SlideShare a Scribd company logo
Securely explore your data
Sqrrl Visibility Labels
and
Pluggable Authorization Systems:
A Love Story
John Vines
Engineer
Sqrrl Data, Inc.
john@sqrrl.com
WHAT MAKES
ACCUMULO SPECIAL
WHEN IT COMES TO
SECURITY?
© 2014 Sqrrl | All Rights Reserved
CELL-LEVEL SECURITY
© 2014 Sqrrl | All Rights Reserved
CELL-LEVEL SECURITY
© 2014 Sqrrl | All Rights Reserved
© 2014 Sqrrl | All Rights Reserved
tldr;
visibilities are like ACLs
CELL-LEVEL SECURITY
© 2014 Sqrrl | All Rights Reserved
tldr;
visibilities are like ACLs
...sort of
CELL-LEVEL SECURITY
SQRRL
© 2014 Sqrrl | All Rights Reserved
What does this mean with sqrrl?
SQRRL
© 2014 Sqrrl | All Rights Reserved
What does this mean with sqrrl?
Sqrrl uses these labels within
hierarchical documents for the same
effect
SQRRL JSON
© 2014 Sqrrl | All Rights Reserved
{"children@[FAM|IRS]":
{"current": [{ "name": "Johnny" }],
"expecting@[FAM]": [{ "name": "Baby Girl"}]
}
}
Only the family and IRS care about
children.
Only the family cares about expecting
THAT’S GREAT!
© 2014 Sqrrl | All Rights Reserved
What does it get me?
THAT’S GREAT!
© 2014 Sqrrl | All Rights Reserved
What does it get me?
Amalgamating data sources that are
segregated
THE SCENARIO:
© 2014 Sqrrl | All Rights Reserved
I am a first time Sqrrl/Accumulo user
I want to use its nifty features
I have no idea what I’m doing
FIRST TRY
© 2014 Sqrrl | All Rights Reserved
Scan without JohnsLabel
FIRST TRY
© 2014 Sqrrl | All Rights Reserved
Scan without JohnsLabel
*sad trombone*
Scan with JohnsLabel
FIRST TRY
© 2014 Sqrrl | All Rights Reserved
Scan without JohnsLabel
*sad trombone*
Scan with JohnsLabel
uuid1 {"field1@[JohnsLabel]": "Value”}
uuid2 {"field1@[JohnsLabel]": "Value”}
uuid3 {"field2@[JohnsLabel]": "Value”}
uuid4 {"field2@[JohnsLabel]": "Value”}
uuid5 {"field1@[JohnsLabel]": "Value”}
SECOND TRY
© 2014 Sqrrl | All Rights Reserved
uuid1 {"field1@[JohnsApplication]": "Value”}
uuid2 {"field1@[JohnsApplication]": "Value”}
uuid3 {"field2@[JohnsApplication]": "Value”}
uuid4 {"field2@[JohnsApplication]": "Value”}
uuid5 {"field1@[JohnsApplication]": "Value”}
SECOND TRY
© 2014 Sqrrl | All Rights Reserved
What does my label even mean?
uuid1 {"field1@[JohnsApplication]": "Value”}
uuid2 {"field1@[JohnsApplication]": "Value”}
uuid3 {"field2@[JohnsApplication]": "Value”}
uuid4 {"field2@[JohnsApplication]": "Value”}
uuid5 {"field1@[JohnsApplication]": "Value”}
THIRD TRY
© 2014 Sqrrl | All Rights Reserved
uuid1 {"field1@[application1|application2]": "Value”}
uuid2 {"field1@[application1]": "Value”}
uuid3 {"field2@[application1]": "Value”}
uuid4 {"field2@[application2]": "Value”}
uuid5 {"field1@[application3]": "Value”}
THIRD TRY
© 2014 Sqrrl | All Rights Reserved
What about application4?
application5? 6?
uuid1 {"field1@[application1|application2]": "Value”}
uuid2 {"field1@[application1]": "Value”}
uuid3 {"field2@[application1]": "Value”}
uuid4 {"field2@[application2]": "Value”}
uuid5 {"field1@[application3]": "Value”}
BACK TO THE DRAWING BOARD
© 2014 Sqrrl | All Rights Reserved
What am I trying to accomplish?
Why am I segregating my data?
FOURTH TRY
© 2014 Sqrrl | All Rights Reserved
uuid1 {"field1@[org1|org2]": "Value”}
uuid2 {"field1@[org1]": "Value”}
uuid3 {"field2@[org1]": "Value”}
uuid4 {"field2@[org2]": "Value”}
uuid5 {"field1@[org1&org2]": "Value”}
FOURTH TRY
© 2014 Sqrrl | All Rights Reserved
Organizations are big!
uuid1 {"field1@[org1|org2]": "Value”}
uuid2 {"field1@[org1]": "Value”}
uuid3 {"field2@[org1]": "Value”}
uuid4 {"field2@[org2]": "Value”}
uuid5 {"field1@[org1&org2]": "Value”}
FIFTH TRY
© 2014 Sqrrl | All Rights Reserved
What about if subOrgs change?
