SlideShare a Scribd company logo
McAfee Confidential
Securing Big Data
Boubker El Mouttahid | Enterprise Architect
McAfee Confidential
The risks associated with Big Data technologies
New Technology
New Risks
Any technology that is not well
understood will introduce new
vulnerabilities.
Typically include open source code
Luck of security best practices
Security
User authentication and access to
data from multiple locations may
not be sufficiently controlled
There is significant opportunity for
malicious data input and
inadequate data validation
Attack surface of the nodes in a
cluster may not have been
reviewed and servers adequately
hardened.
Data Privacy &
Compliancy
Regulatory requirements may not
be fulfilled, with access to logs and
audit trails problematic
Data Security: Hadoop store the
data as it is without encryption to
improve efficiency
Granular access control: What
types of personal information can
be deemed sharable and with
whom
2
McAfee Confidential
Emerging Hadoop Security Maturity Model
3
McAfee Confidential
Security Requirements of the Enterprise
• Network Security
Authentication
Authorization
Data Protection
Visibility & Monitoring
Secure Configurations for
Hardware and Software
McAfee Confidential
Comprehensive, Security & Compliance-Ready
Securing the underlying operating system Authentication, Authorization, Audit, and Compliance
Perimeter
Guarding access to
the cluster itself
InfoSec Concept:
Authentication
Access
Defining what users
and applications can
do with data
InfoSec Concept:
Authorization
Visibility
Reporting on where
data came from and
how it’s being used
InfoSec Concept:
Audit
Data
Protecting data in the
cluster from
unauthorized visibility
InfoSec Concept:
Compliance
Network Security Secure Configuration Real Time
Monitoring
McAfee Confidential
Platform Security Requirements
Network Security Secure Configuration Real Time
Monitoring
Defense, resilience
Deep packet inspections
Securing the underlying operating
system and the applications installed
on the system
Log correlation and
analysis to rapidly identify
anomalies
McAfee Confidential
Perimeter Security Requirements
Preserve user choice of the right Hadoop
service (e.g. Impala, Spark)
Conform to centrally managed authentication
policies
Implement with existing standard systems:
Active Directory and Kerberos
Perimeter
Guarding access to
the cluster itself
InfoSec Concept:
Authentication
McAfee Confidential
• Contributed by Intel in 2013
• Blueprint for enterprise-grade
security
Cloudera and Intel Project Rhino
Rhino Goal: Unified
Authorization
Engineers at Intel and Cloudera
(together with Oracle and IBM)
are now jointly contributing to
Apache Sentry
Rhino Goal: Encryption and
Key Management Framework
Cloudera and Intel engineers are
now contributing HDFS encryption
capabilities that can plug into
enterprise key managers
McAfee Confidential
Right Solution
• Provides maximum flexibility
• Delivers centrally managed authentication
• Automates configuration while leveraging existing infrastructure
Watch for other solutions that…
• Require setup of additional Kerberos server and cross-realm trust
• Lead to manual and error-prone Kerberos config on individual nodes
• Offer limited support for username/password authentication against AD
Business Impact
• DELAY: Must seek InfoSec sign-off for cross-realm trust establishment
• SET-UP COST: Must procure & configure Kerberos server & nodes
• ONGOING MAINTENANCE: Additional task for each new Kerberos user
Authentication and Identity
✓
✗
“Integrate With Existing
Enterprise Authentication
Mechanisms for Hadoop
Identity and Access
Management.”
Gartner – Best Practices
for Securing Hadoop
McAfee Confidential
Access Security Requirements
Provide users access to data needed to
do their job
Centrally manage access policies
Leverage a role-based access control
model built on AD
Access
Defining what users
and applications can do
with data
InfoSec Concept:
Authorization
McAfee Confidential
Manage data access by role, instead of by individual user
• Fraud Analyst Role has read access on ALL transaction data
• Branch Teller Role has read / write access on very limited set of data
• Relationships between users and roles are established via groups
An RBAC policy is then uniformly enforced for all Hadoop services
• Provides unified authorization controls
• As opposed to tools for managing numerous, service specific policies
RBAC and Centralized Authorization
McAfee Confidential
Sentry provides unified authorization via fine-grained RBAC for Impala, Hive, Search,
MapReduce, Pig, HDFS…
Unified Authorization with Apache Sentry
Sentry Perm.
Read Access
to ALL
Transaction
Data
Sentry Role
Fraud Analyst
Role
Group
Fraud
Analysts
Sam Smith
McAfee Confidential
• Sentry can be configured to use AD to determine a user’s group assignments
• Group assignment changes in AD are automatically picked up, resulting in updated
Sentry role assignments
Sentry and Active Directory Groups
Sentry Perm.
Read Access
to ALL
Transaction
Data
Sentry Role
Fraud Analyst
Role
AD Group
Fraud
Analysts
Sam Smith
McAfee Confidential
Sentry enforces each rule across Hadoop components
16
Hive Server
2
Enforcemen
tcode
Impala
MapReduce
, Pig,
HDFS*
Apps:
Datameer,
Platfora, etc*
Permissions
rules
Common enforcement
code for consistency.
Rule 1: Allow fraud analysts read
access to the transaction table
Permissions specified by
administrators
(top-level and delegated)
Enforcemen
tcode
Enforcemen
tcode
Enforcemen
tcode
McAfee Confidential
Sentry – The Open Standard
Broad
Contributions
• Cloudera
• IBM
• Intel
• Oracle
Multi-Vendor
Support
• Cloudera
• IBM
• MapR
• Oracle
Wide Industry
Adoption
• Banking
• Healthcare
• Insurance
• Pharma
• Telco
Third-Party
Integrations
• Oracle
Endeca
• Platfora
McAfee Confidential
Right solution
• User access determined via group assignments
• Unified authorization via granular RBAC policy
• Leverages existing AD infrastructure
Watch for other solutions that…
• Require redundant security policies; one for every access path
• Do not offer an RBAC policy model
• Cannot meet InfoSec requirement for centrally managed authorization
• Depend on manual mirroring of AD group assignments
Business Impact
• DELAY: InfoSec approval for data access assignments outside of AD
• ONGOING COSTS: Authorization policies have to be reviewed and tested for each access path
• ONGOING MAINTENANCE: Mirroring of directory group assignments
Authorization and Access
✓
✗
“A must-have for enterprise
access scenarios, the most
prominent solution here is
Apache Sentry”
Gigaom– Hadoop Security:
Solutions Emerge
McAfee Confidential
Visibility Security Requirements
Understand where report data came
from and discover more data like it
Comply with policies for audit, data
classification, and lineage
Centralize the audit repository;
perform discovery; automate lineage
Visibility
Reporting on where data
came from and how it’s
being used
InfoSec Concept:
Audit
McAfee Confidential
Right solution
• Users can easily discover data and examine lineage
• Complies with requirements for audit, classification, lineage
• No additional IT burden: audit logs are centralized, lineage is automatic,
users can self help
Watch for other solutions that…
• Offer no unified audit trail for point in time user access
• Limited lineage, available only at file level, no visualization
• Third-party tools required for data discovery
Business Impact
• DELAY: InfoSec testing, validation, and approval of third-party tools
• COMPLIANCE RISK: Inability to respond quickly if point-in-time user access history
needed. Inability to meet core data governance requirements without column level
lineage
Audit and Governance
✓
✗
“Cloudera Navigator is…
one pane of glass for all
Hadoop
metadata and events
including security”
Gartner – Protecting
Big Data In Hadoop
McAfee Confidential
©2014 Cloudera, Inc. All rights reserved.
Data Security Requirements
Perform analytics on regulated data
Encrypt data, conform to key management
policies, protect from root
Integrate with existing HSM as part of key
management infrastructure
Data
Protecting data in the cluster
from unauthorized visibility
InfoSec Concept:
Compliance
McAfee Confidential
Right solution
• Brings the power of pervasive analytics to regulated data
• Delivers compliant protection with encryption, key management
• Provides separation of duties between system and data admins
• Conforms to existing policies regarding HSM based key management
Watch for other solutions that…
• Run risk of data breach or theft by storing data in clear text
• Require 3rd party encryption and key management solutions
• Offer no protection against privileged user access
• May not integrate with corporate HSM’s
Business Impact
• EXPOSURE: theft or breach of data – fines, damage to brand
• DELAY: InfoSec testing, validation and approval of 3rd party solutions (COST)
• DELAY: InfoSec approval for key management independent of HSM
• COMPLIANCE RISK: Potential PCI issues
Encryption and Key Management
✓
✗
“Cloudera… recognized that
data in Hadoop must be
protected both at rest and in
transit… and have made data
encryption part of their
products.”
Gartner – Protecting
Big Data In Hadoop
McAfee Confidential
23
Recommendation
 Enterprise data hub with built-in security
 Comprehensive and integrated security
 Compliance Ready
Intel & McAfee Confidential 24

