Data-Centric Security Key to Cloud and Digital Business



Similar documents
Where Data Security and Value of Data Meet in the Cloud

Practical Advice for Cloud Data Protection

Data Security as a Business Enabler Not a Ball & Chain. Big Data Everywhere May 12, 2015

Data-Centric Security vs. Database-Level Security

Data-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security

Data Security as a Business Enabler Not a Ball & Chain. Big Data Everywhere May 21, 2015

Securing Data Today. Ulf Mattsson CTO Protegrity ulf.mattsson [at] protegrity.com

Cloud Data Security. Sol Cates

Bringing Big Data to People

White paper. The Big Data Security Gap: Protecting the Hadoop Cluster

HIPAA and HITECH Compliance Simplification. Sol Cates

Introduction to Big data. Why Big data? Case Studies. Introduction to Hadoop. Understanding Features of Hadoop. Hadoop Architecture.

Data Breaches Gone Mad. Straight Away! Wednesday September 28 th, 2011

Big Data Management and Security

Myths and Realities of Data Security and Compliance: Ulf Mattsson, CTO, Protegrity

Addressing Open Source Big Data, Hadoop, and MapReduce limitations

Hadoop Beyond Hype: Complex Adaptive Systems Conference Nov 16, Viswa Sharma Solutions Architect Tata Consultancy Services

Big Data Analytics Nokia

Teradata and Protegrity High-Value Protection for High-Value Data

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Oracle Database Security

The Future of Data Management

Compliance for the Road Ahead

Database Security Solutions in Cloud and Outsourced Environments

Chukwa, Hadoop subproject, 37, 131 Cloud enabled big data, 4 Codd s 12 rules, 1 Column-oriented databases, 18, 52 Compression pattern, 83 84

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

Collaborative Big Data Analytics. Copyright 2012 EMC Corporation. All rights reserved.

Building Scalable Big Data Pipelines

Data Security in Hadoop

Hadoop Ecosystem Overview. CMSC 491 Hadoop-Based Distributed Computing Spring 2015 Adam Shook

Infomatics. Big-Data and Hadoop Developer Training with Oracle WDP

Taking a Data-Centric Approach to Security in the Cloud

05.0 Application Development

Protegrity Data Security Platform

Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes

ITG Software Engineering

Securing the Big Data Ecosystem

Oracle Big Data Strategy Simplified Infrastrcuture

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Big Data: Overview and Roadmap eglobaltech. All rights reserved.

Securing and protecting the organization s most sensitive data

Market Guide for Data-Centric Audit and Protection

SOLVING REAL AND BIG (DATA) PROBLEMS USING HADOOP. Eva Andreasson Cloudera

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Securing Hadoop Data Big Data Everywhere - Atlanta January 27, 2015

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

SQL Server 2012 PDW. Ryan Simpson Technical Solution Professional PDW Microsoft. Microsoft SQL Server 2012 Parallel Data Warehouse

Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software. SC13, November, 2013

Encryption and Anonymization in Hadoop

Data Analyst Program- 0 to 100

HDP Hadoop From concept to deployment.

Don't outsource IT! Bring your own Cloud with SDN

Oracle Database 12c Plug In. Switch On. Get SMART.

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

BITKOM& NIK - Big Data Wo liegen die Chancen für den Mittelstand?

Mainframe Data Protection in an Age of Big Data, Mobile, and Cloud Computing

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

The Future of Data Management with Hadoop and the Enterprise Data Hub

Who Am I? Mark Cusack Chief Architect 9 years@rainstor Founding developer Ex UK Ministry of Defence Research InfoSec projects

Hadoop: Distributed Data Processing. Amr Awadallah Founder/CTO, Cloudera, Inc. ACM Data Mining SIG Thursday, January 25 th, 2010

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Big Data Analytics. with EMC Greenplum and Hadoop. Big Data Analytics. Ofir Manor Pre Sales Technical Architect EMC Greenplum

Managing Big Data with Hadoop & Vertica. A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database

How to Hadoop Without the Worry: Protecting Big Data at Scale

<Insert Picture Here> Oracle Database Security Overview

Big Data, Big Risk, Big Rewards. Hussein Syed

White Paper Big Data Without Big Headaches

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

RETHINKING CYBER SECURITY Changing the Business Conversation

Extending the Enterprise Data Warehouse with Hadoop Robert Lancaster. Nov 7, 2012

Implement Hadoop jobs to extract business value from large and varied data sets

I/O Considerations in Big Data Analytics

Datenverwaltung im Wandel - Building an Enterprise Data Hub with

Protecting Regulated Information in Cloud Storage with DLP

Big Data Big Data/Data Analytics & Software Development

PROTECTING ENTERPRISE DATA IN HADOOP

How Data-Centric Protection Increases Security in Cloud Computing and Virtualization

Lecture 10: HBase! Claudia Hauff (Web Information Systems)!