uuid1 {"field1@[subOrg1|subOrg2]": "Value”}
uuid2 {"field1@[subOrg1]": "Value”}
uuid3 {"field2@[subOrg1]": "Value”}
uuid4 {"field2@[subOrg2]": "Value”}
uuid5 {"field1@[subOrg1&subOrg2]": "Value”}
FIFTH TRY
© 2014 Sqrrl | All Rights Reserved
What about if subOrgs change?
Why do these orgs have permission?
uuid1 {"field1@[subOrg1|subOrg2]": "Value”}
uuid2 {"field1@[subOrg1]": "Value”}
uuid3 {"field2@[subOrg1]": "Value”}
uuid4 {"field2@[subOrg2]": "Value”}
uuid5 {"field1@[subOrg1&subOrg2]": "Value”}
SIXTH TRY
© 2014 Sqrrl | All Rights Reserved
Looks good!
uuid1 {"field1@[accountsReceivable|payroll]":
"Value”}
uuid2 {"field1@[accountsReceivable]": "Value”}
uuid3 {"field2@[accountsReceivable]": "Value”}
uuid4 {"field2@[payroll]": "Value”}
uuid5 {"field1@[accountsReceivable&payroll]":
"Value”}
SIXTH TRY
© 2014 Sqrrl | All Rights Reserved
Looks good!
But now I need to manage users!
uuid1 {"field1@[accountsReceivable|payroll]":
"Value”}
uuid2 {"field1@[accountsReceivable]": "Value”}
uuid3 {"field2@[accountsReceivable]": "Value”}
uuid4 {"field2@[payroll]": "Value”}
uuid5 {"field1@[accountsReceivable&payroll]":
"Value”}
PLUGGABLE SECURITY TO THE RESCUE
© 2014 Sqrrl | All Rights Reserved
PLUGGABLE SECURITY TO THE RESCUE
© 2014 Sqrrl | All Rights Reserved
okay… what is this?
PLUGGABLE SECURITY TO THE RESCUE
© 2014 Sqrrl | All Rights Reserved
tserver
scan
Pluggable
Authorizor
getAuths()
scan
PLUGGABLE SECURITY TO THE RESCUE
© 2014 Sqrrl | All Rights Reserved
tserver
scan
Pluggable
Authorizor
getAuths()
scan
What does this mean to Sqrrl?
POLICY ENGINE
© 2014 Sqrrl | All Rights Reserved
Sqrrl uses Apache Shiro to expose
configurable security
POLICY ENGINE
© 2014 Sqrrl | All Rights Reserved
Sqrrl uses Apache Shiro to expose
configurable security
Less work needed to use existing
security architecture
SEVENTH TRY
© 2014 Sqrrl | All Rights Reserved
LDAP’s role-based access says:
User1->HR
User2->InternalConflicts
User3->Payroll
User4->Taxes
SEVENTH TRY
© 2014 Sqrrl | All Rights Reserved
One less system to maintain!
LDAP’s role-based access says:
User1->HR
User2->InternalConflicts
User3->Payroll
User4->Taxes
SEVENTH TRY
© 2014 Sqrrl | All Rights Reserved
One less system to maintain!
But our orgs are hierarchical!
LDAP’s role-based access says:
User1->HR
User2->InternalConflicts
User3->Payroll
User4->Taxes
EIGHTH TRY
© 2014 Sqrrl | All Rights Reserved
Policy Engine Says:
InternalConflicts->InternalConflicts,HR
Payroll->Payroll,Finance
Taxes->Finance,AccountsReceivable
EIGHTH TRY
© 2014 Sqrrl | All Rights Reserved
But what if I don’t want a certain org to
get a piece of data?
Policy Engine Says:
InternalConflicts->InternalConflicts,HR
Payroll->Payroll,Finance
Taxes->Finance,AccountsReceivable
NINTH TRY
© 2014 Sqrrl | All Rights Reserved
uuid5 {"field1@[designer&!manager]": "Value”}
NINTH TRY
© 2014 Sqrrl | All Rights Reserved
Accumulo and Sqrrl do not support
NOTs
uuid5 {"field1@[designer&!manager]": "Value”}
© 2014 Sqrrl | All Rights Reserved
Visibility labels have been a core piece of
Accumulo for almost 6 years.
Last thing we want is people to inadvertently leak
data because of change in our security story
(adding NOTs)
Accumulo has always supported downgrading
authorizations and this behavior will break NOTs
WHY NO NOTS?
NINTH TRY
© 2014 Sqrrl | All Rights Reserved
Accumulo and Sqrrl do not support
NOTs
What are we trying to accomplish?
uuid5 {"field1@[designer&!manager]": "Value”}
TENTH TRY
© 2014 Sqrrl | All Rights Reserved
uuid5 {"field1@[designer&(worker&contractor)]":
"Value”}
TENTH TRY
© 2014 Sqrrl | All Rights Reserved
But I want others to know some part of
uuid5 field1!
uuid5 {"field1@[designer&(worker&contractor)]":