More Related Content

What's hot

The Journey to Success with Big Data
The Journey to Success with Big DataThe Journey to Success with Big Data
The Journey to Success with Big Data
Cloudera, Inc.
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 
XMANAI Technical Project Overview
XMANAI Technical Project OverviewXMANAI Technical Project Overview
XMANAI Technical Project Overview
XMANAI
 
IBM's Business Analytics Portfolio for Training Purposes
IBM's Business Analytics Portfolio for Training PurposesIBM's Business Analytics Portfolio for Training Purposes
IBM's Business Analytics Portfolio for Training Purposes
Natalija Pavic
 
Choosing the Right Document Processing Solution for Healthcare Organizations
Choosing the Right Document Processing Solution for Healthcare OrganizationsChoosing the Right Document Processing Solution for Healthcare Organizations
Choosing the Right Document Processing Solution for Healthcare Organizations
Provectus
 
6 levels of big data analytics applications
6 levels of big data analytics applications6 levels of big data analytics applications
6 levels of big data analytics applications
panoratio
 
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Shahid Shah
 
Applied Machine Learning for the IoT - Data Science Pop-up Seattle
Applied Machine Learning for the IoT - Data Science Pop-up SeattleApplied Machine Learning for the IoT - Data Science Pop-up Seattle
Applied Machine Learning for the IoT - Data Science Pop-up Seattle
Domino Data Lab
 
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Neo4j
 
Bigdata (1) converted
Bigdata (1) convertedBigdata (1) converted
Bigdata (1) converted
THILAKAVATHIRAMRAJ
 
Business Insight 2014 - Data insights flyer
Business Insight 2014 - Data insights flyerBusiness Insight 2014 - Data insights flyer
Business Insight 2014 - Data insights flyer
Microsoft
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
Shahid Shah
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
Interset
 
[Infographic] Uniting Internet of Things and Big Data
[Infographic] Uniting Internet of Things and Big Data[Infographic] Uniting Internet of Things and Big Data
[Infographic] Uniting Internet of Things and Big Data
SnapLogic
 
How to build a data science team 20115.03.13v6
How to build a data science team 20115.03.13v6How to build a data science team 20115.03.13v6
How to build a data science team 20115.03.13v6
Zhihao Lin
 
Big data user group big data application - mar 2016
Big data user group   big data application - mar 2016Big data user group   big data application - mar 2016
Big data user group big data application - mar 2016
Chulalongkorn University
 
Big Data
Big DataBig Data
Big Data
Seminar Links
 
Platform for Big Data Analytics and Visual Analytics: CSIRO use cases. Februa...
Platform for Big Data Analytics and Visual Analytics: CSIRO use cases. Februa...Platform for Big Data Analytics and Visual Analytics: CSIRO use cases. Februa...
Platform for Big Data Analytics and Visual Analytics: CSIRO use cases. Februa...
Tomasz Bednarz
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning Cybersecurity
Interset
 
Tusker Corporate Profile
Tusker Corporate ProfileTusker Corporate Profile
Tusker Corporate Profile
Prashant Kumar
 

What's hot (20)

