advertisement

Is Your Hadoop Environment Secure?

67 %
33 %
advertisement
Information about Is Your Hadoop Environment Secure?
Technology

Published on February 20, 2014

Author: Datameer

Source: slideshare.net

Description

How do you protect the data in big data analytics projects?

As big data initiatives focus on volume, velocity or variety of data, often overlooked in the big data project is the security of the data. This is especially important for financial services, healthcare and government or anytime sensitive data is analyzed.

This webinar highlights:

*Hadoop security landscape
*Hadoop encryption, masking, and access control
*Customer examples of securing hadoop environments
advertisement

Building Secure Hadoop Environments © 2012 Datameer, Inc. All rights reserved. © 2012 Datameer, Inc. All rights reserved.

View the full recording You can view the full recording of this ondemand webinar with slides at: http://info.datameer.com/Slideshare-BuildingSecure-Hadoop-Environments.html © 2012 Datameer, Inc. All rights reserved.

About our Speaker Karen Hsu With over 15 years of experience in enterprise software, Karen Hsu has coauthored 4 patents and worked in a variety of engineering, marketing and sales roles. Most recently she came from Informatica where she worked with the start-ups Informatica purchased to bring data quality, master data management, B2B and data security solutions to market. Karen has a Bachelors of Science degree in Management Science and Engineering from Stanford University. © 2012 Datameer, Inc. All rights reserved.

About our Speaker Filip Slunecko Filip is part of the Customer support team at Datameer. He is a Linux professional and Python enthusiast. Before joining Datameer, he was on the Hadoop team at AVG, an antivirus/security company. Filip now uses his 8 years experience with Linux servers and Hadoop security to help Datameer customers. © 2012 Datameer, Inc. All rights reserved.

Building Secure Hadoop Environments © 2012 Datameer, Inc. All rights reserved. © 2012 Datameer, Inc. All rights reserved.

Agenda Challenges and use cases Hadoop security landscape Components for building successful Hadoop environments Call to Action © 2012 Datameer, Inc. All rights reserved.

Hadoop Data Security Challenges Architectural issues Hadoop security is developing Vendors offer bolt-on solutions To add security capabilities into a big data environment, the capabilities need to scale with the data… Most security tools fail to scale and perform with big data environments. - Adrian Lane, Securosis Securosis, Oct 12, 2012 © 2012 Datameer, Inc. All rights reserved.

Hadoop Security Use Cases Use Case Requirement Example Description Role based access Data access is restricted through the abstraction layer Users have a view of data in Hadoop they can manipulate Transformation of sensitive values during load Data is transformed, masked, or encrypted. Cluster is copied and then masked/transformed so that analysts work on anonymized data © 2012 Datameer, Inc. All rights reserved.

Role Based Access Data Access Pig / Hive Map-Reduce Restrict View HDFS © 2012 Datameer, Inc. All rights reserved.

Transformation of Sensitive Values Data Access Load Map-Reduce Transform Data HDFS © 2012 Datameer, Inc. All rights reserved.

Hybrid of Role Based Access and Transformation of Sensitive Values Data Access Load Map-Reduce Transform Restrict View HDFS © 2012 Datameer, Inc. All rights reserved.

Hadoop Security Offerings Type Description Example vendors Role based access control Use LDAP / Active Directory (AD) authentication to identify and manage users. Leveraging Kerberos to provide mutual authentication Encryption • • • Masking Data Masking performed before load Block level encryption Linux directory level encryption with external key store File encryption Disk encryption Format preserving encryption © 2012 Datameer, Inc. All rights reserved.

Components for Building Secure Hadoop Environment Secure access – SSL Access controls Secure authentication Kerberos Logging – auditing File Encryption Disk encryption © 2012 Datameer, Inc. All rights reserved.

Secure access © 2012 Datameer, Inc. All rights reserved.

Access Controls Datameer Example Object permission Roles LDAP Kerberos Impersonation © 2012 Datameer, Inc. All rights reserved.