"Value”}
REMEMBER
© 2014 Sqrrl | All Rights Reserved
REMEMBER
© 2014 Sqrrl | All Rights Reserved
{"children@[FAM|IRS]":
{"current": [{ "name": "Johnny" }],
"expecting@[FAM]": [{ "name": "Baby Girl"}]
}
}
ELEVENTH TRY
© 2014 Sqrrl | All Rights Reserved
uuid5 {"field1@[designer&(worker&contractor)]":
"Value”}
uuid5 {"field1@[engineer&(worker&contractor)]":
"Value”}
ELEVENTH TRY
© 2014 Sqrrl | All Rights Reserved
But I still want the managers to know
that uuid5 field1 exists!
uuid5 {"field1@[designer&(worker&contractor)]":
"Value”}
uuid5 {"field1@[engineer&(worker&contractor)]":
"Value”}
TWELTH TRY
© 2014 Sqrrl | All Rights Reserved
uuid5 {"field1": "Value”}
uuid5 {"field1@[designer&(worker&contractor)]":
"Value”}
uuid5 {"field1@[engineer&(worker&contractor)]":
"Value”}
TWELTH TRY
© 2014 Sqrrl | All Rights Reserved
How can root look at everything?
uuid5 {"field1": "Value”}
uuid5 {"field1@[designer&(worker&contractor)]":
"Value”}
uuid5 {"field1@[engineer&(worker&contractor)]":
"Value”}
THIRTEENTH TRY
© 2014 Sqrrl | All Rights Reserved
uuid5 {"field1": "Value”}
uuid5 {"field1@[root|(designer&(worker&contractor))]":
"Value”}
uuid5 {"field1@[root|(engineer&(worker&contractor))]":
"Value”}
THIRTEENTH TRY
© 2014 Sqrrl | All Rights Reserved
I don’t like that...
uuid5 {"field1": "Value”}
uuid5 {"field1@[root|(designer&(worker&contractor))]":
"Value”}
uuid5 {"field1@[root|(engineer&(worker&contractor))]":
"Value”}
THIRTEENTH TRY 2
© 2014 Sqrrl | All Rights Reserved
Remember the policy engine!
LDAP knows all roles
root->all roles
THIRTEENTH TRY 2
© 2014 Sqrrl | All Rights Reserved
All of my bases are covered!
Except...
Remember the policy engine!
LDAP knows all roles
root->all roles
GETTING CRAFTY
© 2014 Sqrrl | All Rights Reserved
What if I want to:
●  Allow authorizations based on time
●  Allow authorizations based on location
●  Make data more available
●  Make data less available
BEING CRAFTY
© 2014 Sqrrl | All Rights Reserved
Remember the policy engine!
If you have the data available, you can use
it!
COARSE ACCESS CONTROLS
© 2014 Sqrrl | All Rights Reserved
Accumulo Tables have Read permissions
for coarse access.
These can be used to restrict access to an
entire table for a user.
This is also exposed through a pluggable
mechanism.
PLUGGABLE SECURITY TO THE RESCUE
© 2014 Sqrrl | All Rights Reserved
PLUGGABLE SECURITY TO THE RESCUE
© 2014 Sqrrl | All Rights Reserved
Looks familiar…
what is this?
PLUGGABLE SECURITY TO THE RESCUE
© 2014 Sqrrl | All Rights Reserved
tserver
scan
Pluggable PermissionHandler
hasTablePermission()
scan
DATA-CENTRIC SECURITY
© 2014 Sqrrl | All Rights Reserved
Sqrrl promotes Data-Centric Security.
Sqrrl encourages amalgamation of data for
improved analytics. Coarse access breaks
this.
RECAP
© 2014 Sqrrl | All Rights Reserved
●  Label for the data, not the users
●  Label with the highest granularity
possible
●  Let the policy engine do the rest of the
work
●  Need to rely on external services or
special processes for tracking labels
●  These can manage users authorizations
and general access
RECAP
© 2014 Sqrrl | All Rights Reserved
Cell level security boils down to two
separate components
●  Data labels
●  User granted labels
They are the two halves that establish cell
level security.
RECAP
© 2014 Sqrrl | All Rights Reserved
Cell level security boils down to two
separate components
●  Data labels
●  User granted labels
They are the two halves that establish cell
level security. Put the two together, and
magic happens.
© 2014 Sqrrl | All Rights Reserved
QUESTIONS?
@ohshazbot
john@sqrrl.com
SQRRL VISIBILITY LABELS AND PLUGGABLE
AUTHORIZATION:
A LOVE STORY