The Journey to Success with Big Data
The Journey to Success with Big DataThe Journey to Success with Big Data
The Journey to Success with Big Data
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
XMANAI Technical Project Overview
XMANAI Technical Project OverviewXMANAI Technical Project Overview
XMANAI Technical Project Overview
 
IBM's Business Analytics Portfolio for Training Purposes
IBM's Business Analytics Portfolio for Training PurposesIBM's Business Analytics Portfolio for Training Purposes
IBM's Business Analytics Portfolio for Training Purposes
 
Choosing the Right Document Processing Solution for Healthcare Organizations
Choosing the Right Document Processing Solution for Healthcare OrganizationsChoosing the Right Document Processing Solution for Healthcare Organizations
Choosing the Right Document Processing Solution for Healthcare Organizations
 
6 levels of big data analytics applications
6 levels of big data analytics applications6 levels of big data analytics applications
6 levels of big data analytics applications
 
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
 
Applied Machine Learning for the IoT - Data Science Pop-up Seattle
Applied Machine Learning for the IoT - Data Science Pop-up SeattleApplied Machine Learning for the IoT - Data Science Pop-up Seattle
Applied Machine Learning for the IoT - Data Science Pop-up Seattle
 
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
 
Bigdata (1) converted
Bigdata (1) convertedBigdata (1) converted
Bigdata (1) converted
 
Business Insight 2014 - Data insights flyer
Business Insight 2014 - Data insights flyerBusiness Insight 2014 - Data insights flyer
Business Insight 2014 - Data insights flyer
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
[Infographic] Uniting Internet of Things and Big Data
[Infographic] Uniting Internet of Things and Big Data[Infographic] Uniting Internet of Things and Big Data
[Infographic] Uniting Internet of Things and Big Data
 
How to build a data science team 20115.03.13v6
How to build a data science team 20115.03.13v6How to build a data science team 20115.03.13v6
How to build a data science team 20115.03.13v6
 
Big data user group big data application - mar 2016
Big data user group   big data application - mar 2016Big data user group   big data application - mar 2016
Big data user group big data application - mar 2016
 
Big Data
Big DataBig Data
Big Data
 
Platform for Big Data Analytics and Visual Analytics: CSIRO use cases. Februa...
Platform for Big Data Analytics and Visual Analytics: CSIRO use cases. Februa...Platform for Big Data Analytics and Visual Analytics: CSIRO use cases. Februa...
Platform for Big Data Analytics and Visual Analytics: CSIRO use cases. Februa...
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning Cybersecurity
 
Tusker Corporate Profile
Tusker Corporate ProfileTusker Corporate Profile
Tusker Corporate Profile
 

Viewers also liked

Bookerz marcel dumont
Bookerz marcel dumontBookerz marcel dumont
Bookerz marcel dumont
BigDataExpo
 
Dell jort kollerie
Dell jort kollerieDell jort kollerie
Dell jort kollerie
BigDataExpo
 
Tue jack van wijk
Tue jack van wijkTue jack van wijk
Tue jack van wijk
BigDataExpo
 
Sophos paul ducklin
Sophos paul ducklinSophos paul ducklin
Sophos paul ducklin
BigDataExpo
 
Big Data Expo 2015 - R20 Six Big Myths of Big Data
Big Data Expo 2015 - R20 Six Big Myths of Big DataBig Data Expo 2015 - R20 Six Big Myths of Big Data
Big Data Expo 2015 - R20 Six Big Myths of Big Data
BigDataExpo
 
Centennium antoine stelma
Centennium antoine stelmaCentennium antoine stelma
Centennium antoine stelma
BigDataExpo
 
Itility marianne faro
Itility marianne faroItility marianne faro
Itility marianne faro
BigDataExpo
 
Talend mike hirt
Talend mike hirtTalend mike hirt
Talend mike hirt
BigDataExpo
 
Big datasurvey walter van der scheer
Big datasurvey walter van der scheerBig datasurvey walter van der scheer
Big datasurvey walter van der scheer
BigDataExpo
 
Belvilla
BelvillaBelvilla
Belvilla
BigDataExpo
 
Cisco niels vd berg
Cisco niels vd bergCisco niels vd berg
Cisco niels vd berg
BigDataExpo
 
Presentatie bakkersland big data expo (1)
Presentatie bakkersland big data expo (1)Presentatie bakkersland big data expo (1)
Presentatie bakkersland big data expo (1)
BigDataExpo
 
Into dq ed wrazen
Into dq ed wrazenInto dq ed wrazen
Into dq ed wrazen
BigDataExpo
 
Npo clever lions
Npo clever lionsNpo clever lions
Npo clever lions
BigDataExpo
 
Knmi corline koolhaas
Knmi corline koolhaasKnmi corline koolhaas
Knmi corline koolhaas
BigDataExpo
 
Kandidaat select jaap nieuwenhuijzen
Kandidaat select jaap nieuwenhuijzenKandidaat select jaap nieuwenhuijzen
Kandidaat select jaap nieuwenhuijzen
BigDataExpo
 
Small bigdatacongress
Small bigdatacongressSmall bigdatacongress
Small bigdatacongress
BigDataExpo
 
Spil games konrad
Spil games konradSpil games konrad
Spil games konrad
BigDataExpo
 
Aegon hiek van der scheer
Aegon hiek van der scheerAegon hiek van der scheer
Aegon hiek van der scheer
BigDataExpo
 
Eneco roy muller
Eneco roy mullerEneco roy muller
Eneco roy muller
BigDataExpo
 

Viewers also liked (20)

Bookerz marcel dumont
Bookerz marcel dumontBookerz marcel dumont
Bookerz marcel dumont
 
Dell jort kollerie
Dell jort kollerieDell jort kollerie
Dell jort kollerie
 
Tue jack van wijk
Tue jack van wijkTue jack van wijk
Tue jack van wijk
 
Sophos paul ducklin
Sophos paul ducklinSophos paul ducklin
Sophos paul ducklin
 
Big Data Expo 2015 - R20 Six Big Myths of Big Data
Big Data Expo 2015 - R20 Six Big Myths of Big DataBig Data Expo 2015 - R20 Six Big Myths of Big Data
Big Data Expo 2015 - R20 Six Big Myths of Big Data
 
