Enabling SOX Compliance on DataStax Enterprise

Size: px
Start display at page:

Download "Enabling SOX Compliance on DataStax Enterprise"

Transcription

1 Enabling SOX Compliance on DataStax Enterprise

2 Table of Contents Table of Contents... 2 Introduction... 3 SOX Compliance and Requirements... 3 Who Must Comply with SOX?... 3 SOX Goals and Objectives... 3 DataStax Enterprise and SOX... 3 Addressing SOX Compliance... 4 Conclusion... 7 About DataStax... 7

3 Introduction The Sarbanes-Oxley Act of 2002 (SOX) was established to regulate financial practices and prevent accounting fraud. All public companies issuing securities, organizations providing auditing services whether they are domestic or foreign, and public accounting firms must comply with Sarbanes- Oxley. SOX came into existence as a result of the corporate financial scandals involving Arthur Andersen, Enron, WorldCom and Global Crossing, which resulted in billions of dollars in corporate and investor losses. SOX s main purpose is to review legislative audit requirements, strengthen corporate governance and protect investors by improving the accuracy and reliability of financial disclosures (Section 302). It is administered by Security and Exchange Council (SEC) and all public companies are required to implement and report internal financial audit controls to the SEC for compliance. Each company's external auditors are also required to audit and report on the reliability of management s assessment of internal control (Section 404), in addition to the company s financial statements. SOX Compliance and Requirements The scope of SOX compliance is quite broad and encompasses a company s management of its quality and security. But the main focus is on protecting the integrity of data thereby enhancing both audit quality and investor confidence. Segregation of Duties (SOD) and its management is another key component that external auditors look at while validating an organization s financial results. Compliance to SOX also deals with what records need to be stored and for how long. The new SOX legislation has placed significant compliance and audit trail demands on IT and financial departments within organizations; auditing application transactions in a database is one of the key requirements. Any unauthorized changes to application data might directly impact financial reporting or cause fraudulent transactions. Any revisions or modifications to these systems must be fully documented, as to what was changed and why, by whom and when. This being the case, it is imperative for these systems to be audited through secure and reliable means and the audit trail records maintained, as required by these mandates. Noncompliance can lead to severe penalties, lawsuits and negative publicity for these companies. IT and financial departments have to either build on their own or rely on access control and auditing mechanisms provided by third party vendors to track and report changes to key data elements stored in the database. This white paper provides general guidelines on how DataStax Enterprise can help organizations comply with SOX using its robust security features, including access control and auditing capabilities. Who Must Comply with SOX? Public companies issuing securities, organizations providing auditing services whether they are domestic or foreign, and public accounting firms must comply with Sarbanes-Oxley. SOX Goals and Objectives Organizations and firms expect the underlying database to be highly secure and also provide capabilities to track user database activities with authentication, as part of SOX compliance requirement. DataStax Enterprise and SOX DataStax is the leading provider of enterprise NoSQL database software products and services based on Apache Cassandra. DataStax helps drive the open source development of Cassandra by delivering DataStax Enterprise (DSE), an enterpriseclass NoSQL platform comprised of three components: DataStax Enterprise Server- includes production-certified Apache Cassandra, an in-memory option, and the ability to run analytics (via Apache Spark and Hadoop) and perform enterprise search operations (via Apache Solr) on Cassandra data. DSE includes enterprise security features like transparent data encryption, data auditing, internal and external authentication, clientto-node encryption and node-to-node encryption through SSL. OpsCenter a visual, browser-based solution for managing and monitoring Cassandra and DataStax Enterprise server.