More Related Content

What's hot

Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache Accumulo
Sqrrl
 
What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
Sqrrl
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
Sqrrl
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Cloudera, Inc.
 
Apache Spot
Apache SpotApache Spot
Apache Spot
Austin Leahy
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Elasticsearch
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Saul Tannenbaum
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
Elasticsearch
 
Real time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemReal time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystem
Chris Huang
 
Text Analytics in Action - Finding the Killer Patent. February 2015 Webinar b...
Text Analytics in Action - Finding the Killer Patent. February 2015 Webinar b...Text Analytics in Action - Finding the Killer Patent. February 2015 Webinar b...
Text Analytics in Action - Finding the Killer Patent. February 2015 Webinar b...
kCura_Relativity
 
Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Scaling big-data-mining-infra2
Scaling big-data-mining-infra2
Chris Huang
 
Approaching real-time-hadoop
Approaching real-time-hadoopApproaching real-time-hadoop
Approaching real-time-hadoop
Chris Huang
 
Risk Management Framework Using Intel FPGA, Apache Spark, and Persistent RDDs...
Risk Management Framework Using Intel FPGA, Apache Spark, and Persistent RDDs...Risk Management Framework Using Intel FPGA, Apache Spark, and Persistent RDDs...
Risk Management Framework Using Intel FPGA, Apache Spark, and Persistent RDDs...
Databricks
 
BSidesLV -The SOC Counter ATT&CK
BSidesLV -The SOC Counter ATT&CKBSidesLV -The SOC Counter ATT&CK
BSidesLV -The SOC Counter ATT&CK
Mathieu Saulnier
 

What's hot (16)

Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache Accumulo
 
What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
 
Apache Spot
Apache SpotApache Spot
Apache Spot
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Real time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemReal time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystem
 
Text Analytics in Action - Finding the Killer Patent. February 2015 Webinar b...
Text Analytics in Action - Finding the Killer Patent. February 2015 Webinar b...Text Analytics in Action - Finding the Killer Patent. February 2015 Webinar b...
Text Analytics in Action - Finding the Killer Patent. February 2015 Webinar b...
 
Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Scaling big-data-mining-infra2
Scaling big-data-mining-infra2
 
Approaching real-time-hadoop
Approaching real-time-hadoopApproaching real-time-hadoop
Approaching real-time-hadoop
 
Risk Management Framework Using Intel FPGA, Apache Spark, and Persistent RDDs...
Risk Management Framework Using Intel FPGA, Apache Spark, and Persistent RDDs...Risk Management Framework Using Intel FPGA, Apache Spark, and Persistent RDDs...
Risk Management Framework Using Intel FPGA, Apache Spark, and Persistent RDDs...
 
BSidesLV -The SOC Counter ATT&CK
BSidesLV -The SOC Counter ATT&CKBSidesLV -The SOC Counter ATT&CK
BSidesLV -The SOC Counter ATT&CK
 

Viewers also liked

Accumulo14 15
Accumulo14 15Accumulo14 15
Accumulo14 15
Sqrrl
 
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big DataOct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Yahoo Developer Network
 
Introduction to Accumulo
Introduction to AccumuloIntroduction to Accumulo
Introduction to Accumulo
Mario Pastorelli
 
Introduction to RDF
Introduction to RDFIntroduction to RDF
Introduction to RDF
Narni Rajesh
 
Sqrrl and Accumulo
Sqrrl and AccumuloSqrrl and Accumulo
Sqrrl and Accumulo
John Dougherty
 
RDF and OWL
RDF and OWLRDF and OWL
RDF and OWL
Rachel Lovinger
 

Viewers also liked (6)

Accumulo14 15
Accumulo14 15Accumulo14 15
Accumulo14 15
 
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big DataOct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
 
Introduction to Accumulo
Introduction to AccumuloIntroduction to Accumulo
Introduction to Accumulo
 
Introduction to RDF
Introduction to RDFIntroduction to RDF
Introduction to RDF
 
Sqrrl and Accumulo
Sqrrl and AccumuloSqrrl and Accumulo
Sqrrl and Accumulo
 
RDF and OWL
RDF and OWLRDF and OWL
RDF and OWL
 

Similar to Sqrrl June Webinar: An Accumulo Love Story

Accumulo Summit 2014: Accumulo Visibility Labels and Pluggable Authorization ...
Accumulo Summit 2014: Accumulo Visibility Labels and Pluggable Authorization ...Accumulo Summit 2014: Accumulo Visibility Labels and Pluggable Authorization ...
Accumulo Summit 2014: Accumulo Visibility Labels and Pluggable Authorization ...
Accumulo Summit
 
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit
 
Oracle Management Cloud
Oracle Management CloudOracle Management Cloud
Oracle Management Cloud
Fabio Batista
 
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 DatabaseeProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
Marco Gralike
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl
 
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
Sqrrl
 
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
eProseed Oracle Open World 2016 debrief - Oracle Management CloudeProseed Oracle Open World 2016 debrief - Oracle Management Cloud
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
Marco Gralike
 
InfluxDB Enterprise Architectural Patterns | Craig Hobbs | InfluxData
InfluxDB Enterprise Architectural Patterns | Craig Hobbs | InfluxDataInfluxDB Enterprise Architectural Patterns | Craig Hobbs | InfluxData
InfluxDB Enterprise Architectural Patterns | Craig Hobbs | InfluxData
InfluxData
 
Managing Oracle Solaris Systems with Puppet
Managing Oracle Solaris Systems with PuppetManaging Oracle Solaris Systems with Puppet
Managing Oracle Solaris Systems with Puppet
glynnfoster
 
Real life-maf-2015
Real life-maf-2015Real life-maf-2015
Real life-maf-2015
Luc Bors
 
Real life-maf-2015-k scope-final
Real life-maf-2015-k scope-finalReal life-maf-2015-k scope-final
Real life-maf-2015-k scope-final
Luc Bors
 
IIMB presentation
IIMB presentationIIMB presentation
IIMB presentation
Aveekshith Bushan
 
Tweet4Beer (atualizada): Torneira de Chopp Controlada por Java, JavaFX, IoT ...
Tweet4Beer (atualizada): Torneira de Chopp Controlada por Java, JavaFX, IoT ...Tweet4Beer (atualizada): Torneira de Chopp Controlada por Java, JavaFX, IoT ...
Tweet4Beer (atualizada): Torneira de Chopp Controlada por Java, JavaFX, IoT ...
Marco Antonio Maciel
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
Sqrrl
 
5 must haves for MSPs webinar
5 must haves for MSPs webinar5 must haves for MSPs webinar
5 must haves for MSPs webinar
AccelOps, Inc.
 