Centennium antoine stelma
Centennium antoine stelmaCentennium antoine stelma
Centennium antoine stelma
 
Itility marianne faro
Itility marianne faroItility marianne faro
Itility marianne faro
 
Talend mike hirt
Talend mike hirtTalend mike hirt
Talend mike hirt
 
Big datasurvey walter van der scheer
Big datasurvey walter van der scheerBig datasurvey walter van der scheer
Big datasurvey walter van der scheer
 
Belvilla
BelvillaBelvilla
Belvilla
 
Cisco niels vd berg
Cisco niels vd bergCisco niels vd berg
Cisco niels vd berg
 
Presentatie bakkersland big data expo (1)
Presentatie bakkersland big data expo (1)Presentatie bakkersland big data expo (1)
Presentatie bakkersland big data expo (1)
 
Into dq ed wrazen
Into dq ed wrazenInto dq ed wrazen
Into dq ed wrazen
 
Npo clever lions
Npo clever lionsNpo clever lions
Npo clever lions
 
Knmi corline koolhaas
Knmi corline koolhaasKnmi corline koolhaas
Knmi corline koolhaas
 
Kandidaat select jaap nieuwenhuijzen
Kandidaat select jaap nieuwenhuijzenKandidaat select jaap nieuwenhuijzen
Kandidaat select jaap nieuwenhuijzen
 
Small bigdatacongress
Small bigdatacongressSmall bigdatacongress
Small bigdatacongress
 
Spil games konrad
Spil games konradSpil games konrad
Spil games konrad
 
Aegon hiek van der scheer
Aegon hiek van der scheerAegon hiek van der scheer
Aegon hiek van der scheer
 
Eneco roy muller
Eneco roy mullerEneco roy muller
Eneco roy muller
 

Similar to Intel boubker el mouttahid

Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Cloudera, Inc.
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Cloudera, Inc.
 
Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the Data
Cloudera, Inc.
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
DataWorks Summit
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014
Cloudera, Inc.
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Cloudera, Inc.
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
Niel Dunnage
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
Cloudera, Inc.
 
Cloudera GoDataFest Security and Governance
Cloudera GoDataFest Security and GovernanceCloudera GoDataFest Security and Governance
Cloudera GoDataFest Security and Governance
GoDataDriven
 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access Security
Cloudera, Inc.
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
Courion Corporation
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Cloudera, Inc.
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Hadoop security @ Philly Hadoop Meetup May 2015
Hadoop security @ Philly Hadoop Meetup May 2015Hadoop security @ Philly Hadoop Meetup May 2015
Hadoop security @ Philly Hadoop Meetup May 2015
Shravan (Sean) Pabba
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Cloudera, Inc.
 

Similar to Intel boubker el mouttahid (20)

Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the Data
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
 
Cloudera GoDataFest Security and Governance
Cloudera GoDataFest Security and GovernanceCloudera GoDataFest Security and Governance
Cloudera GoDataFest Security and Governance
 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access Security
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Hadoop security @ Philly Hadoop Meetup May 2015
Hadoop security @ Philly Hadoop Meetup May 2015Hadoop security @ Philly Hadoop Meetup May 2015
Hadoop security @ Philly Hadoop Meetup May 2015
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
 

More from BigDataExpo

Centric - Jaap huisprijzen, GTST, The Bold, IKEA en IENS. Zomaar wat toepassi...
Centric - Jaap huisprijzen, GTST, The Bold, IKEA en IENS. Zomaar wat toepassi...Centric - Jaap huisprijzen, GTST, The Bold, IKEA en IENS. Zomaar wat toepassi...
Centric - Jaap huisprijzen, GTST, The Bold, IKEA en IENS. Zomaar wat toepassi...
BigDataExpo
 
Google Cloud - Google's vision on AI
Google Cloud - Google's vision on AIGoogle Cloud - Google's vision on AI
Google Cloud - Google's vision on AI
BigDataExpo
 
Pacmed - Machine Learning in health care: opportunities and challanges in pra...
Pacmed - Machine Learning in health care: opportunities and challanges in pra...Pacmed - Machine Learning in health care: opportunities and challanges in pra...
Pacmed - Machine Learning in health care: opportunities and challanges in pra...
BigDataExpo
 
PGGM - The Future Explore
PGGM - The Future ExplorePGGM - The Future Explore
PGGM - The Future Explore
BigDataExpo
 
Universiteit Utrecht & gghdc - Wat zijn de gezondheidseffecten van omgeving e...
Universiteit Utrecht & gghdc - Wat zijn de gezondheidseffecten van omgeving e...Universiteit Utrecht & gghdc - Wat zijn de gezondheidseffecten van omgeving e...
Universiteit Utrecht & gghdc - Wat zijn de gezondheidseffecten van omgeving e...
BigDataExpo
 
Rob van Kranenburg - Kunnen we ons een sociaal krediet systeem zoals in het o...
Rob van Kranenburg - Kunnen we ons een sociaal krediet systeem zoals in het o...Rob van Kranenburg - Kunnen we ons een sociaal krediet systeem zoals in het o...
Rob van Kranenburg - Kunnen we ons een sociaal krediet systeem zoals in het o...
BigDataExpo
 
OrangeNXT - High accuracy mapping from videos for efficient fiber optic cable...
OrangeNXT - High accuracy mapping from videos for efficient fiber optic cable...OrangeNXT - High accuracy mapping from videos for efficient fiber optic cable...
OrangeNXT - High accuracy mapping from videos for efficient fiber optic cable...
BigDataExpo
 
Dynniq & GoDataDriven - Shaping the future of traffic with IoT and AI
Dynniq & GoDataDriven - Shaping the future of traffic with IoT and AIDynniq & GoDataDriven - Shaping the future of traffic with IoT and AI
Dynniq & GoDataDriven - Shaping the future of traffic with IoT and AI
BigDataExpo
 
