SlideShare a Scribd company logo
SECURING
THE CLOUD
DATA LAKE
The present digital world is all about data, which
probably matters the most for any organization today.
Every day over 2.5 quintillion bytes of data is generated.
Enterprises moving to the cloud have provided the
flexibility to access the data from anywhere, any device.
These data stored on the cloud data lake platform brings
a unified analytical environment that includes cloud
storage, multiple data processing engines, advanced
analytical tools, and more, enabling scalability, agility,
and cost-benefit for an enterprise.
This whitepaper provides a comprehensive guide on
securing your cloud data lake platform with industry best
practices endorsed by leading IT security experts.
Let us understand some of the infrastructural and
security challenges that every organization faces today
before delving into the concept of securing the cloud
data lake platform. Though Data lakes provide scalability,
agility, and cost-effective features, it possesses a unique
infrastructure and security challenges.
READ ABOUT CLOUD DATA
LAKES CHALLENGES
Data
Management
Though data lakes support
all data types, managing
those data in multi and
hybrid environments is the
biggest challenge, and it is
an intensive process. When
things go wrong, data swamps
may happen, and poor data
management requires many
fixations.
Scalability
The modern EDR and XDR
solutions generate large
amounts of data but are not
built or fully capable enough
to manage the data produced.
Hence, when these data are
pushed to the SIEM solutions,
the time it takes to search,
efforts to maintain, and scale
are massive.
Unstructured Data
The major challenge is handling
unstructured data, making it
difficult for the security team
to search and analyze huge
volumes of data. In addition,
most security tools leave data
normalization to the users,
making it more challenging for
security analysts to understand
relationships between
malicious indicators and events
across time.
CLOUD DATA LAKES
CHALLENGES
Data Migration
The first and foremost
challenge for any organization
is migrating the data into the
cloud. It’s not only complex but
also requires huge investments,
especially when it is done
repeatedly.
Data Analytics
It is very difficult for the
security team to filter and
detect malicious activity.
Traditional SIEMs have limited
capabilities that rely on
restrictive languages to query
and interact with the data
but cannot handle advanced
analytics. Any organization
moves to the cloud mainly to its
analytics feature that combines,
transforms, and organizes
disparate data sources. Though
many cloud service providers
offer analytics solutions, a
robust solution is required to
effectively utilize and hook into
these analytics platforms.
Data Storage
Cost
Most organizations intentionally
reduce the security data
collection required for
defending against attacks
due to its high license cost.
This is the primary reason
organizations lack an effective
investigation, which is a huge
anti-pattern where breaches
get unnoticed. Organizations
depend on third-party cloud
service providers. These cloud
service providers charge based
on the time more than the
size of the data stored. The
cost gradually increases over
time. This may become a huge
burden for the businesses
where the existing engineering
and IT costs might be invested
to rent cloud services.
HOW TO
SECURE
YOUR CLOUD
DATA LAKES
To overcome the above challenges related
to scaling, detection, cost, and analytics,
organizations must separate the storage
and adopt serverless services that reduce
the overheads and provide flexibility in
processing data at a large scale. Having
an effective security data lake helps you to
centralize data and enhances the power of
threat detection, analytics, and compliance
initiatives. This eventually supports complex
use cases for security analysis, including
threat hunting at scale.
Implement Data Loss
Prevention (DLP) Strategy
Cloud data lakes leverage persistent data in
cloud objects to optimize and maintain data
integrity and availability. The capabilities like
object versioning and retention capabilities
provide crucial redundancy in the accidental
deletion or object replacement. Ensure
every service that manages, or stores data
is identified and classified based on their
sensitive level deploy the appropriate level
of security and control. The sensitive level is
based on security and regulation standards.
Ensuring a proper evaluation of all the services
that manage and store data is crucial. In
addition, limiting the access from deletion or
updating functions will eventually reduce data
loss, and having a backup plan will enhance the
overall data retention capabilities.
01
Separate Security
Functions
Hardening the
Cloud Platform
The foremost practice is to separate security
from non-security functions, which is essential
to mitigate risk. User’s access must be restricted
from critical business data and provide access
to those required to perform the task. When it
comes to cloud data lake platforms, access to
both cloud and data lake platforms should be
limited to only experienced security personnel
and ensure only this security personnel have
access to alter cloud security controls. A minor
misconfiguration or lack of knowledge can
become vulnerable to a security breach.
Harden and isolate your cloud data lake
deployment with a unique cloud account. Cloud
services like AWS, Azure, Google, and more
can easily leverage organizations’ services to
create and manage new accounts. The most
compelling model for logical data separation on
cloud platforms is to use a unique cloud account
for your deployment. Implementing hardening
protection in line with CIS, Benchmarks will
ensure security by providing logical data
separation from your other cloud services.
02
03
Secure the Network
Perimeter
Implement Host-Based
Security
After isolation and hardening the cloud
account, building a secure network perimeter
for the environment is important. You adopt
any method to secure the network perimeter,
but the method you select must be in line
with specific circumstances. Key compliance
or bandwidth requirements may well indicate
that a private connection or a cloud VPN
(Virtual Private Network) is required. The
firewall is crucial for maintaining traffic control
and visibility of any sensitive data stored in
the cloud, and non-private connections are
allowed. Leveraging a third-party next-gen
firewall will offer you the features of intrusion
prevention, application awareness, and threat
intelligence and generally complement native
cloud security tools. By deploying a virtualized
enterprise firewall in a hub and spoke design,
you can ensure effective security in place with
consistent compliance throughout your cloud
environment.
Throughout your cloud infrastructure
environments, only firewalls should have public
IP addresses. Use robust entry and exit policies
with breach prevention profiles to reduce
the risk of unauthorized access and data
exfiltration.
Host security is a broad attempt and must adapt
to specific service and function use cases.