Pentest: footprinting & scan
Pentest: footprinting & scanPentest: footprinting & scan
Pentest: footprinting & scan
JUNIOR SORO
 
Real Life MAF (2.2) Oracle Open World 2015
Real Life MAF (2.2) Oracle Open World 2015Real Life MAF (2.2) Oracle Open World 2015
Real Life MAF (2.2) Oracle Open World 2015
Luc Bors
 
Tweet for Beer - Beertap Powered by Java Goes IoT, Cloud, and JavaFX
Tweet for Beer - Beertap Powered by Java Goes IoT, Cloud, and JavaFXTweet for Beer - Beertap Powered by Java Goes IoT, Cloud, and JavaFX
Tweet for Beer - Beertap Powered by Java Goes IoT, Cloud, and JavaFX
Bruno Borges
 
2 Guide MySQL Cloud Service Provisioning.
2 Guide MySQL Cloud Service Provisioning.2 Guide MySQL Cloud Service Provisioning.
2 Guide MySQL Cloud Service Provisioning.
Virve Kettunen
 
A2 run vmware_workloads_on_public_cloud-without_any_change
A2 run vmware_workloads_on_public_cloud-without_any_changeA2 run vmware_workloads_on_public_cloud-without_any_change
A2 run vmware_workloads_on_public_cloud-without_any_change
Dr. Wilfred Lin (Ph.D.)
 

Similar to Sqrrl June Webinar: An Accumulo Love Story (20)

Accumulo Summit 2014: Accumulo Visibility Labels and Pluggable Authorization ...
Accumulo Summit 2014: Accumulo Visibility Labels and Pluggable Authorization ...Accumulo Summit 2014: Accumulo Visibility Labels and Pluggable Authorization ...
Accumulo Summit 2014: Accumulo Visibility Labels and Pluggable Authorization ...
 
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
 
Oracle Management Cloud
Oracle Management CloudOracle Management Cloud
Oracle Management Cloud
 
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 DatabaseeProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in Accumulo
 
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
 
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
eProseed Oracle Open World 2016 debrief - Oracle Management CloudeProseed Oracle Open World 2016 debrief - Oracle Management Cloud
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
 
InfluxDB Enterprise Architectural Patterns | Craig Hobbs | InfluxData
InfluxDB Enterprise Architectural Patterns | Craig Hobbs | InfluxDataInfluxDB Enterprise Architectural Patterns | Craig Hobbs | InfluxData
InfluxDB Enterprise Architectural Patterns | Craig Hobbs | InfluxData
 
Managing Oracle Solaris Systems with Puppet
Managing Oracle Solaris Systems with PuppetManaging Oracle Solaris Systems with Puppet
Managing Oracle Solaris Systems with Puppet
 
Real life-maf-2015
Real life-maf-2015Real life-maf-2015
Real life-maf-2015
 
Real life-maf-2015-k scope-final
Real life-maf-2015-k scope-finalReal life-maf-2015-k scope-final
Real life-maf-2015-k scope-final
 
IIMB presentation
IIMB presentationIIMB presentation
IIMB presentation
 
Tweet4Beer (atualizada): Torneira de Chopp Controlada por Java, JavaFX, IoT ...
Tweet4Beer (atualizada): Torneira de Chopp Controlada por Java, JavaFX, IoT ...Tweet4Beer (atualizada): Torneira de Chopp Controlada por Java, JavaFX, IoT ...
Tweet4Beer (atualizada): Torneira de Chopp Controlada por Java, JavaFX, IoT ...
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
5 must haves for MSPs webinar
5 must haves for MSPs webinar5 must haves for MSPs webinar
5 must haves for MSPs webinar
 
Pentest: footprinting & scan
Pentest: footprinting & scanPentest: footprinting & scan
Pentest: footprinting & scan
 
Real Life MAF (2.2) Oracle Open World 2015
Real Life MAF (2.2) Oracle Open World 2015Real Life MAF (2.2) Oracle Open World 2015
Real Life MAF (2.2) Oracle Open World 2015
 
Tweet for Beer - Beertap Powered by Java Goes IoT, Cloud, and JavaFX
Tweet for Beer - Beertap Powered by Java Goes IoT, Cloud, and JavaFXTweet for Beer - Beertap Powered by Java Goes IoT, Cloud, and JavaFX
Tweet for Beer - Beertap Powered by Java Goes IoT, Cloud, and JavaFX
 
2 Guide MySQL Cloud Service Provisioning.
2 Guide MySQL Cloud Service Provisioning.2 Guide MySQL Cloud Service Provisioning.
2 Guide MySQL Cloud Service Provisioning.
 