Teleperformance - Smart personalized service door het gebruik van Data Science
Teleperformance - Smart personalized service door het gebruik van Data Science Teleperformance - Smart personalized service door het gebruik van Data Science
Teleperformance - Smart personalized service door het gebruik van Data Science
BigDataExpo
 
FunXtion - Interactive Digital Fitness with Data Analytics
FunXtion - Interactive Digital Fitness with Data AnalyticsFunXtion - Interactive Digital Fitness with Data Analytics
FunXtion - Interactive Digital Fitness with Data Analytics
BigDataExpo
 
fashionTrade - Vroeger noemde we dat Big Data
fashionTrade - Vroeger noemde we dat Big DatafashionTrade - Vroeger noemde we dat Big Data
fashionTrade - Vroeger noemde we dat Big Data
BigDataExpo
 
BigData Republic - Industrializing data science: a view from the trenches
BigData Republic - Industrializing data science: a view from the trenchesBigData Republic - Industrializing data science: a view from the trenches
BigData Republic - Industrializing data science: a view from the trenches
BigDataExpo
 
Bicos - Hear how a top sportswear company produced cutting-edge data infrastr...
Bicos - Hear how a top sportswear company produced cutting-edge data infrastr...Bicos - Hear how a top sportswear company produced cutting-edge data infrastr...
Bicos - Hear how a top sportswear company produced cutting-edge data infrastr...
BigDataExpo
 
Endrse - Next level online samenwerkingen tussen personalities en merken met ...
Endrse - Next level online samenwerkingen tussen personalities en merken met ...Endrse - Next level online samenwerkingen tussen personalities en merken met ...
Endrse - Next level online samenwerkingen tussen personalities en merken met ...
BigDataExpo
 
Bovag - Refine-IT - Proces optimalisatie in de automotive sector
Bovag - Refine-IT - Proces optimalisatie in de automotive sectorBovag - Refine-IT - Proces optimalisatie in de automotive sector
Bovag - Refine-IT - Proces optimalisatie in de automotive sector
BigDataExpo
 
Schiphol - Optimale doorstroom van passagiers op Schiphol dankzij slimme data...
Schiphol - Optimale doorstroom van passagiers op Schiphol dankzij slimme data...Schiphol - Optimale doorstroom van passagiers op Schiphol dankzij slimme data...
Schiphol - Optimale doorstroom van passagiers op Schiphol dankzij slimme data...
BigDataExpo
 
Veco - Big Data in de Supply Chain: Hoe Process Mining kan helpen kosten te r...
Veco - Big Data in de Supply Chain: Hoe Process Mining kan helpen kosten te r...Veco - Big Data in de Supply Chain: Hoe Process Mining kan helpen kosten te r...
Veco - Big Data in de Supply Chain: Hoe Process Mining kan helpen kosten te r...
BigDataExpo
 
Rabobank - There is something about Data
Rabobank - There is something about DataRabobank - There is something about Data
Rabobank - There is something about Data
BigDataExpo
 
VU Amsterdam - Big data en datagedreven waardecreatie: valt er nog iets te ki...
VU Amsterdam - Big data en datagedreven waardecreatie: valt er nog iets te ki...VU Amsterdam - Big data en datagedreven waardecreatie: valt er nog iets te ki...
VU Amsterdam - Big data en datagedreven waardecreatie: valt er nog iets te ki...
BigDataExpo
 
Booking.com - Data science and experimentation at Booking.com: a data-driven ...
Booking.com - Data science and experimentation at Booking.com: a data-driven ...Booking.com - Data science and experimentation at Booking.com: a data-driven ...
Booking.com - Data science and experimentation at Booking.com: a data-driven ...
BigDataExpo
 

More from BigDataExpo (20)

Centric - Jaap huisprijzen, GTST, The Bold, IKEA en IENS. Zomaar wat toepassi...
Centric - Jaap huisprijzen, GTST, The Bold, IKEA en IENS. Zomaar wat toepassi...Centric - Jaap huisprijzen, GTST, The Bold, IKEA en IENS. Zomaar wat toepassi...
Centric - Jaap huisprijzen, GTST, The Bold, IKEA en IENS. Zomaar wat toepassi...
 
Google Cloud - Google's vision on AI
Google Cloud - Google's vision on AIGoogle Cloud - Google's vision on AI
Google Cloud - Google's vision on AI
 
Pacmed - Machine Learning in health care: opportunities and challanges in pra...
Pacmed - Machine Learning in health care: opportunities and challanges in pra...Pacmed - Machine Learning in health care: opportunities and challanges in pra...
Pacmed - Machine Learning in health care: opportunities and challanges in pra...
 
PGGM - The Future Explore
PGGM - The Future ExplorePGGM - The Future Explore
PGGM - The Future Explore
 
Universiteit Utrecht & gghdc - Wat zijn de gezondheidseffecten van omgeving e...
Universiteit Utrecht & gghdc - Wat zijn de gezondheidseffecten van omgeving e...Universiteit Utrecht & gghdc - Wat zijn de gezondheidseffecten van omgeving e...
Universiteit Utrecht & gghdc - Wat zijn de gezondheidseffecten van omgeving e...
 
Rob van Kranenburg - Kunnen we ons een sociaal krediet systeem zoals in het o...
Rob van Kranenburg - Kunnen we ons een sociaal krediet systeem zoals in het o...Rob van Kranenburg - Kunnen we ons een sociaal krediet systeem zoals in het o...
Rob van Kranenburg - Kunnen we ons een sociaal krediet systeem zoals in het o...
 
OrangeNXT - High accuracy mapping from videos for efficient fiber optic cable...
OrangeNXT - High accuracy mapping from videos for efficient fiber optic cable...OrangeNXT - High accuracy mapping from videos for efficient fiber optic cable...
OrangeNXT - High accuracy mapping from videos for efficient fiber optic cable...
 