4 Production Support full 24 x 7 x 365 support from the big data experts at DataStax. Addressing SOX Compliance Identifying areas and priorities for IT and financial management frameworks is an essential part of the compliance process. The following activities help guide the compliance process: Assessment - Gather data usage information Set and Enforce Controls - Define usage patterns for data to prevent unauthorized actions Monitor and Measure - Capture and report on activity The above iterative process helps IT and financial departments satisfy compliance requirements of auditors while ensuring robust security with welldefined controls. Assessment Identifying assets and knowing where data resides in an organization is the first critical component of the assessment process. Doing so drives effective protection policies to ensure best practices on security. Set and Enforce Controls Auditors specifically evaluate user privileges to critical data. Ensuring proper SOD controls for these privileged users are essential to maintain the integrity of the data. A good rule of thumb is to enforce the least powerful privileges and grant users only the privileges they need to do their job. DataStax Enterprise offers internal authentication that restricts access to databases containing critical data to a business-need-to-know basis. In this way organizations can reduce the number of users that can result in SOD violations. Internal Authentication Internal authentication ensures only authorized users get access to the Cassandra database system via the use of login accounts and passwords. Internal authentication works for the following Cassandra client drivers when you provide a user name and password to connect to the database: Astyanax Cassandra-cli Cqlsh DataStax Java Driver and DataStax C# Driver Hector Pycassa Internal authentication stores user names and bcrypt-hashed passwords in Cassandra s system_auth.credentials table. CQL (the Cassandra Query Language) supports the following statements for setting up and removing user accounts: ALTER USER CREATE USER DROP USER LIST USERS Current Internal Authentication Limitations in DSE Dsetool and Hadoop utilities do not support internal authentication. Access to Solr documents, excluding cached and indexed data, can be limited to users who have been granted access permissions. Password authentication pertains to connecting Spark wiht Cassandra, not authenticating Spark components between each other, and authenticating changes to the Shark configuration. Hadoop data on CFS is not supported by internal authentication. OpsCenter 5.0 comes with built-in granular security with role based access controls. User roles can be configured to perform database operations in the cluster. External Authentication DataStax Enterprise also supports external authentication through Kerberos and LDAP mechanism for Cassandra, Search and Analytics data. LDAP/Active Directory is a standardized way of storing security credentials in a centralized repository for a company s applications. Kerberos is a computer network authentication protocol that allows nodes communicating over a non-secure network to prove their identity to one another securely using tickets. As mentioned earlier, only authorized users will have access to Cassandra database system using external validation. Both Kerberos and SSL libraries provide integrity protection for all transmitted data, an essential part of SOX compliance. A unique ID can also be assigned for users accessing critical data using LDAP s or Kerberos s single sign on capability.

5 Object Permission Management Object permission management delivers granularbased control over who can modify data with grant and revoke statements. In Cassandra, superuser accounts grant initial permissions, and subsequently a user may or may not have grant/revoke permissions for a Cassandra keyspace or a table. Object permission management is independent of authentication (works with Kerberos or Cassandra). Cassandra s CQL interface supports the following authorization statements: GRANT LIST PERMISSIONS REVOKE Internal and external authentication along with object permission management can enforce security policies in real time by blocking access to unauthorized users and prevent fraudulent activity. This ensures data protection and integrity. Monitor and Measure It is important to track and monitor the activity of users who have highly privileged access to critical databases. This is typically done by maintaining an audit log for all activities including data modification by these users accounts as required by SOX section 404. DataStax Enterprise can help in monitoring the activities of these high privileged users through its auditing capabilities as explained below. Effective measures should also be taken in the event of data loss or corruption, with ways either to prevent or recover from such an occurrence. Data Auditing in DSE DataStax Enterprise creates detailed audit trails of activities that occur in a Cassandra cluster. It offers flexibility in storing audit events in a file (log4j-based) or in a Cassandra table. It also enables the tracking of user activities on the database, from login events to the creation, deletion, and alteration of database objects. All privileges such as Grant or Revoke to the user or a role within a database can be audited. DataStax also supports audit logging of queries and prepared statements submitted to the DataStax Java Driver, which uses the CQL binary protocol. Auditing is configured through a text file in the file system. The audit logger logs information on the node set up for logging. To get the maximum information from data auditing, the user can turn on data auditing on every node. DSE also provides an option to disable logging for specific keyspaces. Available audit levels: All - turns on auditing for all actions OFF - no auditing FATAL - severe errors causing premature termination ERROR - other runtime errors or unexpected conditions WARN - use of deprecated APIs, poor use of API, near errors, and other undesirable or unexpected runtime situations DEBUG - detailed information on the flow through the system TRACE - more detailed than DEBUG INFO - highlight the progress of the application at a coarse-grained level Datastax does not recommend using TRACE or DEBUG in production due to verbosity and performance. All DML, DCL or DDL statements are logged in DataStax. Audit information is stored in either log files or Cassandra tables. This provides the capability to do in-depth analysis via the DataStax Enterprise platform using Hadoop and Solr. SETTING ADMIN ALL AUTH DML DDL DCL QUERY LOGGING Describe schema versions, cluster name, version, ring, and other admin events DDL, DML, queries, and errors Login events Insert, update, delete and other DML events Object and user create, alter, drop, and other DDL events Grant, revoke, create user, drop user, and list users events Queries Measure Taking appropriate measures and reporting activity during/after the event of data corruption or data loss scenarios is crucial as part of SOX. It is also important to monitor such events and resolve as necessary. Data corruption can happen due to programming error, hardware failure or bad memory. The user should monitor logs (output, system logs) for any errors during such scenarios. In addition, corruption can be fixed via DSE s nodetool repair process available in open source Cassandra or via the automated repair service available in DataStax Enterprise. The nodetool scrub process is also helpful in rebuilding SSTables during such scenarios.