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

BIG DATA TRENDS AND TECHNOLOGIES

Forecast of Big Data Trends. Assoc. Prof. Dr. Thanachart Numnonda Executive Director IMC Institute 3 September 2014

Testing Big data is one of the biggest

Introduction to Hadoop. New York Oracle User Group Vikas Sawhney

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES

Chapter 1: Introduction

Transcription:

Data-Centric Security Key to Cloud and Digital Business Ulf Mattsson CTO, Protegrity Ulf.Mattsson AT protegrity.com

Ulf Mattsson, Protegrity CTO Cloud Security Alliance (CSA) PCI Security Standards Council IFIP Cloud & Virtualization SIGs Encryption Task Force Tokenization Task Force WG 11.3 Data and Application Security International Federation for Information Processing ANSI X9 ISSA & ISACA 2

Agenda Exponential growth of data generation New business models fueled by Big Data, cloud computing and the Internet of Things Creating cybercriminal's paradise Challenge in this interconnected world Merging data security with data value and productivity. Urgently need a data-centric strategy Protect the sensitive data flowing through digital business systems Solutions to bring together data insight & security Safely unlock the power of digital business 3

Are you ready for a big change revolution? Source: www.firstpost.com 4

A Changing Landscape 2018-2020 By 2018, digital business will require 50% fewer business process workers and 500% more key digital business jobs, compared with traditional models By 2018, the total cost of ownership for business operations will be reduced by 30% through smart machines and industrialized services By 2020, developed world life expectancy will increase by a half-year due to the widespread adoption of wireless health monitoring technology Source: Gartner Top 10 Strategic Predictions for 2015 and Beyond: Digital Business Is Driving 'Big Change, Oct 2014 5

6 Self Driving Cars: Are We at the Cusp of a Revolutionary Change?

Micro-robots, the size of a grain of rice Source: www.ted.com/talks/sarah_bergbreiter 7

AVATAR - The Internet Of Things? 8 Source: thesocietypages.org/socimages/2009/12/28/on-avatar-the-movie-spoiler-alert/

They re Tracking When You Turn Off the Lights Sensors to capture data on environmental conditions including sound volume, wind and carbon-dioxide levels, as well as behavioral data such as pedestrian traffic flow 9 Source: Wall Street Journal

Jawbone Tracks Your Sleep Patterns Source: Bogard, "the Internet of me." 10

Samsung engineers are working on wearable for early stroke detection Source: Early Detection Sensor and Algorithm Package (EDSAP) 11

FTC Wants a Trusted, Secure Internet of Things The Federal Trade Commission (FTC) Looking At Apple HealthKit Source: www.cio-today.com 12

Security Threats of Connected Medical Devices The Department of Homeland Security Investigating 2 dozen cases of suspected cyber security flaws in medical devices that could be exploited Can be detrimental to the patient, creating problems such as instructing an infusion pump to overdose a patient with drugs or forcing a heart implant to deliver a deadly jolt of electricity Encrypt medical data that s stored PricewaterhouseCoopers study $30billion annual cost hit to the U.S. healthcare system due to inadequate medical-device interoperability www.computing.co.uk/ctg/opinion/2390029/security-threats-of-connectedmedical-devices# 13

IoT is a Paradise for Hackers Almost 90 percent of the devices collect personal information such as name, address, date of birth, email, credit card number, etc. Un-encrypted format on to the cloud and big data, thus endangering the privacy of users Source: HP Security Research 14

90% of world's data generated over last two years 26 billion devices on the Internet of Things by 2020 (Gartner) 15 Billion existing devices connected to the internet (Intel) Not adequately protected at the device level Cannot wait for a new generation of secure devices to be developed Require robust and layered security controls 15

16 In 2015, ecosystems will transform fragmented wearables market

Cloud Security 17

Sensitive Data in the Cloud 82% Of organizations currently (or plan to) transfer sensitive/confidential data to the cloud in next 24 mo. 18

Lack of Cloud Confidence 2/3 Number of survey respondents that either agree or are unsure that cloud services used by their organization are NOT thoroughly vetted for security 19

Data Breach: Cloud Multiplier Effect 2x A data breach in the cloud can be 2x more costly. 66 percent of respondents say their organization s use of cloud resources diminishes its ability to protect confidential or sensitive information and 64 percent believe it makes it difficult to secure business-critical applications 20

21 What Is Your No. 1 Issue Slowing Adoption of Public Cloud Computing?

22 Threat Vector Inheritance

Data Security Holding Back Cloud Projects Source: Cloud Adoption Practices & Priorities Survey Report January 2015 23

