Minute 0 100000 200000 300000 400000 500000 600000 700000 800000 900000 1000000 10 20 30 40 50 60 70 80 90 100 Baseline, Proxy Bypassed Proxy, Table Access Control, No Masking Proxy, Table Access Control, PHI Masking Proxy, Table Access Control, PHI Masking, all transactions logged Note : Teladoc’s production database db1a.us1 averages approx. 35,000 TpM during business hours
  • 23. ©2002-2016 Teladoc, Inc. All rights reserved. Features in Hexatier not in use currently at Teladoc 23 Can’t speak knowledgably of these, but mentioning anyway; • Access via query-groups • Queries can be tracked and “learned” over a given period. • Once all common queries have been learned, queries outside of this set can be either prohibited or reported. • Access limited by ip address • Any policy can be set to allow access from specific ip addresses only. • Similar limits possible for known applications, schedules, etc… • Injection attack detection & reporting