6 Data loss can happen due to human error, power failure or natural disasters such as hurricanes, typhoons, or earthquakes, and the like. Proper measures can to be taken early on in order to prevent certain data loss scenarios as explained below. Choosing a Proper Replication Factor Cassandra protects against data loss by storing multiple redundant copies of the data across different machines in the cluster. DataStax recommends three replicas (RF=3) within a single data center (DC) and guarantees against data loss due to single machine failure once the data has been persisted to at least two machines. Using Tunable Consistency Tunable consistency can be configured to manage response time versus data accuracy (in and across data centers). LOCAL_QUORUM is recommended when Cassandra is deployed across multiple data centers to protect against single machine failure. This however, does allow for a small window of data loss when writes are propagated to one data center that has experienced a catastrophic failure soon after this operation, but has not yet been replicated to remote data centers. QUORUM can be utilized, but if two data centers were simultaneously lost (with DC=3, RF=3), there is a small window where the data is not yet replicated to another data center and those writes will be lost. To mitigate any data loss, DataStax recommends using a consistency level of EACH_QUORUM. By utilizing EACH_QUORUM the user is guaranteed against single, or even multiple catastrophic simultaneous data center losses. Using the Rack Aware Switch A rack-aware snitch ensures that replicas of each row exist in multiple server racks. This allows a rack to be lost due to fire, mechanical problems, or routine maintenance without impacting availability. Using Hinted Handoff Remaining Cassandra nodes in a cluster will store up to three hours of information (hints/writes) by default during events such as when a network link between data centers is severed or a node becomes unavailable. If after three hours the link has not been restored, then the node or data center is considered permanently lost and mutations intended for the node(s) will be dropped. If after three hours a link to a down node or data center is reestablished, then you must run the nodetool repair process on each node that was down or use the repair service available in DataStax Enterprise. Using Snapshots and Backup Database backup and restore are best practice approaches as part of database maintenance during the event of data loss. Cassandra delivers a mechanism to easily snapshot or backup the state of the database on each node or via visual and scheduled backups through OpsCenter (available as part of DataStax Enterprise). These snapshots provide a read-only mechanism through which the state of the database on each node can be restored in the event of a data loss. If data loss due to programmer error or corruption were to occur, only mutations not yet persisted to disk would be impacted. In addition, the content of a snapshot on each machine can be copied to external media. Database files (SSTables and commit log) can also be copied from each node to external media. OpsCenter 5.1 supports backing up of data to the cloud (Amazon S3). In the event of catastrophic data loss, the files (either snapshot, or SSTables and commitlog) can be restored onto the same database cluster. The restore can also be done to a specific data/time in the past using point in time restore capability. While Cassandra does provide multiple mechanisms to mitigate the possibility of data loss, the risk cannot be entirely eliminated. If all replicas were lost simultaneously, the missing data would need to be restored via backup. There would be a small delta of information that existed on the nodes and had not yet been replicated to the backup media. If this were to happen, data within that window would be irrecoverable. By default, the commitlog syncs to disk every 10 seconds (periodic mode), by default. A window for data loss can exist if all replicas were lost simultaneously before data written to the commit log was not flushed to disk. This issue can be mitigated by enabling batch mode (in order to guard against this possibility), but note that this mode will negatively affect the write performance. For these reasons it is recommended that a significant number of nodes be deployed to decrease the statistical likelihood that all replicas of a row are lost. Organizations complying with SOX should have a solid database strategy to guard against such data loss/data corruption scenarios as mentioned above. This can be achieved with proper configuration of the DSE cluster, along with the right replication and backup strategy. Also actively monitoring and logging events through auditing capabilities of DSE and reporting during any such events are critical components of the SOX compliance process.

7 Conclusion The Sarbanes-Oxley Act of 2002 mandates that organizations have security and audit controls to ensure data integrity. DataStax Enterprise (DSE) delivers robust security features for enterprises looking to protect and audit critical data as part of SOX compliance. Segregation of Duties (SOD) and Enforcement of Control policies through DSE s internal and external authentication along with object permission management and granular role based security, and also monitoring database activities by user s action via auditing capabilities, can help organizations to remain SOX compliant. For more information about Cassandra, DataStax Enterprise and OpsCenter, visit For downloads of DataStax Enterprise and OpsCenter which may be freely used for development evaluation purposes visit About DataStax DataStax provides a massively scalable enterprise NoSQL platform to run modern online applications for some of the world s most innovative and dataintensive enterprises. Powered by the open source Apache Cassandra database, DataStax delivers a fully distributed, continuously available platform that is faster to deploy and less expensive to maintain than other database platforms. DataStax has more than 500 customers in 38 countries including leaders such as Netflix, Rackspace, Pearson Education, and Constant Contact, and spans verticals including web, financial services, telecommunications, logistics, and government. Based in San Mateo, Calif., DataStax is backed by industry-leading investors including Lightspeed Venture Partners, Meritech Capital, and Crosslink Capital.

Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric

Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric Table of Contents Table of Contents... 2 Overview... 3 PIN Transaction Security Requirements... 3 Payment Application

More information

Highly available, scalable and secure data with Cassandra and DataStax Enterprise. GOTO Berlin 27 th February 2014

Highly available, scalable and secure data with Cassandra and DataStax Enterprise. GOTO Berlin 27 th February 2014 Highly available, scalable and secure data with Cassandra and DataStax Enterprise GOTO Berlin 27 th February 2014 About Us Steve van den Berg Johnny Miller Solutions Architect Regional Director Western

More information

The Modern Online Application for the Internet Economy: 5 Key Requirements that Ensure Success

The Modern Online Application for the Internet Economy: 5 Key Requirements that Ensure Success The Modern Online Application for the Internet Economy: 5 Key Requirements that Ensure Success 1 Table of Contents Abstract... 3 Introduction... 3 Requirement #1 Smarter Customer Interactions... 4 Requirement

More information

HDB++: HIGH AVAILABILITY WITH. l TANGO Meeting l 20 May 2015 l Reynald Bourtembourg

HDB++: HIGH AVAILABILITY WITH. l TANGO Meeting l 20 May 2015 l Reynald Bourtembourg HDB++: HIGH AVAILABILITY WITH Page 1 OVERVIEW What is Cassandra (C*)? Who is using C*? CQL C* architecture Request Coordination Consistency Monitoring tool HDB++ Page 2 OVERVIEW What is Cassandra (C*)?

More information

Simplifying Database Management with DataStax OpsCenter

Simplifying Database Management with DataStax OpsCenter Simplifying Database Management with DataStax OpsCenter Table of Contents Table of Contents... 2 Abstract... 3 Introduction... 3 DataStax OpsCenter... 3 How Does DataStax OpsCenter Work?... 3 The OpsCenter

More information

DataStax Enterprise Reference Architecture

DataStax Enterprise Reference Architecture DataStax Enterprise Reference Architecture DataStax Enterprise Reference Architecture 7.8.15 1 Table of Contents ABSTRACT... 3 INTRODUCTION... 3 DATASTAX ENTERPRISE... 3 ARCHITECTURE... 3 OPSCENTER: EASY-

More information

Introduction to Apache Cassandra

Introduction to Apache Cassandra Introduction to Apache Cassandra White Paper BY DATASTAX CORPORATION JULY 2013 1 Table of Contents Abstract 3 Introduction 3 Built by Necessity 3 The Architecture of Cassandra 4 Distributing and Replicating

More information

Don t Let Your Shoppers Drop; 5 Rules for Today s Ecommerce A guide for ecommerce teams comprised of line-of-business managers and IT managers

Don t Let Your Shoppers Drop; 5 Rules for Today s Ecommerce A guide for ecommerce teams comprised of line-of-business managers and IT managers Don t Let Your Shoppers Drop; 5 Rules for Today s Ecommerce A guide for ecommerce teams comprised of line-of-business managers and IT managers White Paper BY DATASTAX CORPORATION AUGUST 2013 Table of Contents

More information

Memeo C1 Secure File Transfer and Compliance

Memeo C1 Secure File Transfer and Compliance Overview and analysis of Memeo C1 and SSAE16 & SOX Compliance Requirements Memeo C1 Secure File Transfer and Compliance Comply360, Inc Contents Executive Summary... 2 Overview... 2 Scope of Evaluation...