Object Permission Datameer Example Object types Import jobs Data links Workbooks Export job Info graphics © 2012 Datameer, Inc. All rights reserved.

Roles Datameer Example © 2012 Datameer, Inc. All rights reserved.

Remote Authenticator Datameer Example Integrating into an existing infrastructure Active directory support Import groups and users to Datameer Centralized user management © 2012 Datameer, Inc. All rights reserved.

Kerberos © 2012 Datameer, Inc. All rights reserved.

Impersonation © 2012 Datameer, Inc. All rights reserved.

Demonstration © 2012 Datameer, Inc. All rights reserved.

Disk Encryption Why it’s important • 1 year - 2% • 2 year - 6-8% Criteria for success • Encryption per process • Key management • Safe and in full compliance with HIPAA, PCIDSS, FERPA © 2012 Datameer, Inc. All rights reserved.

File Encryption Emerging Technology Intel Hadoop Project Rhino • Encryption and key management. • A common authorization framework. • Token based authentication and single sign on. • Improve audit logging. © 2012 Datameer, Inc. All rights reserved.

Logging and Auditing Datameer UI Access Job execution Hadoop File access Job runs © 2012 Datameer, Inc. All rights reserved.

Logging and Auditing Centralized logging Collectors Storage Real Time Search Visualization Datameer Datameer* Katta Datameer Splunk Splunk Elasticsearch Splunk Flume Elasticsearch Solr Greylog Greylog Solr Graphite Hive © 2012 Datameer, Inc. All rights reserved.

Recap Challenges and use cases Hadoop security landscape Components for building successful Hadoop environments • Secure access – SSL • Access controls • Secure authentication • Kerberos • Logging – auditing • File Encryption • Disk encryption © 2012 Datameer, Inc. All rights reserved.

Call to Action Contact • Filip Slunecko fslunecko@datameer.com • Karen Hsu khsu@datameer.com Implementing Hadoop Security Workshop • Contact marketing@datameer.com for more details Meet us at Discover Big Data 8 City Workshop near you! http://info.datameer.com/Discove r-Big-Data-RoadShow.html www.datameer.com © 2012 Datameer, Inc. All rights reserved.

Online Resources   Try Datameer: www.datameer.com Follow us on Twitter @datameer © 2012 Datameer, Inc. All rights reserved.

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Create a secure Hadoop environment with IBM InfoSphere ...

Learn more about InfoSphere Guardium and how it can secure your Hadoop environment. ... Create a secure Hadoop environment by using IBM features ...
Read more

Simplify and Secure Your Hadoop Environment - YouTube

Do you need centralized control over who can access your Hadoop environments? Are you trying to avoid introducing new identity infrastructure ...
Read more

Simplify and Secure Your Hadoop Environment – with ...

Join this webinar to explore Hadoop security challenges and trends, learn how to simply the connection of your Hortonworks Data Platform to your existing A
Read more

Welcome to Apache™ Hadoop®!

The Apache Hadoop software library is a framework that allows for the distributed processing of large ... Operating secure DataNode without requiring root ...
Read more

Securing Hadoop: Security Recommendations for Hadoop ...

Securing Hadoop: Security Recommendations for ... database and application in any server environment. ... Getting Hadoop secure is a basic hurdle most IT ...
Read more

Security | Elasticsearch for Apache Hadoop [2.4] | Elastic

... the connector can run within a secure Hadoop environment talking to a ... as long as your Hadoop/Spark job is ... hadoop security ...
Read more

Securing Your Hadoop Environment - Platfora Labs

Securing Your Hadoop Environment. Overview ... The technique that we use to achieve this is “Secure user impersonation”: ...
Read more

Hadoop Cluster Setup - Apache Hadoop 2.7.2

Configuring Hadoop in Non-Secure Mode. Configuring Environment of Hadoop ... Hadoop Cluster Setup. ... a packaging system as appropriate for your ...
Read more