Security of Data in Cloud at Board-level Source: Cloud Adoption Practices & Priorities Survey Report January 2015 24

High-profile Cyber Attacks 49% recommended Database security 40% of budget still on Network security only 19% to Database security Conclusion: Organizations have traditionally spent money on network security and so it is earmarked in the budget and requires no further justification 25

CHALLENGE How can we Secure Data in the new Perimeter-less Environments? 26

SOLUTION Fine Grained Data Security 27

Data Centric Audit and Protection (DCAP) Organizations that have not developed data-centric security policies to coordinate management processes and security controls across data silos need to act By 2018, data-centric audit and protection strategies will replace disparate siloed data security governance approaches in 25% of large enterprises, up from less than 5% today Source: Gartner Market Guide for Data Centric Audit and Protection (DCAP), Nov 21 2014 028 Confidential

Data Centric Audit and Protection (DCAP) Centrally managed security policy Across unstructured and structured silos Classify data, control access and monitoring Protection encryption, tokenization and masking Segregation of duties application users and privileged users Auditing and reporting Source: Gartner Market Guide for Data Centric Audit and Protection (DCAP), Nov 21 2014 029 Confidential

Centralized Policy Management - Example Application Security Officer RDBMS Audit Log Cloud MPP Audit Log Audit Log Enterprise Security Administrator Policy Audit Log Audit Log Audit Log Big Data Audit Log Gateway Servers IBM Mainframe Protector Audit Log HP NonStop Base24 Audit Log File Servers Audit Log Protection Servers Audit Log Audit Log 30

Enterprise Data Security Policy What How Who When Where Audit What is the sensitive data that needs to be protected. How you want to protect and present sensitive data. There are several methods for protecting sensitive data. Who should have access to sensitive data and who should not. Security access control. When should sensitive data access be granted to those who have access. Day of week, time of day. Where is the sensitive data stored? This will be where the policy is enforced. Audit authorized or un-authorized access to sensitive data. 31

Securing Cloud Data 32

Data-Centric Protection Increases Security in Cloud Computing Rather than making the protection platform based, the security is applied directly to the data Protecting the data wherever it goes, in any environment Cloud environments by nature have more access points and cannot be disconnected Data-centric protection reduces the reliance on controlling the high number of access points 33

Cloud Security Gartner released the report Simplify Operations and Compliance in the Cloud by Protecting Sensitive Data in June 2015 that highlighted key challenges as cloud increases the risks of noncompliance through unapproved access and data breach. The report recommended CIOs and CISOs to address data residency and compliance issues by applying encryption or tokenization, and to also understand when data appears in clear text, where keys are made available and stored, and who has access to the keys. Another recent Gartner report concluded that Cloud Data Protection Gateways provides a High Benefit Rating and offer a way to secure sensitive enterprise data and files. Source: Gartner xxxx 034 Confidential

Protect the Entire Flow of Sensitive Data Cloud Gateway 035

Security Gateway Deployment Hybrid Cloud Corporate Network Cloud Gateway Public Cloud Client System Private Cloud Security Officer Enterprise Security Administrator Out-sourced 036

Security Gateway Deployment Hybrid Cloud Corporate Network Private Cloud Public Cloud Client System Cloud Gateway Security Officer Enterprise Security Administrator Out-sourced 037

Security Gateway Searchable Encryption Corporate Network Client System Query re-write Cloud Gateway RDBMS Security Officer Enterprise Security Administrator Order preserving encryption 038

Security Gateway Search & Indexing Corporate Network Client System Query re-write Cloud Gateway Index RDBMS Index Security Officer Enterprise Security Administrator 039

Risk Adjusted Data Leakage Trust H Index Leaking Sensitive Data Index Sort Order Preserving Encryption Algorithms Leaking Sensitive Data Index NOT Leaking Index Data L Sensitive Data In-house Out-sourced Elasticity 40

Risk Adjusted Storage Data Leaking Formats Computational Usefulness H L I I I I Strong-encryption Truncation Sort-order-preserving-encryption Indexing Data Leakage 41

Comparing Fine Grained Data Protection Methods 42

Reduction of Pain with New Protection Techniques Pain & TCO Input Value: 3872 3789 1620 3675 High Strong Encryption Output: AES, 3DES!@#$%a^.,mhu7///&*B()_+!@ Format Preserving Encryption DTP, FPE 8278 2789 2990 2789 Format Preserving Vault-based Tokenization Greatly reduced Key Management 8278 2789 2990 2789 Low Vaultless Tokenization No Vault 8278 2789 2990 2789 1970 2000 2005 2010 43