More information

Introduction to Multi-Data Center Operations with Apache Cassandra and DataStax Enterprise

Introduction to Multi-Data Center Operations with Apache Cassandra and DataStax Enterprise Introduction to Multi-Data Center Operations with Apache Cassandra and DataStax Enterprise White Paper BY DATASTAX CORPORATION October 2013 1 Table of Contents Abstract 3 Introduction 3 The Growth in Multiple

More information

How Transactional Analytics is Changing the Future of Business A look at the options, use cases, and anti-patterns

How Transactional Analytics is Changing the Future of Business A look at the options, use cases, and anti-patterns How Transactional Analytics is Changing the Future of Business A look at the options, use cases, and anti-patterns Table of Contents Abstract... 3 Introduction... 3 Definition... 3 The Expanding Digitization

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Implementing Search in Web, Mobile, and IOT Applications An Overview of DataStax Enterprise Search

Implementing Search in Web, Mobile, and IOT Applications An Overview of DataStax Enterprise Search Implementing Search in Web, Mobile, and IOT Applications An Overview of DataStax Enterprise Search Table of Contents Introduction... 3 Why Search?... 3 General Search Requirements... 3 Traditional Deployment

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Introduction to Multi-Data Center Operations with Apache Cassandra, Hadoop, and Solr WHITE PAPER

Introduction to Multi-Data Center Operations with Apache Cassandra, Hadoop, and Solr WHITE PAPER Introduction to Multi-Data Center Operations with Apache Cassandra, Hadoop, and Solr WHITE PAPER By DataStax Corporation August 2012 Contents Introduction...3 The Growth in Multiple Data Centers...3 Why

More information

Comparing the Hadoop Distributed File System (HDFS) with the Cassandra File System (CFS)

Comparing the Hadoop Distributed File System (HDFS) with the Cassandra File System (CFS) Comparing the Hadoop Distributed File System (HDFS) with the Cassandra File System (CFS) White Paper BY DATASTAX CORPORATION August 2013 1 Table of Contents Abstract 3 Introduction 3 Overview of HDFS 4

More information

50238: Introduction to SQL Server 2008 Administration

50238: Introduction to SQL Server 2008 Administration 50238: Introduction to SQL Server 2008 Administration 5 days Course Description This five-day instructor-led course provides students with the knowledge and skills to administer SQL Server 2008. The course

More information

Security and Compliance in Big Data

Security and Compliance in Big Data Security and Compliance in Big Data White Paper BY DATASTAX CORPORATION AND GAZZANG, INC MAY 2013 Contents Executive Summary 3 A Brief Note About Compliance 3 HIPAA and HITECH Regulations 4 Payment Card

More information

Distributed Systems. Tutorial 12 Cassandra

Distributed Systems. Tutorial 12 Cassandra Distributed Systems Tutorial 12 Cassandra written by Alex Libov Based on FOSDEM 2010 presentation winter semester, 2013-2014 Cassandra In Greek mythology, Cassandra had the power of prophecy and the curse

More information

DataStax Enterprise Reference Architecture. White Paper

DataStax Enterprise Reference Architecture. White Paper DataStax Enterprise Reference Architecture White Paper BY DATASTAX CORPORATION January 2014 Table of Contents Abstract...3 Introduction...3 DataStax Enterprise Architecture...3 Management Interface...

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File

More information

HDFS Users Guide. Table of contents

HDFS Users Guide. Table of contents Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Big Data: Beyond the Hype. Why Big Data Matters to You. White Paper

Big Data: Beyond the Hype. Why Big Data Matters to You. White Paper Big Data: Beyond the Hype Why Big Data Matters to You White Paper BY DATASTAX CORPORATION October 2013 Table of Contents Abstract 3 Introduction 3 Big Data and You 5 Big Data Is More Prevalent Than You

More information

Simba Apache Cassandra ODBC Driver

Simba Apache Cassandra ODBC Driver Simba Apache Cassandra ODBC Driver with SQL Connector 2.2.0 Released 2015-11-13 These release notes provide details of enhancements, features, and known issues in Simba Apache Cassandra ODBC Driver with

More information

Cloudwick. CLOUDWICK LABS Big Data Research Paper. Nebula: Powering Enterprise Private & Hybrid Cloud for DataStax Big Data

Cloudwick. CLOUDWICK LABS Big Data Research Paper. Nebula: Powering Enterprise Private & Hybrid Cloud for DataStax Big Data Nebula: Powering Enterprise Private & Hybrid Cloud for DataStax Big Data was commissioned to evaluate and test the Nebula One Private and Hybrid Cloud Appliance using DataStax, a leading Apache Cassandra

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

How SUSE Manager Can Help You Achieve Regulatory Compliance

How SUSE Manager Can Help You Achieve Regulatory Compliance White Paper Server How SUSE Manager Can Help You Achieve Regulatory Compliance Table of Contents page Why You Need a Compliance Program... 2 Compliance Standards: SOX, HIPAA and PCI... 2 What IT Is Concerned

More information

How IT Can Aid Sarbanes Oxley Compliance

How IT Can Aid Sarbanes Oxley Compliance ZOHO Corp. How IT Can Aid Sarbanes Oxley Compliance Whitepaper Notice: This document represents the current view of ZOHO Corp. and makes no representations or warranties with respect to the contents as