Host Intrusion Detection
Host intrusion detection is a crucial component
that runs on the host and uses various detection
techniques to find suspicious activity, either
known threat signatures or behavioral anomalies.
It alerts the administrators if any unusual event
is detected. Leveraging Machine learning
algorithms combined with either threat or
anomaly-based systems can even offer higher
level detection and respond to potential threats
and attacks.
File Integrated Monitoring
Considering most exploits, attackers require
elevated rights to get into the system and corrupt
files or services. FIM solutions provide you
with the ability to detect and track the changes
made by the attackers and alerts you with the
detailed changes made within the system. Some
File integrity monitoring (FIM) also provides an
advanced feature to restore files to their previous
state.
Log Management
Log management is very crucial and needs
proper attention while implementing this in your
security practice. The analysis of logged events
provides a vital role in investigating security
incidents. Log storage, retentions, and deletion
policies should be carefully designed with
proper procedure and control to meet regulatory
compliance requirements. The most common
method to enforce secure log management
policies will copy logs into storage in real-time.
Many open-source log management tools and
licensed versions of log management tools
are designed to integrate with cloud-based
solutions, which offer additional data visualization
capabilities and usage alerts.
04 05
Leverage Authorization
Controls
Implement Strong
Identity Management and
Authentication Measures
Cloud providers provide data and
resource access controls and column level
filtering to secure sensitive data as part of
their platform-as-a-service solutions. This
Identity and Access Management (IAM)
policies and role-based access controls
(RBAC) allow you to limit access control
using the principle of least privilege.
Cloud providers offer fine-grained access
control through their Lake Formation
service, which automates the process to
secure your data lake.
Depending on the number of services
running in the cloud data lake, you may
need to extend this approach with other
open-source or 3rd party projects such
as Apache Ranger to ensure fine-grained
authorization across all services.
Identity management is the main pillar for
having robust access control for cloud
data lakes. The first step in building a
secured data lake is integrating your
identity provider with the cloud provider.
Managing third-party applications or
deploying data lakes with multiple
services requires a patchwork of
authentication services such as SAML
clients and providers to use Auth0,
OpenLDAP, Kerberos, Apache Knox, or
others.
For example, AWS provides help with SSO
integrations for federated EMR Notebook
access.
07
06 08
Enforce Encryption
Following the encryption guidance provided by the
cloud service providers is crucial for cluster and data
security. It requires a strong understanding of Identity
and Access Management (IAM) key rotation policies
and application configurations to effectively leverage
these fundamental security functions. Encryption
must protect both data at rest and data in motion.
You may provide a self-certificate in case if you are
using integrated third-party cloud services. Amazon
S3 supports multiple encryption options where AWS
Key Management System (KMS) provides centralized
control over the encryption keys to protect data
assets. This KMS offers the flexibility to rotate, disable,
delete, define usage policies, and audit the use of
encryption keys.
09
Vulnerability and Patch
Management
Leverage a comprehensive vulnerability and
security patching strategy that combines automated
detection, risk assessment and complexity, testing,
and patch deployment. Using alternative mitigation
techniques, turning off unnecessary services, and
employing firewall controls will reduce the vulnerability
time. Having clear visibility on your vulnerability
management program is crucial and understanding the
risk factor within your environment will reduce
exploitation and data loss.
10
Compliance Monitoring
and Incident Response
Compliance monitoring and incident response are the
heart of any cloud security functions, including early
threat detection, investigation, and response. Integrate
them to perform cloud monitoring if you already have
existing security information and event management
(SIEM). Cloud deployments have unique threats that
require experience and practice to identify and resolve
the issues correctly. Bring in the best incident response
strategy in place to react quickly to security incidents.
Conclusion
Organizations moving to the cloud aim
for a robust and flexible environment with
analytical-driven AI/ML capabilities that
benefit enterprises from agility, scalability, and
cost-effective solution. Securing this complex
environment requires skills and adequate
security measures to protect data and the
surrounding environment, such as cloud
platforms, storage, data processing engines,
and analytical tools that carry the risk of
exploitation. Following the above security
best practices, adhering to compliance, and
utilizing the maximum analytical benefits of
cloud data lakes can help you manage and
protect data effectively.
Vinayak S
Senior Practice Manager,
Cloud & Infra Security
Vinayak S has over 13+ years of experience
across various IT security service domains
like Cloud Security, Infrastructure Security,
and Cyber Security Practice. He is currently
working as a Senior Practice Manager for
Cloud and Infrastructure Security Service at
Happiest Minds Technologies Ltd. Vinayak
carries a niche experience across the BFSI,
Health, and Global sectors. He is responsible
for designing and implementing the security
infrastructure for multiple customers,
multiple technologies covering the Cloud
and On-Prem in Compliance with all security
specifications that are being followed as the
best information security practice.
For more details, write to us at
Business@happiestminds.com
www.happiestminds.com
About the
Author
About Happiest Minds Technologies
Happiest Minds Technologies Limited (NSE: HAPPSTMNDS), a Mindful IT Company, enables digital
transformation for enterprises and technology providers by delivering seamless customer
experiences, business efficiency and actionable insights. We do this by leveraging a spectrum of
disruptive technologies such as: artificial intelligence, blockchain, cloud, digital process
automation, internet of things, robotics / drones, security, virtual/augmented reality, etc. Positioned
as ‘Born Digital. Born Agile’, our capabilities span digital solutions, infrastructure, product
engineering and security. We deliver these services across industry sectors such as automotive,
BFSI, consumer packaged goods, e-commerce, edutech, engineering R&D, hi-tech, manufacturing,
retail and travel/transportation/hospitality.
A Great Place to Work-Certified™ company, Happiest Minds is headquartered in Bangalore, India
with operations in the U.S., UK, Canada, Australia and Middle East.