Dynniq & GoDataDriven - Shaping the future of traffic with IoT and AI
Dynniq & GoDataDriven - Shaping the future of traffic with IoT and AIDynniq & GoDataDriven - Shaping the future of traffic with IoT and AI
Dynniq & GoDataDriven - Shaping the future of traffic with IoT and AI
 
Teleperformance - Smart personalized service door het gebruik van Data Science
Teleperformance - Smart personalized service door het gebruik van Data Science Teleperformance - Smart personalized service door het gebruik van Data Science
Teleperformance - Smart personalized service door het gebruik van Data Science
 
FunXtion - Interactive Digital Fitness with Data Analytics
FunXtion - Interactive Digital Fitness with Data AnalyticsFunXtion - Interactive Digital Fitness with Data Analytics
FunXtion - Interactive Digital Fitness with Data Analytics
 
fashionTrade - Vroeger noemde we dat Big Data
fashionTrade - Vroeger noemde we dat Big DatafashionTrade - Vroeger noemde we dat Big Data
fashionTrade - Vroeger noemde we dat Big Data
 
BigData Republic - Industrializing data science: a view from the trenches
BigData Republic - Industrializing data science: a view from the trenchesBigData Republic - Industrializing data science: a view from the trenches
BigData Republic - Industrializing data science: a view from the trenches
 
Bicos - Hear how a top sportswear company produced cutting-edge data infrastr...
Bicos - Hear how a top sportswear company produced cutting-edge data infrastr...Bicos - Hear how a top sportswear company produced cutting-edge data infrastr...
Bicos - Hear how a top sportswear company produced cutting-edge data infrastr...
 
Endrse - Next level online samenwerkingen tussen personalities en merken met ...
Endrse - Next level online samenwerkingen tussen personalities en merken met ...Endrse - Next level online samenwerkingen tussen personalities en merken met ...
Endrse - Next level online samenwerkingen tussen personalities en merken met ...
 
Bovag - Refine-IT - Proces optimalisatie in de automotive sector
Bovag - Refine-IT - Proces optimalisatie in de automotive sectorBovag - Refine-IT - Proces optimalisatie in de automotive sector
Bovag - Refine-IT - Proces optimalisatie in de automotive sector
 
Schiphol - Optimale doorstroom van passagiers op Schiphol dankzij slimme data...
Schiphol - Optimale doorstroom van passagiers op Schiphol dankzij slimme data...Schiphol - Optimale doorstroom van passagiers op Schiphol dankzij slimme data...
Schiphol - Optimale doorstroom van passagiers op Schiphol dankzij slimme data...
 
Veco - Big Data in de Supply Chain: Hoe Process Mining kan helpen kosten te r...
Veco - Big Data in de Supply Chain: Hoe Process Mining kan helpen kosten te r...Veco - Big Data in de Supply Chain: Hoe Process Mining kan helpen kosten te r...
Veco - Big Data in de Supply Chain: Hoe Process Mining kan helpen kosten te r...
 
Rabobank - There is something about Data
Rabobank - There is something about DataRabobank - There is something about Data
Rabobank - There is something about Data
 
VU Amsterdam - Big data en datagedreven waardecreatie: valt er nog iets te ki...
VU Amsterdam - Big data en datagedreven waardecreatie: valt er nog iets te ki...VU Amsterdam - Big data en datagedreven waardecreatie: valt er nog iets te ki...
VU Amsterdam - Big data en datagedreven waardecreatie: valt er nog iets te ki...
 
Booking.com - Data science and experimentation at Booking.com: a data-driven ...
Booking.com - Data science and experimentation at Booking.com: a data-driven ...Booking.com - Data science and experimentation at Booking.com: a data-driven ...
Booking.com - Data science and experimentation at Booking.com: a data-driven ...
 

Recently uploaded

Sid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.pptSid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.ppt
ArshadAyub49
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
Timothy Spann
 
Call Girls Lucknow 0000000000 Independent Call Girl Service Lucknow
Call Girls Lucknow 0000000000 Independent Call Girl Service LucknowCall Girls Lucknow 0000000000 Independent Call Girl Service Lucknow
Call Girls Lucknow 0000000000 Independent Call Girl Service Lucknow
hiju9823
 
Module 1 ppt BIG DATA ANALYTICS NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS NOTES FOR MCA
yuvarajkumar334
 
SAP BW4HANA Implementagtion Content Document
SAP BW4HANA Implementagtion Content DocumentSAP BW4HANA Implementagtion Content Document
SAP BW4HANA Implementagtion Content Document
newdirectionconsulta
 
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
asyed10
 
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
Vietnam Cotton & Spinning Association
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
oaxefes
 
一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理
ugydym
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdfreading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
perranet1
 
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Marlon Dumas
 
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
actyx
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
ywqeos
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
hqfek
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
agdhot
 
Telemetry Solution for Gaming (AWS Summit'24)
Telemetry Solution for Gaming (AWS Summit'24)Telemetry Solution for Gaming (AWS Summit'24)
Telemetry Solution for Gaming (AWS Summit'24)
GeorgiiSteshenko
 
一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理
zsafxbf
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
Rebecca Bilbro
 

Recently uploaded (20)

Sid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.pptSid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.ppt
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
 
Call Girls Lucknow 0000000000 Independent Call Girl Service Lucknow
Call Girls Lucknow 0000000000 Independent Call Girl Service LucknowCall Girls Lucknow 0000000000 Independent Call Girl Service Lucknow
Call Girls Lucknow 0000000000 Independent Call Girl Service Lucknow
 
Module 1 ppt BIG DATA ANALYTICS NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS NOTES FOR MCA
 
SAP BW4HANA Implementagtion Content Document
SAP BW4HANA Implementagtion Content DocumentSAP BW4HANA Implementagtion Content Document
SAP BW4HANA Implementagtion Content Document
 
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
 
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
 
一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdfreading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
 
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
 
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
 
Telemetry Solution for Gaming (AWS Summit'24)
Telemetry Solution for Gaming (AWS Summit'24)Telemetry Solution for Gaming (AWS Summit'24)
Telemetry Solution for Gaming (AWS Summit'24)
 