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

Big Data Development CASSANDRA NoSQL Training - Workshop. March 13 to 17-2016 9 am to 5 pm HOTEL DUBAI GRAND DUBAI

Big Data Development CASSANDRA NoSQL Training - Workshop. March 13 to 17-2016 9 am to 5 pm HOTEL DUBAI GRAND DUBAI Big Data Development CASSANDRA NoSQL Training - Workshop March 13 to 17-2016 9 am to 5 pm HOTEL DUBAI GRAND DUBAI ISIDUS TECH TEAM FZE PO Box 121109 Dubai UAE, email training-coordinator@isidusnet M: +97150

More information

Circular to All Licensed Corporations on Information Technology Management

Circular to All Licensed Corporations on Information Technology Management Circular 16 March 2010 Circular to All Licensed Corporations on Information Technology Management In the course of our supervision, it has recently come to our attention that certain deficiencies in information

More information

Practical Cassandra. Vitalii Tymchyshyn tivv00@gmail.com @tivv00

Practical Cassandra. Vitalii Tymchyshyn tivv00@gmail.com @tivv00 Practical Cassandra NoSQL key-value vs RDBMS why and when Cassandra architecture Cassandra data model Life without joins or HDD space is cheap today Hardware requirements & deployment hints Vitalii Tymchyshyn

More information

Apache Cassandra 2.0

Apache Cassandra 2.0 Apache Cassandra 2.0 Documentation December 16, 2015 Apache, Apache Cassandra, Apache Hadoop, Hadoop and the eye logo are trademarks of the Apache Software Foundation 2015 DataStax, Inc. All rights reserved.

More information

THE REALITIES OF NOSQL BACKUPS

THE REALITIES OF NOSQL BACKUPS THE REALITIES OF NOSQL BACKUPS White Paper Trilio Data, Inc. March 2015 1 THE REALITIES OF NOSQL BACKUPS TABLE OF CONTENTS INTRODUCTION... 2 NOSQL DATABASES... 2 PROBLEM: LACK OF COMPREHENSIVE BACKUP AND

More information

Compliance and Industry Regulations

Compliance and Industry Regulations Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy

More information

Comparing the Hadoop Distributed File System (HDFS) with the Cassandra File System (CFS) WHITE PAPER

Comparing the Hadoop Distributed File System (HDFS) with the Cassandra File System (CFS) WHITE PAPER Comparing the Hadoop Distributed File System (HDFS) with the Cassandra File System (CFS) WHITE PAPER By DataStax Corporation September 2012 Contents Introduction... 3 Overview of HDFS... 4 The Benefits

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Big Data: Beyond the Hype

Big Data: Beyond the Hype Big Data: Beyond the Hype Why Big Data Matters to You WHITE PAPER Big Data: Beyond the Hype Why Big Data Matters to You By DataStax Corporation October 2011 Table of Contents Introduction...4 Big Data

More information

Big Data: Beyond the Hype

Big Data: Beyond the Hype Big Data: Beyond the Hype Why Big Data Matters to You WHITE PAPER By DataStax Corporation March 2012 Contents Introduction... 3 Big Data and You... 5 Big Data Is More Prevalent Than You Think... 5 Big

More information

UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE

UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE Introduction...2 SOX and COBIT: A Brief Review...2 The COBIT Structure...2 Structure of this Document...3 Planning & Organisation...3 Acquisition

More information

RPO represents the data differential between the source cluster and the replicas.

RPO represents the data differential between the source cluster and the replicas. Technical brief Introduction Disaster recovery (DR) is the science of returning a system to operating status after a site-wide disaster. DR enables business continuity for significant data center failures

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

INTRODUCTION TO CASSANDRA

INTRODUCTION TO CASSANDRA INTRODUCTION TO CASSANDRA This ebook provides a high level overview of Cassandra and describes some of its key strengths and applications. WHAT IS CASSANDRA? Apache Cassandra is a high performance, open

More information

www.basho.com Technical Overview Simple, Scalable, Object Storage Software

www.basho.com Technical Overview Simple, Scalable, Object Storage Software www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...

More information

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Apache Cassandra 1.2

Apache Cassandra 1.2 Apache Cassandra 1.2 Documentation January 21, 2016 Apache, Apache Cassandra, Apache Hadoop, Hadoop and the eye logo are trademarks of the Apache Software Foundation 2016 DataStax, Inc. All rights reserved.