More Related Content

What's hot

Unlock the full potential of IoT
Unlock the full potential of IoT Unlock the full potential of IoT
Unlock the full potential of IoT
Happiest Minds Technologies
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principles
Mindtree Ltd.
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
IJECEIAES
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
Cyber Security Infotech
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
VivianMarcello3
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Raffa Learning Community
 
Practice case legal for data professional
Practice case legal for data professionalPractice case legal for data professional
Practice case legal for data professional
Novita Sari
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
Shankar Subramaniyan
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
ssuser1eca7d
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
HTS Hosting
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
Happiest Minds Technologies
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
Pöyry
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
 

What's hot (20)

Unlock the full potential of IoT
Unlock the full potential of IoT Unlock the full potential of IoT
Unlock the full potential of IoT
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principles
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Practice case legal for data professional
Practice case legal for data professionalPractice case legal for data professional
Practice case legal for data professional
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
Sql securitytesting
Sql  securitytestingSql  securitytesting
Sql securitytesting
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 

Similar to SECURING THE CLOUD DATA LAKES

the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
Intelligentia IT Systems Pvt. Ltd.
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
Epoch Universal, Inc.
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
Revathiparamanathan
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
Abhishek Sood
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125Gabor Bokor
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
manoharparakh
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
Ciente
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
Metaorange
 

