Dell on Dell:
How we secure Big Data and protect
our digital assets
Deepak Gattala, EBI Planning & Strategy
Attila Finta, EBI Planning & Strategy
SessionMT100
Dell - Internal Use - Confidential
The landscape
Big Data means big data access problems
Platforms such as Hadoop are primitive
The balancing act: access vs. “need to know”
Streams of data and analytics
Dell is dealing with this too
Pain points
Authentication
Segregation of duties
Release management
Authorization
No “root”
Audits
Dell - Internal Use - Confidential
Encryption at rest
Data governance
Data lineage
Data stewardship
Network design
Influencing factors
Local user accounts
Right architecture
Security exceptions
Role-based security
Row-level security
Dell - Internal Use - Confidential
Network topology
Dedicate 10 GB network for better performance
Built-in redundancy for high availability
Load balanced and failover architecture
Bonded network interfaces for optimized throughput
Separated public network route for administration
Dell - Internal Use - Confidential
Today Planned
Our approach
• Cloudera Hadoop distribution
• Quest Vintella authentication
services
• Kerberos AD integration
• Apache Sentry
• ClouderaKey
Management System
• Record service
• Row-level security
• Encryption
Dell - Internal Use - Confidential
Cloudera Manager
One stop shop of holistic view of the environment
Integrated security, governance, lineage & auditing
Alerts & health check monitoring at fingertips
Life Cycle Management with increased operational efficiency
1. Be aware of the corporate policies
2. Make security the first priority
3. Leverage existing tools and skills
4. Governance strictly should be enabled
5. Always look forward to plan ahead
Our conclusions
Thank you
MT100 How we secure Big Data and protect our digital assets

MT100 How we secure Big Data and protect our digital assets

  • 1.
    Dell on Dell: Howwe secure Big Data and protect our digital assets Deepak Gattala, EBI Planning & Strategy Attila Finta, EBI Planning & Strategy SessionMT100
  • 2.
    Dell - InternalUse - Confidential The landscape Big Data means big data access problems Platforms such as Hadoop are primitive The balancing act: access vs. “need to know” Streams of data and analytics Dell is dealing with this too
  • 3.
    Pain points Authentication Segregation ofduties Release management Authorization No “root” Audits
  • 4.
    Dell - InternalUse - Confidential Encryption at rest Data governance Data lineage Data stewardship Network design Influencing factors Local user accounts Right architecture Security exceptions Role-based security Row-level security
  • 5.
    Dell - InternalUse - Confidential Network topology Dedicate 10 GB network for better performance Built-in redundancy for high availability Load balanced and failover architecture Bonded network interfaces for optimized throughput Separated public network route for administration
  • 6.
    Dell - InternalUse - Confidential Today Planned Our approach • Cloudera Hadoop distribution • Quest Vintella authentication services • Kerberos AD integration • Apache Sentry • ClouderaKey Management System • Record service • Row-level security • Encryption
  • 7.
    Dell - InternalUse - Confidential Cloudera Manager One stop shop of holistic view of the environment Integrated security, governance, lineage & auditing Alerts & health check monitoring at fingertips Life Cycle Management with increased operational efficiency
  • 8.
    1. Be awareof the corporate policies 2. Make security the first priority 3. Leverage existing tools and skills 4. Governance strictly should be enabled 5. Always look forward to plan ahead Our conclusions
  • 9.