A2 run vmware_workloads_on_public_cloud-without_any_change
A2 run vmware_workloads_on_public_cloud-without_any_changeA2 run vmware_workloads_on_public_cloud-without_any_change
A2 run vmware_workloads_on_public_cloud-without_any_change
 

More from Sqrrl

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
Sqrrl
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
Sqrrl
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
Sqrrl
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
Sqrrl
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
Sqrrl
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
Sqrrl
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Sqrrl
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
Sqrrl
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
Sqrrl
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
Sqrrl
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value Store
Sqrrl
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with Pregel
Sqrrl
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
Sqrrl
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
Sqrrl
 
Sqrrl October Webinar: Data Modeling and Indexing
Sqrrl October Webinar: Data Modeling and IndexingSqrrl October Webinar: Data Modeling and Indexing
Sqrrl October Webinar: Data Modeling and Indexing
Sqrrl
 

More from Sqrrl (18)

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value Store
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with Pregel
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
Sqrrl October Webinar: Data Modeling and Indexing
Sqrrl October Webinar: Data Modeling and IndexingSqrrl October Webinar: Data Modeling and Indexing
Sqrrl October Webinar: Data Modeling and Indexing
 

Recently uploaded

原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
74nqk8xf
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 

Recently uploaded (20)

原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 

Sqrrl June Webinar: An Accumulo Love Story

  • 1. Securely explore your data Sqrrl Visibility Labels and Pluggable Authorization Systems: A Love Story John Vines Engineer Sqrrl Data, Inc. john@sqrrl.com
  • 2. WHAT MAKES ACCUMULO SPECIAL WHEN IT COMES TO SECURITY? © 2014 Sqrrl | All Rights Reserved
  • 3. CELL-LEVEL SECURITY © 2014 Sqrrl | All Rights Reserved
  • 4. CELL-LEVEL SECURITY © 2014 Sqrrl | All Rights Reserved
  • 5. © 2014 Sqrrl | All Rights Reserved tldr; visibilities are like ACLs CELL-LEVEL SECURITY
  • 6. © 2014 Sqrrl | All Rights Reserved tldr; visibilities are like ACLs ...sort of CELL-LEVEL SECURITY
  • 7. SQRRL © 2014 Sqrrl | All Rights Reserved What does this mean with sqrrl?
  • 8. SQRRL © 2014 Sqrrl | All Rights Reserved What does this mean with sqrrl? Sqrrl uses these labels within hierarchical documents for the same effect
  • 9. SQRRL JSON © 2014 Sqrrl | All Rights Reserved {"children@[FAM|IRS]": {"current": [{ "name": "Johnny" }], "expecting@[FAM]": [{ "name": "Baby Girl"}] } } Only the family and IRS care about children. Only the family cares about expecting
  • 10. THAT’S GREAT! © 2014 Sqrrl | All Rights Reserved What does it get me?
  • 11. THAT’S GREAT! © 2014 Sqrrl | All Rights Reserved What does it get me? Amalgamating data sources that are segregated
  • 12. THE SCENARIO: © 2014 Sqrrl | All Rights Reserved I am a first time Sqrrl/Accumulo user I want to use its nifty features I have no idea what I’m doing
  • 13. FIRST TRY © 2014 Sqrrl | All Rights Reserved Scan without JohnsLabel
  • 14. FIRST TRY © 2014 Sqrrl | All Rights Reserved Scan without JohnsLabel *sad trombone* Scan with JohnsLabel
  • 15. FIRST TRY © 2014 Sqrrl | All Rights Reserved Scan without JohnsLabel *sad trombone* Scan with JohnsLabel uuid1 {"field1@[JohnsLabel]": "Value”} uuid2 {"field1@[JohnsLabel]": "Value”} uuid3 {"field2@[JohnsLabel]": "Value”} uuid4 {"field2@[JohnsLabel]": "Value”} uuid5 {"field1@[JohnsLabel]": "Value”}
  • 16. SECOND TRY © 2014 Sqrrl | All Rights Reserved uuid1 {"field1@[JohnsApplication]": "Value”} uuid2 {"field1@[JohnsApplication]": "Value”} uuid3 {"field2@[JohnsApplication]": "Value”} uuid4 {"field2@[JohnsApplication]": "Value”} uuid5 {"field1@[JohnsApplication]": "Value”}
  • 17. SECOND TRY © 2014 Sqrrl | All Rights Reserved What does my label even mean? uuid1 {"field1@[JohnsApplication]": "Value”} uuid2 {"field1@[JohnsApplication]": "Value”} uuid3 {"field2@[JohnsApplication]": "Value”} uuid4 {"field2@[JohnsApplication]": "Value”} uuid5 {"field1@[JohnsApplication]": "Value”}