Similar to SECURING THE CLOUD DATA LAKES (20)

the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 

More from Happiest Minds Technologies

Largest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case StudyLargest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case Study
Happiest Minds Technologies
 
BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24
Happiest Minds Technologies
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
Happiest Minds Technologies
 
DIGITAL MANUFACTURING
DIGITAL MANUFACTURINGDIGITAL MANUFACTURING
DIGITAL MANUFACTURING
Happiest Minds Technologies
 
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & InsuranceExploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Happiest Minds Technologies
 
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSEAN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
Happiest Minds Technologies
 
VMware to AWS Cloud Migration
VMware to AWS Cloud MigrationVMware to AWS Cloud Migration
VMware to AWS Cloud Migration
Happiest Minds Technologies
 
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdfDigital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
Happiest Minds Technologies
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Happiest Minds Technologies
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
Happiest Minds Technologies
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Happiest Minds Technologies
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
Happiest Minds Technologies
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
Happiest Minds Technologies
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
Happiest Minds Technologies
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Happiest Minds Technologies
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
 
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
 
How to Approach Tool Integrations
How to Approach Tool IntegrationsHow to Approach Tool Integrations
How to Approach Tool Integrations
Happiest Minds Technologies
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
 
Contact Centre Growing Digital
Contact Centre Growing DigitalContact Centre Growing Digital
Contact Centre Growing Digital
Happiest Minds Technologies
 

More from Happiest Minds Technologies (20)

Largest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case StudyLargest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case Study
 
BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
DIGITAL MANUFACTURING
DIGITAL MANUFACTURINGDIGITAL MANUFACTURING
DIGITAL MANUFACTURING
 
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & InsuranceExploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
 
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSEAN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
 
VMware to AWS Cloud Migration
VMware to AWS Cloud MigrationVMware to AWS Cloud Migration
VMware to AWS Cloud Migration
 
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdfDigital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
 
How to Approach Tool Integrations
How to Approach Tool IntegrationsHow to Approach Tool Integrations
How to Approach Tool Integrations
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
Contact Centre Growing Digital
Contact Centre Growing DigitalContact Centre Growing Digital
Contact Centre Growing Digital
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