Cloud Gateway - Requirements Adjusted Protection Data Protection Methods Scalability Storage Security Transparency System without data protection Weak Encryption (1:1 mapping) Searchable Gateway Index (IV) Vaultless Tokenization Partial Encryption Data Type Preservation Encryption Strong Encryption (AES CBC, IV) Best Worst 44

Speed of Fine Grained Protection Methods Transactions per second* 10 000 000-1 000 000-100 000-10 000-1 000-100 - I I I I Vault-based Format AES CBC Vaultless Data Preserving Encryption Data Tokenization Encryption Standard Tokenization *: Speed will depend on the configuration 45

What is Data Tokenization? 46

Fine Grained Data Security Methods Tokenization and Encryption are Different Encryption Tokenization Used Approach Cipher System Code System Cryptographic algorithms Cryptographic keys Code books Index tokens Source: McGraw-HILL ENCYPLOPEDIA OF SCIENCE & TECHNOLOGY 47

Significantly Different Tokenization Approaches Vault-based Vaultless Property Dynamic Pre-generated 48

Examples of Protected Data Field Real Data Tokenized / Pseudonymized Name Joe Smith csu wusoj Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA Date of Birth 12/25/1966 01/02/1966 Telephone 760-278-3389 760-389-2289 E-Mail Address joe.smith@surferdude.org eoe.nwuer@beusorpdqo.org SSN 076-39-2778 076-28-3390 CC Number 3678 2289 3907 3378 3846 2290 3371 3378 Business URL www.surferdude.com www.sheyinctao.com Fingerprint Encrypted Photo Encrypted X-Ray Encrypted 49 Healthcare / Financial Services Dr. visits, prescriptions, hospital stays and discharges, clinical, billing, etc. Financial Services Consumer Products and activities Protection methods can be equally applied to the actual data, but not needed with de-identification

Partial Protection of Data Fields Cost Example: 16 digit credit card number High - Cost of Application Changes Risk Exposure Low - I I I All-16-hidden Only-middle-6-hidden All-16-clear 50

Traditional Access Control High - User Productivity and Creativity Risk Exposure Low - Access to Sensitive Data in Clear I Low Access to Data High Access to Data I 51

Fine Grained Protection of Data Fields High - User Productivity and Creativity Low - I Low Access to Data Risk Exposure High Access to Data Access to Tokenized Data I 52

Securing Big Data 53

Big Data Needs a Data-Centric Security Focus CISOs should not treat big data security in isolation, but require policies that encompass all data New data-centric audit and protection solutions and management approaches are required Big data initiatives require data to move between structured and unstructured data silos, exposing incoherent data security policies that CISOs must address to avoid security chaos Source: Gartner Big Data Needs a Data-Centric Security Focus, 2014 054 Confidential

055 Oracle s Big Data Platform

56 Oracle s Exadata

Zookeeper (Coordination) Avro (Serialization) Many Ways to Hack Big Data ETL Tools BI Reporting RDBMS Pig (Data Flow) Hive (SQL) Sqoop MapReduce (Job Scheduling/Execution System) Hbase (Column DB) HDFS (Hadoop Distributed File System) Hackers Unvetted Applications Or Ad Hoc Processes Privileged Users Source: http://nosql.mypopescu.com/post/1473423255/apache-hadoop-and-hbase 57

Securing Big Data 1. Data protection at database, application or file 2. Data protection in a staging area 3. Volume encryption in Hadoop 4. Hbase, Pig, Hive, Flume and Scope using protection API 5. MapReduce using protection API 6. File and folder encryption in HDFS 8. Export de-identified data 7. Import de-identified data 9. Export identifiable data 10. Export audit s for reporting 58

Summary Exponential growth of data generation New business models fueled by Big Data, cloud computing and the Internet of Things Creating cybercriminal's paradise Challenge in this interconnected world Merging data security with data value and productivity. Urgently need a data-centric strategy Protect the sensitive data flowing through digital business systems Solutions to bring together data insight & security Safely unlock the power of digital business 59

Thank you! Questions? Please contact us for more information www.protegrity.com Ulf.Mattsson AT protegrity.com

Tokenization Reducing Attack Surface Tokenization on Each Node 123456 123456 1234 61

Security & Business Skills The global shortage of technical skills in information security is by now well documented, but an equally concerning shortage of soft skills "I need people who understand that they are here to help the business make money and enable the business to succeed -- that's the bottom line. But it's very hard to find information security professionals who have that mindset," a CISO at a leading technology company told us Source: www.informationweek.com/strategic-cio/enterprise-agility/the-security-skills-shortage-noone-talks-about/a/d-id/1315690 62

Balancing Data Security & Utility Classification of Sensitive Data Granular Protection of Sensitive Data Value Preserving Encoding Leaking Leaking Sensitive Sensitive Data? Index Data Data? 63