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

CDH AND BUSINESS CONTINUITY:

CDH AND BUSINESS CONTINUITY: WHITE PAPER CDH AND BUSINESS CONTINUITY: An overview of the availability, data protection and disaster recovery features in Hadoop Abstract Using the sophisticated built-in capabilities of CDH for tunable

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

SQL Server 2008 Designing, Optimizing, and Maintaining a Database Session 1

SQL Server 2008 Designing, Optimizing, and Maintaining a Database Session 1 SQL Server 2008 Designing, Optimizing, and Maintaining a Database Course The SQL Server 2008 Designing, Optimizing, and Maintaining a Database course will help you prepare for 70-450 exam from Microsoft.

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/ Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system

More information

Explain how to prepare the hardware and other resources necessary to install SQL Server. Install SQL Server. Manage and configure SQL Server.

Explain how to prepare the hardware and other resources necessary to install SQL Server. Install SQL Server. Manage and configure SQL Server. Course 6231A: Maintaining a Microsoft SQL Server 2008 Database About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge

More information

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center. SparkWeave is storage agnostic, autonomously providing

More information

BDR TM V3.0 DEPLOYMENT AND FEATURES

BDR TM V3.0 DEPLOYMENT AND FEATURES BDR TM V3.0 DEPLOYMENT AND FEATURES VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results of

More information

Ensuring Compliance to Sarbanes-Oxley through Privileged Identity & Information Management. White Paper. V Balasubramanian. ZOHO Corp.

Ensuring Compliance to Sarbanes-Oxley through Privileged Identity & Information Management. White Paper. V Balasubramanian. ZOHO Corp. Ensuring Compliance to Sarbanes-Oxley through Privileged Identity & Information Management White Paper V Balasubramanian ZOHO Corp. Disclaimer: This document is not intended to be a complete guide or legal

More information

Dell Reference Configuration for DataStax Enterprise powered by Apache Cassandra

Dell Reference Configuration for DataStax Enterprise powered by Apache Cassandra Dell Reference Configuration for DataStax Enterprise powered by Apache Cassandra A Quick Reference Configuration Guide Kris Applegate kris_applegate@dell.com Solution Architect Dell Solution Centers Dave

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics

HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics ESSENTIALS EMC ISILON Use the industry's first and only scale-out NAS solution with native Hadoop

More information

DBA'S GUIDE TO NOSQL APACHE CASSANDRA

DBA'S GUIDE TO NOSQL APACHE CASSANDRA DBA'S GUIDE TO NOSQL APACHE CASSANDRA THE ENLIGHTENED DBA Smashwords Edition Copyright 2014 The Enlightened DBA This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Benchmarking Couchbase Server for Interactive Applications. By Alexey Diomin and Kirill Grigorchuk

Benchmarking Couchbase Server for Interactive Applications. By Alexey Diomin and Kirill Grigorchuk Benchmarking Couchbase Server for Interactive Applications By Alexey Diomin and Kirill Grigorchuk Contents 1. Introduction... 3 2. A brief overview of Cassandra, MongoDB, and Couchbase... 3 3. Key criteria

More information

Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc.

Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc. Database Auditing and Compliance in a Mainframe Environment Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc. Table of Contents Introduction................................................................................

More information

The Challenges and Myths of Sarbanes-Oxley Compliance

The Challenges and Myths of Sarbanes-Oxley Compliance W H I T E P A P E R The Challenges and Myths of Sarbanes-Oxley Compliance Meeting the requirements of regulatory legislation on the iseries. SOX-001 REV1b FEBRUARY 2005 Bytware, Inc. All Rights Reserved.

More information

Implementing HIPAA Compliance with ScriptLogic

Implementing HIPAA Compliance with ScriptLogic Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE

More information

White Paper. Sarbanes Oxley and iseries Security, Audit and Compliance

White Paper. Sarbanes Oxley and iseries Security, Audit and Compliance White Paper Sarbanes Oxley and iseries Security, Audit and Compliance This White Paper was written by AH Technology Distributors of isecurity a suite of iseries security products developed by Raz-Lee Security

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Maintaining a Microsoft SQL Server 2008 Database

Maintaining a Microsoft SQL Server 2008 Database Maintaining a Microsoft SQL Server 2008 Database Course 6231A: Five days; Instructor-Led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Ankush Cluster Manager - Cassandra Technology User Guide

Ankush Cluster Manager - Cassandra Technology User Guide Ankush Cluster Manager - Cassandra Technology User Guide Ankush User s Guide for Cassandra, Version 1.5 This manual, and the accompanying software and other documentation, is protected by U.S. and international

More information

So What s the Big Deal?