SECURING THE CLOUD DATA LAKES

  • 2. The present digital world is all about data, which probably matters the most for any organization today. Every day over 2.5 quintillion bytes of data is generated. Enterprises moving to the cloud have provided the flexibility to access the data from anywhere, any device. These data stored on the cloud data lake platform brings a unified analytical environment that includes cloud storage, multiple data processing engines, advanced analytical tools, and more, enabling scalability, agility, and cost-benefit for an enterprise. This whitepaper provides a comprehensive guide on securing your cloud data lake platform with industry best practices endorsed by leading IT security experts. Let us understand some of the infrastructural and security challenges that every organization faces today before delving into the concept of securing the cloud data lake platform. Though Data lakes provide scalability, agility, and cost-effective features, it possesses a unique infrastructure and security challenges. READ ABOUT CLOUD DATA LAKES CHALLENGES
  • 3. Data Management Though data lakes support all data types, managing those data in multi and hybrid environments is the biggest challenge, and it is an intensive process. When things go wrong, data swamps may happen, and poor data management requires many fixations. Scalability The modern EDR and XDR solutions generate large amounts of data but are not built or fully capable enough to manage the data produced. Hence, when these data are pushed to the SIEM solutions, the time it takes to search, efforts to maintain, and scale are massive. Unstructured Data The major challenge is handling unstructured data, making it difficult for the security team to search and analyze huge volumes of data. In addition, most security tools leave data normalization to the users, making it more challenging for security analysts to understand relationships between malicious indicators and events across time. CLOUD DATA LAKES CHALLENGES Data Migration The first and foremost challenge for any organization is migrating the data into the cloud. It’s not only complex but also requires huge investments, especially when it is done repeatedly. Data Analytics It is very difficult for the security team to filter and detect malicious activity. Traditional SIEMs have limited capabilities that rely on restrictive languages to query and interact with the data but cannot handle advanced analytics. Any organization moves to the cloud mainly to its analytics feature that combines, transforms, and organizes disparate data sources. Though many cloud service providers offer analytics solutions, a robust solution is required to effectively utilize and hook into these analytics platforms. Data Storage Cost Most organizations intentionally reduce the security data collection required for defending against attacks due to its high license cost. This is the primary reason organizations lack an effective investigation, which is a huge anti-pattern where breaches get unnoticed. Organizations depend on third-party cloud service providers. These cloud service providers charge based on the time more than the size of the data stored. The cost gradually increases over time. This may become a huge burden for the businesses where the existing engineering and IT costs might be invested to rent cloud services.
  • 4. HOW TO SECURE YOUR CLOUD DATA LAKES To overcome the above challenges related to scaling, detection, cost, and analytics, organizations must separate the storage and adopt serverless services that reduce the overheads and provide flexibility in processing data at a large scale. Having an effective security data lake helps you to centralize data and enhances the power of threat detection, analytics, and compliance initiatives. This eventually supports complex use cases for security analysis, including threat hunting at scale. Implement Data Loss Prevention (DLP) Strategy Cloud data lakes leverage persistent data in cloud objects to optimize and maintain data integrity and availability. The capabilities like object versioning and retention capabilities provide crucial redundancy in the accidental deletion or object replacement. Ensure every service that manages, or stores data is identified and classified based on their sensitive level deploy the appropriate level of security and control. The sensitive level is based on security and regulation standards. Ensuring a proper evaluation of all the services that manage and store data is crucial. In addition, limiting the access from deletion or updating functions will eventually reduce data loss, and having a backup plan will enhance the overall data retention capabilities. 01 Separate Security Functions Hardening the Cloud Platform The foremost practice is to separate security from non-security functions, which is essential to mitigate risk. User’s access must be restricted from critical business data and provide access to those required to perform the task. When it comes to cloud data lake platforms, access to both cloud and data lake platforms should be limited to only experienced security personnel and ensure only this security personnel have access to alter cloud security controls. A minor misconfiguration or lack of knowledge can become vulnerable to a security breach. Harden and isolate your cloud data lake deployment with a unique cloud account. Cloud services like AWS, Azure, Google, and more can easily leverage organizations’ services to create and manage new accounts. The most compelling model for logical data separation on cloud platforms is to use a unique cloud account for your deployment. Implementing hardening protection in line with CIS, Benchmarks will ensure security by providing logical data separation from your other cloud services. 02 03
  • 5. Secure the Network Perimeter Implement Host-Based Security After isolation and hardening the cloud account, building a secure network perimeter for the environment is important. You adopt any method to secure the network perimeter, but the method you select must be in line with specific circumstances. Key compliance or bandwidth requirements may well indicate that a private connection or a cloud VPN (Virtual Private Network) is required. The firewall is crucial for maintaining traffic control and visibility of any sensitive data stored in the cloud, and non-private connections are allowed. Leveraging a third-party next-gen firewall will offer you the features of intrusion prevention, application awareness, and threat intelligence and generally complement native cloud security tools. By deploying a virtualized enterprise firewall in a hub and spoke design, you can ensure effective security in place with consistent compliance throughout your cloud environment. Throughout your cloud infrastructure environments, only firewalls should have public IP addresses. Use robust entry and exit policies with breach prevention profiles to reduce the risk of unauthorized access and data exfiltration. Host security is a broad attempt and must adapt to specific service and function use cases. Host Intrusion