一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
 

Intel boubker el mouttahid

  • 1. McAfee Confidential Securing Big Data Boubker El Mouttahid | Enterprise Architect
  • 2. McAfee Confidential The risks associated with Big Data technologies New Technology New Risks Any technology that is not well understood will introduce new vulnerabilities. Typically include open source code Luck of security best practices Security User authentication and access to data from multiple locations may not be sufficiently controlled There is significant opportunity for malicious data input and inadequate data validation Attack surface of the nodes in a cluster may not have been reviewed and servers adequately hardened. Data Privacy & Compliancy Regulatory requirements may not be fulfilled, with access to logs and audit trails problematic Data Security: Hadoop store the data as it is without encryption to improve efficiency Granular access control: What types of personal information can be deemed sharable and with whom 2
  • 3. McAfee Confidential Emerging Hadoop Security Maturity Model 3
  • 4. McAfee Confidential Security Requirements of the Enterprise • Network Security Authentication Authorization Data Protection Visibility & Monitoring Secure Configurations for Hardware and Software
  • 5. McAfee Confidential Comprehensive, Security & Compliance-Ready Securing the underlying operating system Authentication, Authorization, Audit, and Compliance Perimeter Guarding access to the cluster itself InfoSec Concept: Authentication Access Defining what users and applications can do with data InfoSec Concept: Authorization Visibility Reporting on where data came from and how it’s being used InfoSec Concept: Audit Data Protecting data in the cluster from unauthorized visibility InfoSec Concept: Compliance Network Security Secure Configuration Real Time Monitoring
  • 6. McAfee Confidential Platform Security Requirements Network Security Secure Configuration Real Time Monitoring Defense, resilience Deep packet inspections Securing the underlying operating system and the applications installed on the system Log correlation and analysis to rapidly identify anomalies
  • 7. McAfee Confidential Perimeter Security Requirements Preserve user choice of the right Hadoop service (e.g. Impala, Spark) Conform to centrally managed authentication policies Implement with existing standard systems: Active Directory and Kerberos Perimeter Guarding access to the cluster itself InfoSec Concept: Authentication
  • 8. McAfee Confidential • Contributed by Intel in 2013 • Blueprint for enterprise-grade security Cloudera and Intel Project Rhino Rhino Goal: Unified Authorization Engineers at Intel and Cloudera (together with Oracle and IBM) are now jointly contributing to Apache Sentry Rhino Goal: Encryption and Key Management Framework Cloudera and Intel engineers are now contributing HDFS encryption capabilities that can plug into enterprise key managers
  • 9. McAfee Confidential Right Solution • Provides maximum flexibility • Delivers centrally managed authentication • Automates configuration while leveraging existing infrastructure Watch for other solutions that… • Require setup of additional Kerberos server and cross-realm trust • Lead to manual and error-prone Kerberos config on individual nodes • Offer limited support for username/password authentication against AD Business Impact • DELAY: Must seek InfoSec sign-off for cross-realm trust establishment • SET-UP COST: Must procure & configure Kerberos server & nodes • ONGOING MAINTENANCE: Additional task for each new Kerberos user Authentication and Identity ✓ ✗ “Integrate With Existing Enterprise Authentication Mechanisms for Hadoop Identity and Access Management.” Gartner – Best Practices for Securing Hadoop
  • 10. McAfee Confidential Access Security Requirements Provide users access to data needed to do their job Centrally manage access policies Leverage a role-based access control model built on AD Access Defining what users and applications can do with data InfoSec Concept: Authorization
  • 11. McAfee Confidential Manage data access by role, instead of by individual user • Fraud Analyst Role has read access on ALL transaction data • Branch Teller Role has read / write access on very limited set of data • Relationships between users and roles are established via groups An RBAC policy is then uniformly enforced for all Hadoop services • Provides unified authorization controls • As opposed to tools for managing numerous, service specific policies RBAC and Centralized Authorization
  • 12. McAfee Confidential Sentry provides unified authorization via fine-grained RBAC for Impala, Hive, Search, MapReduce, Pig, HDFS… Unified Authorization with Apache Sentry Sentry Perm. Read Access to ALL Transaction Data Sentry Role Fraud Analyst Role Group Fraud Analysts Sam Smith
  • 13. McAfee Confidential • Sentry can be configured to use AD to determine a user’s group assignments • Group assignment changes in AD are automatically picked up, resulting in updated Sentry role assignments Sentry and Active Directory Groups Sentry Perm. Read Access to ALL Transaction Data Sentry Role Fraud Analyst Role AD Group Fraud Analysts Sam Smith
  • 14. McAfee Confidential Sentry enforces each rule across Hadoop components 16 Hive Server 2 Enforcemen tcode Impala MapReduce , Pig, HDFS* Apps: Datameer, Platfora, etc* Permissions rules Common enforcement code for consistency. Rule 1: Allow fraud analysts read access to the transaction table Permissions specified by administrators (top-level and delegated) Enforcemen tcode Enforcemen tcode Enforcemen tcode
  • 15. McAfee Confidential Sentry – The Open Standard Broad Contributions • Cloudera • IBM • Intel • Oracle Multi-Vendor Support • Cloudera • IBM • MapR • Oracle Wide Industry Adoption • Banking • Healthcare • Insurance • Pharma • Telco Third-Party Integrations • Oracle Endeca • Platfora
  • 16. McAfee Confidential Right solution • User access determined via group assignments • Unified authorization via granular RBAC policy • Leverages existing AD infrastructure Watch for other solutions that… • Require redundant security policies; one for every access path • Do not offer an RBAC policy model • Cannot meet InfoSec requirement for centrally managed authorization • Depend on manual mirroring of AD group assignments Business Impact • DELAY: InfoSec approval for data access assignments outside of AD • ONGOING COSTS: Authorization policies have to be reviewed and tested for each access path • ONGOING MAINTENANCE: Mirroring of directory group assignments Authorization and Access ✓ ✗ “A must-have for enterprise access scenarios, the most prominent solution here is Apache Sentry” Gigaom– Hadoop Security: Solutions Emerge
  • 17. McAfee Confidential Visibility Security Requirements Understand where report data came from and discover more data like it Comply with policies for audit, data classification, and lineage Centralize the audit repository; perform discovery; automate lineage Visibility Reporting on where data came from and how it’s being used InfoSec Concept: Audit
  • 18. McAfee Confidential Right solution • Users can easily discover data and examine lineage • Complies with requirements for audit, classification, lineage • No additional IT burden: audit logs are centralized, lineage is automatic, users can self help Watch for other solutions that… • Offer no unified audit trail for point in time user access • Limited lineage, available only at file level, no visualization • Third-party tools required for data discovery Business Impact • DELAY: InfoSec testing, validation, and approval of third-party tools • COMPLIANCE RISK: Inability to respond quickly if point-in-time user access history needed. Inability to meet core data governance requirements without column level lineage Audit and Governance ✓ ✗ “Cloudera Navigator is… one pane of glass for all Hadoop metadata and events including security” Gartner – Protecting Big Data In Hadoop
  • 19. McAfee Confidential ©2014 Cloudera, Inc. All rights reserved. Data Security Requirements Perform analytics on regulated data Encrypt data, conform to key management policies, protect from root Integrate with existing HSM as part of key management infrastructure Data Protecting data in the cluster from unauthorized visibility InfoSec Concept: Compliance
  • 20. McAfee Confidential Right solution • Brings the power of pervasive analytics to regulated data • Delivers compliant protection with encryption, key management • Provides separation of duties between system and data admins • Conforms to existing policies regarding HSM based key management Watch for other solutions that… • Run risk of data breach or theft by storing data in clear text • Require 3rd party encryption and key management solutions • Offer no protection against privileged user access • May not integrate with corporate HSM’s Business Impact • EXPOSURE: theft or breach of data – fines, damage to brand • DELAY: InfoSec testing, validation and approval of 3rd party solutions (COST) • DELAY: InfoSec approval for key management independent of HSM • COMPLIANCE RISK: Potential PCI issues Encryption and Key Management ✓ ✗ “Cloudera… recognized that data in Hadoop must be protected both at rest and in transit… and have made data encryption part of their products.” Gartner – Protecting Big Data In Hadoop
  • 21. McAfee Confidential 23 Recommendation  Enterprise data hub with built-in security  Comprehensive and integrated security  Compliance Ready
  • 22. Intel & McAfee Confidential 24