  • 18. THIRD TRY © 2014 Sqrrl | All Rights Reserved uuid1 {"field1@[application1|application2]": "Value”} uuid2 {"field1@[application1]": "Value”} uuid3 {"field2@[application1]": "Value”} uuid4 {"field2@[application2]": "Value”} uuid5 {"field1@[application3]": "Value”}
  • 19. THIRD TRY © 2014 Sqrrl | All Rights Reserved What about application4? application5? 6? uuid1 {"field1@[application1|application2]": "Value”} uuid2 {"field1@[application1]": "Value”} uuid3 {"field2@[application1]": "Value”} uuid4 {"field2@[application2]": "Value”} uuid5 {"field1@[application3]": "Value”}
  • 20. BACK TO THE DRAWING BOARD © 2014 Sqrrl | All Rights Reserved What am I trying to accomplish? Why am I segregating my data?
  • 21. FOURTH TRY © 2014 Sqrrl | All Rights Reserved uuid1 {"field1@[org1|org2]": "Value”} uuid2 {"field1@[org1]": "Value”} uuid3 {"field2@[org1]": "Value”} uuid4 {"field2@[org2]": "Value”} uuid5 {"field1@[org1&org2]": "Value”}
  • 22. FOURTH TRY © 2014 Sqrrl | All Rights Reserved Organizations are big! uuid1 {"field1@[org1|org2]": "Value”} uuid2 {"field1@[org1]": "Value”} uuid3 {"field2@[org1]": "Value”} uuid4 {"field2@[org2]": "Value”} uuid5 {"field1@[org1&org2]": "Value”}
  • 23. FIFTH TRY © 2014 Sqrrl | All Rights Reserved What about if subOrgs change? uuid1 {"field1@[subOrg1|subOrg2]": "Value”} uuid2 {"field1@[subOrg1]": "Value”} uuid3 {"field2@[subOrg1]": "Value”} uuid4 {"field2@[subOrg2]": "Value”} uuid5 {"field1@[subOrg1&subOrg2]": "Value”}
  • 24. FIFTH TRY © 2014 Sqrrl | All Rights Reserved What about if subOrgs change? Why do these orgs have permission? uuid1 {"field1@[subOrg1|subOrg2]": "Value”} uuid2 {"field1@[subOrg1]": "Value”} uuid3 {"field2@[subOrg1]": "Value”} uuid4 {"field2@[subOrg2]": "Value”} uuid5 {"field1@[subOrg1&subOrg2]": "Value”}
  • 25. SIXTH TRY © 2014 Sqrrl | All Rights Reserved Looks good! uuid1 {"field1@[accountsReceivable|payroll]": "Value”} uuid2 {"field1@[accountsReceivable]": "Value”} uuid3 {"field2@[accountsReceivable]": "Value”} uuid4 {"field2@[payroll]": "Value”} uuid5 {"field1@[accountsReceivable&payroll]": "Value”}
  • 26. SIXTH TRY © 2014 Sqrrl | All Rights Reserved Looks good! But now I need to manage users! uuid1 {"field1@[accountsReceivable|payroll]": "Value”} uuid2 {"field1@[accountsReceivable]": "Value”} uuid3 {"field2@[accountsReceivable]": "Value”} uuid4 {"field2@[payroll]": "Value”} uuid5 {"field1@[accountsReceivable&payroll]": "Value”}
  • 27. PLUGGABLE SECURITY TO THE RESCUE © 2014 Sqrrl | All Rights Reserved
  • 28. PLUGGABLE SECURITY TO THE RESCUE © 2014 Sqrrl | All Rights Reserved okay… what is this?
  • 29. PLUGGABLE SECURITY TO THE RESCUE © 2014 Sqrrl | All Rights Reserved tserver scan Pluggable Authorizor getAuths() scan
  • 30. PLUGGABLE SECURITY TO THE RESCUE © 2014 Sqrrl | All Rights Reserved tserver scan Pluggable Authorizor getAuths() scan What does this mean to Sqrrl?
  • 31. POLICY ENGINE © 2014 Sqrrl | All Rights Reserved Sqrrl uses Apache Shiro to expose configurable security
  • 32. POLICY ENGINE © 2014 Sqrrl | All Rights Reserved Sqrrl uses Apache Shiro to expose configurable security Less work needed to use existing security architecture
  • 33. SEVENTH TRY © 2014 Sqrrl | All Rights Reserved LDAP’s role-based access says: User1->HR User2->InternalConflicts User3->Payroll User4->Taxes
  • 34. SEVENTH TRY © 2014 Sqrrl | All Rights Reserved One less system to maintain! LDAP’s role-based access says: User1->HR User2->InternalConflicts User3->Payroll User4->Taxes
  • 35. SEVENTH TRY © 2014 Sqrrl | All Rights Reserved One less system to maintain! But our orgs are hierarchical! LDAP’s role-based access says: User1->HR User2->InternalConflicts User3->Payroll User4->Taxes
  • 36. EIGHTH TRY © 2014 Sqrrl | All Rights Reserved Policy Engine Says: InternalConflicts->InternalConflicts,HR Payroll->Payroll,Finance Taxes->Finance,AccountsReceivable
  • 37. EIGHTH TRY © 2014 Sqrrl | All Rights Reserved But what if I don’t want a certain org to get a piece of data? Policy Engine Says: InternalConflicts->InternalConflicts,HR Payroll->Payroll,Finance Taxes->Finance,AccountsReceivable
  • 38. NINTH TRY © 2014 Sqrrl | All Rights Reserved uuid5 {"field1@[designer&!manager]": "Value”}
  • 39. NINTH TRY © 2014 Sqrrl | All Rights Reserved Accumulo and Sqrrl do not support NOTs uuid5 {"field1@[designer&!manager]": "Value”}