Detection Host intrusion detection is a crucial component that runs on the host and uses various detection techniques to find suspicious activity, either known threat signatures or behavioral anomalies. It alerts the administrators if any unusual event is detected. Leveraging Machine learning algorithms combined with either threat or anomaly-based systems can even offer higher level detection and respond to potential threats and attacks. File Integrated Monitoring Considering most exploits, attackers require elevated rights to get into the system and corrupt files or services. FIM solutions provide you with the ability to detect and track the changes made by the attackers and alerts you with the detailed changes made within the system. Some File integrity monitoring (FIM) also provides an advanced feature to restore files to their previous state. Log Management Log management is very crucial and needs proper attention while implementing this in your security practice. The analysis of logged events provides a vital role in investigating security incidents. Log storage, retentions, and deletion policies should be carefully designed with proper procedure and control to meet regulatory compliance requirements. The most common method to enforce secure log management policies will copy logs into storage in real-time. Many open-source log management tools and licensed versions of log management tools are designed to integrate with cloud-based solutions, which offer additional data visualization capabilities and usage alerts. 04 05
  • 6. Leverage Authorization Controls Implement Strong Identity Management and Authentication Measures Cloud providers provide data and resource access controls and column level filtering to secure sensitive data as part of their platform-as-a-service solutions. This Identity and Access Management (IAM) policies and role-based access controls (RBAC) allow you to limit access control using the principle of least privilege. Cloud providers offer fine-grained access control through their Lake Formation service, which automates the process to secure your data lake. Depending on the number of services running in the cloud data lake, you may need to extend this approach with other open-source or 3rd party projects such as Apache Ranger to ensure fine-grained authorization across all services. Identity management is the main pillar for having robust access control for cloud data lakes. The first step in building a secured data lake is integrating your identity provider with the cloud provider. Managing third-party applications or deploying data lakes with multiple services requires a patchwork of authentication services such as SAML clients and providers to use Auth0, OpenLDAP, Kerberos, Apache Knox, or others. For example, AWS provides help with SSO integrations for federated EMR Notebook access. 07 06 08 Enforce Encryption Following the encryption guidance provided by the cloud service providers is crucial for cluster and data security. It requires a strong understanding of Identity and Access Management (IAM) key rotation policies and application configurations to effectively leverage these fundamental security functions. Encryption must protect both data at rest and data in motion. You may provide a self-certificate in case if you are using integrated third-party cloud services. Amazon S3 supports multiple encryption options where AWS Key Management System (KMS) provides centralized control over the encryption keys to protect data assets. This KMS offers the flexibility to rotate, disable, delete, define usage policies, and audit the use of encryption keys. 09 Vulnerability and Patch Management Leverage a comprehensive vulnerability and security patching strategy that combines automated detection, risk assessment and complexity, testing, and patch deployment. Using alternative mitigation techniques, turning off unnecessary services, and employing firewall controls will reduce the vulnerability time. Having clear visibility on your vulnerability management program is crucial and understanding the risk factor within your environment will reduce exploitation and data loss. 10 Compliance Monitoring and Incident Response Compliance monitoring and incident response are the heart of any cloud security functions, including early threat detection, investigation, and response. Integrate them to perform cloud monitoring if you already have existing security information and event management (SIEM). Cloud deployments have unique threats that require experience and practice to identify and resolve the issues correctly. Bring in the best incident response strategy in place to react quickly to security incidents.
  • 7. Conclusion Organizations moving to the cloud aim for a robust and flexible environment with analytical-driven AI/ML capabilities that benefit enterprises from agility, scalability, and cost-effective solution. Securing this complex environment requires skills and adequate security measures to protect data and the surrounding environment, such as cloud platforms, storage, data processing engines, and analytical tools that carry the risk of exploitation. Following the above security best practices, adhering to compliance, and utilizing the maximum analytical benefits of cloud data lakes can help you manage and protect data effectively. Vinayak S Senior Practice Manager, Cloud & Infra Security Vinayak S has over 13+ years of experience across various IT security service domains like Cloud Security, Infrastructure Security, and Cyber Security Practice. He is currently working as a Senior Practice Manager for Cloud and Infrastructure Security Service at Happiest Minds Technologies Ltd. Vinayak carries a niche experience across the BFSI, Health, and Global sectors. He is responsible for designing and implementing the security infrastructure for multiple customers, multiple technologies covering the Cloud and On-Prem in Compliance with all security specifications that are being followed as the best information security practice. For more details, write to us at Business@happiestminds.com www.happiestminds.com About the Author About Happiest Minds Technologies Happiest Minds Technologies Limited (NSE: HAPPSTMNDS), a Mindful IT Company, enables digital transformation for enterprises and technology providers by delivering seamless customer experiences, business efficiency and actionable insights. We do this by leveraging a spectrum of disruptive technologies such as: artificial intelligence, blockchain, cloud, digital process automation, internet of things, robotics / drones, security, virtual/augmented reality, etc. Positioned as ‘Born Digital. Born Agile’, our capabilities span digital solutions, infrastructure, product engineering and security. We deliver these services across industry sectors such as automotive, BFSI, consumer packaged goods, e-commerce, edutech, engineering R&D, hi-tech, manufacturing, retail and travel/transportation/hospitality. A Great Place to Work-Certified™ company, Happiest Minds is headquartered in Bangalore, India with operations in the U.S., UK, Canada, Australia and Middle East.