So What s the Big Deal? So What s the Big Deal? Presentation Agenda Introduction What is Big Data? So What is the Big Deal? Big Data Technologies Identifying Big Data Opportunities Conducting a Big Data Proof of Concept Big Data

More information

Securing Data in Oracle Database 12c

Securing Data in Oracle Database 12c Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

WHITEPAPER. A Technical Perspective on the Talena Data Availability Management Solution

WHITEPAPER. A Technical Perspective on the Talena Data Availability Management Solution WHITEPAPER A Technical Perspective on the Talena Data Availability Management Solution BIG DATA TECHNOLOGY LANDSCAPE Over the past decade, the emergence of social media, mobile, and cloud technologies

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

Database as a Service (DaaS) Version 1.02

Database as a Service (DaaS) Version 1.02 Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Addressing SOX compliance with XaitPorter. Version 1.0 Sept. 2014

Addressing SOX compliance with XaitPorter. Version 1.0 Sept. 2014 Addressing SOX compliance with XaitPorter Version 1.0 Sept. 2014 Table of Contents 1 Addressing Compliance... 1 2 SOX Compliance... 2 3 Key Benefits... 5 4 Contact Information... 6 1 Addressing Compliance

More information

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 K E Y P R O P E R T Y S T O R E U S E R G U I D E Axway API Gateway Version 7.4.1 26 January 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway

More information

Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com

Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com Agenda The rise of Big Data & Hadoop MySQL in the Big Data Lifecycle MySQL Solutions for Big Data Q&A

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Distributed File Systems

Distributed File Systems Distributed File Systems Mauro Fruet University of Trento - Italy 2011/12/19 Mauro Fruet (UniTN) Distributed File Systems 2011/12/19 1 / 39 Outline 1 Distributed File Systems 2 The Google File System (GFS)

More information

Rackspace Archiving Compliance Overview

Rackspace Archiving Compliance Overview Rackspace Archiving Compliance Overview Freedom Information Act Sunshine Laws The federal government and nearly all state governments have established Open Records laws. The purpose of these laws is to

More information

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation ADVANTAGES OF RUNNING ORACLE11G ON MICROSOFT WINDOWS SERVER X64 Edward Whalen, Performance Tuning Corporation INTRODUCTION Microsoft Windows has long been an ideal platform for the Oracle database server.

More information

Who Am I? Mark Cusack Chief Architect 9 years@rainstor Founding developer Ex UK Ministry of Defence Research InfoSec projects

Who Am I? Mark Cusack Chief Architect 9 years@rainstor Founding developer Ex UK Ministry of Defence Research InfoSec projects 1 Who Am I? Mark Cusack Chief Architect 9 years@rainstor Founding developer Ex UK Ministry of Defence Research InfoSec projects 2 RainStor: a SQL Database on Hadoop SCALE (MPP, Shared everything) LOAD

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

White paper. The Big Data Security Gap: Protecting the Hadoop Cluster

White paper. The Big Data Security Gap: Protecting the Hadoop Cluster The Big Data Security Gap: Protecting the Hadoop Cluster Introduction While the open source framework has enabled the footprint of Hadoop to logically expand, enterprise organizations face deployment and

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Building Success on Acquia Cloud:

Building Success on Acquia Cloud: Building Success on Acquia Cloud: 10 Layers of PaaS TECHNICAL Guide Table of Contents Executive Summary.... 3 Introducing the 10 Layers of PaaS... 4 The Foundation: Five Layers of PaaS Infrastructure...

More information

D50323GC20 Oracle Database 11g: Security Release 2

D50323GC20 Oracle Database 11g: Security Release 2 D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their

More information

Architectural patterns for building real time applications with Apache HBase. Andrew Purtell Committer and PMC, Apache HBase

Architectural patterns for building real time applications with Apache HBase. Andrew Purtell Committer and PMC, Apache HBase Architectural patterns for building real time applications with Apache HBase Andrew Purtell Committer and PMC, Apache HBase Who am I? Distributed systems engineer Principal Architect in the Big Data Platform

More information

HADOOP MOCK TEST HADOOP MOCK TEST I

HADOOP MOCK TEST HADOOP MOCK TEST I http://www.tutorialspoint.com HADOOP MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to Hadoop Framework. You can download these sample mock tests at

More information

Big Data Operations Guide for Cloudera Manager v5.x Hadoop

Big Data Operations Guide for Cloudera Manager v5.x Hadoop Big Data Operations Guide for Cloudera Manager v5.x Hadoop Logging into the Enterprise Cloudera Manager 1. On the server where you have installed 'Cloudera Manager', make sure that the server is running,

More information