Editor's Notes

  1. For Hadoop operators in finance, government, healthcare, and other highly-regulated industries to enable access to sensitive data under proper compliance, each of the four functional requirements must be achieved: Perimeter Security: Guarding access to the cluster through network security, firewalls, and, ultimately, authentication to confirm user identities Data Security: Protecting the data in the cluster from unauthorized visibility through masking and encryption, both at rest and in transit Access Security: Defining what authenticated users and applications can do with the data in the cluster through filesystem ACLs and fine-grained authorization Visibility: Reporting on the origins of data and on data usage through centralized auditing and lineage capabilities
  2. For Hadoop operators in finance, government, healthcare, and other highly-regulated industries to enable access to sensitive data under proper compliance, each of the four functional requirements must be achieved: Perimeter Security: Guarding access to the cluster through network security, firewalls, and, ultimately, authentication to confirm user identities Data Security: Protecting the data in the cluster from unauthorized visibility through masking and encryption, both at rest and in transit Access Security: Defining what authenticated users and applications can do with the data in the cluster through filesystem ACLs and fine-grained authorization Visibility: Reporting on the origins of data and on data usage through centralized auditing and lineage capabilities
  3. Directory services and Kerberos
  4. “We currently manage all user authentication and service access through a combination of Active Directory and Kerberos. We have ‘audited’ procedures based around these technologies. Help me understand how your cluster will fit into these paradigms. Also, my cousin said I will have to stand up an additional KDC and put Kerberos clients on every desktop. I really hope that’s not the case, Kerberos configuration is a pain in the a**”
  5. There are many aspects to security - and it's all too easy for other vendors to claim their platforms are "secure" because they cover one or more of these pillars. To achieve comprehensive security, we offer all four pillars of security: Perimeter, Access, Visibility, and Data. Cloudera Enterprise achieves all of these and is compliance-ready out-of-the-box to ensure you’re protected
  6. In trying to solve the data access problem in Impala – we need to introduce a very important concept. Role Based Access Controls. This is very similar to the idea of Active Directory. With role based access control - I am a user in a group, and that group is assigned to some role, that role has a set of privileges that define what data the role can access and the actions that can be performed. This relationship user-group-role-privileges defines the users access and privileges.
  7. Recall: AD Group membership in conjunction with Kerberos is used to control access to SERVICES e.g. Impala
  8. Open standard for unified authorization in Hadoop Ensures compatibility with future developments Integrates with larger enterprise posture - How many companies are contributing to it - How many competitors ship it - How many supporting tools work with it - The business benefits of that openness
  9. There are many aspects to security - and it's all too easy for other vendors to claim their platforms are "secure" because they cover one or more of these pillars. To achieve comprehensive security, we offer all four pillars of security: Perimeter, Access, Visibility, and Data. Cloudera Enterprise achieves all of these and is compliance-ready out-of-the-box to ensure you’re protected
  10. Simplifies and automates the configuration reducing the administrative burden allowing processes to scale and reducing human error Introduced a unified, pluggable authorization model that is seeing adoption across distros and in 3rd party products Comprehensive capabilities = Superior value through inclusion of many capabilities that require 3rd party purchases in other distributions Takes the friction out of the go-live process by providing full coverage against the InfoSec checklist Security “Product” extends well beyond Hadoop security controls
  11. There are many aspects to security - and it's all too easy for other vendors to claim their platforms are "secure" because they cover one or more of these pillars. To achieve comprehensive security, we offer all four pillars of security: Perimeter, Access, Visibility, and Data. Cloudera Enterprise achieves all of these and is compliance-ready out-of-the-box to ensure you’re protected