  • 40. © 2014 Sqrrl | All Rights Reserved Visibility labels have been a core piece of Accumulo for almost 6 years. Last thing we want is people to inadvertently leak data because of change in our security story (adding NOTs) Accumulo has always supported downgrading authorizations and this behavior will break NOTs WHY NO NOTS?
  • 41. NINTH TRY © 2014 Sqrrl | All Rights Reserved Accumulo and Sqrrl do not support NOTs What are we trying to accomplish? uuid5 {"field1@[designer&!manager]": "Value”}
  • 42. TENTH TRY © 2014 Sqrrl | All Rights Reserved uuid5 {"field1@[designer&(worker&contractor)]": "Value”}
  • 43. TENTH TRY © 2014 Sqrrl | All Rights Reserved But I want others to know some part of uuid5 field1! uuid5 {"field1@[designer&(worker&contractor)]": "Value”}
  • 44. REMEMBER © 2014 Sqrrl | All Rights Reserved
  • 45. REMEMBER © 2014 Sqrrl | All Rights Reserved {"children@[FAM|IRS]": {"current": [{ "name": "Johnny" }], "expecting@[FAM]": [{ "name": "Baby Girl"}] } }
  • 46. ELEVENTH TRY © 2014 Sqrrl | All Rights Reserved uuid5 {"field1@[designer&(worker&contractor)]": "Value”} uuid5 {"field1@[engineer&(worker&contractor)]": "Value”}
  • 47. ELEVENTH TRY © 2014 Sqrrl | All Rights Reserved But I still want the managers to know that uuid5 field1 exists! uuid5 {"field1@[designer&(worker&contractor)]": "Value”} uuid5 {"field1@[engineer&(worker&contractor)]": "Value”}
  • 48. TWELTH TRY © 2014 Sqrrl | All Rights Reserved uuid5 {"field1": "Value”} uuid5 {"field1@[designer&(worker&contractor)]": "Value”} uuid5 {"field1@[engineer&(worker&contractor)]": "Value”}
  • 49. TWELTH TRY © 2014 Sqrrl | All Rights Reserved How can root look at everything? uuid5 {"field1": "Value”} uuid5 {"field1@[designer&(worker&contractor)]": "Value”} uuid5 {"field1@[engineer&(worker&contractor)]": "Value”}
  • 50. THIRTEENTH TRY © 2014 Sqrrl | All Rights Reserved uuid5 {"field1": "Value”} uuid5 {"field1@[root|(designer&(worker&contractor))]": "Value”} uuid5 {"field1@[root|(engineer&(worker&contractor))]": "Value”}
  • 51. THIRTEENTH TRY © 2014 Sqrrl | All Rights Reserved I don’t like that... uuid5 {"field1": "Value”} uuid5 {"field1@[root|(designer&(worker&contractor))]": "Value”} uuid5 {"field1@[root|(engineer&(worker&contractor))]": "Value”}
  • 52. THIRTEENTH TRY 2 © 2014 Sqrrl | All Rights Reserved Remember the policy engine! LDAP knows all roles root->all roles
  • 53. THIRTEENTH TRY 2 © 2014 Sqrrl | All Rights Reserved All of my bases are covered! Except... Remember the policy engine! LDAP knows all roles root->all roles
  • 54. GETTING CRAFTY © 2014 Sqrrl | All Rights Reserved What if I want to: ●  Allow authorizations based on time ●  Allow authorizations based on location ●  Make data more available ●  Make data less available
  • 55. BEING CRAFTY © 2014 Sqrrl | All Rights Reserved Remember the policy engine! If you have the data available, you can use it!
  • 56. COARSE ACCESS CONTROLS © 2014 Sqrrl | All Rights Reserved Accumulo Tables have Read permissions for coarse access. These can be used to restrict access to an entire table for a user. This is also exposed through a pluggable mechanism.
  • 57. PLUGGABLE SECURITY TO THE RESCUE © 2014 Sqrrl | All Rights Reserved
  • 58. PLUGGABLE SECURITY TO THE RESCUE © 2014 Sqrrl | All Rights Reserved Looks familiar… what is this?
  • 59. PLUGGABLE SECURITY TO THE RESCUE © 2014 Sqrrl | All Rights Reserved tserver scan Pluggable PermissionHandler hasTablePermission() scan
  • 60. DATA-CENTRIC SECURITY © 2014 Sqrrl | All Rights Reserved Sqrrl promotes Data-Centric Security. Sqrrl encourages amalgamation of data for improved analytics. Coarse access breaks this.
  • 61. RECAP © 2014 Sqrrl | All Rights Reserved ●  Label for the data, not the users ●  Label with the highest granularity possible ●  Let the policy engine do the rest of the work ●  Need to rely on external services or special processes for tracking labels ●  These can manage users authorizations and general access
  • 62. RECAP © 2014 Sqrrl | All Rights Reserved Cell level security boils down to two separate components ●  Data labels ●  User granted labels They are the two halves that establish cell level security.
  • 63. RECAP © 2014 Sqrrl | All Rights Reserved Cell level security boils down to two separate components ●  Data labels ●  User granted labels They are the two halves that establish cell level security. Put the two together, and magic happens.
  • 64. © 2014 Sqrrl | All Rights Reserved QUESTIONS? @ohshazbot john@sqrrl.com SQRRL VISIBILITY LABELS AND PLUGGABLE AUTHORIZATION: A LOVE STORY