NIST Big Data Public Working Group



Similar documents
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

NIST Big Data Phase I Public Working Group

Moderator: Panelists: Panel #2 Big Data: Application Security and Privacy. Keith Swenson, VP of Research and Development, Fujitsu America, Inc.

Cloud Data Security. Sol Cates

A Study on Security and Privacy in Big Data Processing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Big Data, Big Risk, Big Rewards. Hussein Syed

Associate Prof. Dr. Victor Onomza Waziri

Cloud security architecture

Big Data Standardisation in Industry and Research

Overview NIST Big Data Working Group Activities

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

ATTPS Publication: Trustworthy ICT Taxonomy

Bellevue University Cybersecurity Programs & Courses

Cloud and Big Data Standardisation

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture

Preemptive security solutions for healthcare

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

NSF Workshop on Big Data Security and Privacy

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IEEE JAVA Project 2012

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange

Top Ten Big Data Security and Privacy Challenges

The Protection Mission a constant endeavor

Security Issues in Cloud Computing

Top 10 Cloud Risks That Will Keep You Awake at Night

Enterprise Security Solutions

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

IT Networking and Security

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

John Essner, CISO Office of Information Technology State of New Jersey

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Big Data - Security and Privacy

NE T GENERATION CLOUD SECURITY PLATFORM

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Knowledgent White Paper Series. Developing an MDM Strategy WHITE PAPER. Key Components for Success

Injazat s Managed Services Portfolio

locuz.com Big Data Services

Strengthen security with intelligent identity and access management

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

API Management: Powered by SOA Software Dedicated Cloud

Security and Privacy Controls for Federal Information Systems and Organizations

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Service Definition Document

McAfee Network Security Platform

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

IBM QRadar Security Intelligence April 2013

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Oracle SOA Suite: The Evaluation from 10g to 11g

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform

JAVA IEEE Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

Organizational Impact of Big Data on Privacy & Security

Metrics that Matter Security Risk Analytics

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Q1 Labs Corporate Overview

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

Information Security Basic Concepts

How To Buy Nitro Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

V1.4. Spambrella Continuity SaaS. August 2

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

05.0 Application Development

Big Data Challenges and Success Factors. Deloitte Analytics Your data, inside out

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Stay ahead of insiderthreats with predictive,intelligent security

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Professional Services Overview

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Protecting critical infrastructure from Cyber-attack

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Transcription:

NIST Big Data Public Working Group Requirements May 13, 2014 Arnab Roy, Fujitsu On behalf of the NIST BDWG S&P Subgroup

S&P Requirements Emerging due to Big Data Characteristics Variety: Traditional encryption schemes hinder organization of data based on semantics. Volume: Threat models for multi-tiered data storages are complex and evolving. Velocity: Distributed computing infrastructures and non-relational data storages require retargeting of traditional security mechanisms.

S&P Requirements Emerging due to Big Data Characteristics Veracity: Keeping track and ensuring integrity of the ownership, source and other metadata of individual data is a complex and sophisticated requirement, given the movement of data between nodes, entities and geographical boundaries. Volatility: Indefinitely persistent data requires evolving S&P considerations. With the passage of time, roles may evolve and governance may shift depending on the merger and disappearance of responsible organizations.

CSA BD Top 10 S&P Challenges: Classification Infrastructure security Data Privacy Data Management Integrity and Reactive Security Secure Computations in Distributed Programming Frameworks Privacy Preserving Data Mining and Analytics Secure Data Storage and Transaction Logs End-point validation and filtering Security Best Practices for Non- Relational Data Stores Cryptographically Enforced Data Centric Security Granular Audits Real time Security Monitoring Granular Access Control Data Provenance 4

Taxonomy conceptual axis Privacy Communication Privacy Data Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic Encryption Secure Data Aggregation Key Management Provenance End-point Input Validation Communication Integrity Syntactic Validation Semantic Validation Authenticated Computations on Data Trusted Platforms Crypto Enforced Granular Audits Control of Valuable Assets Lifecycle Management Retention, Disposition, Hold Digital Rights Management System Health Security against DoS Construction of cryptographic protocols proactively resistant to DoS Big Data for Security Analytics for Security Intelligence Data-driven Abuse Detection Event Detection Forensics

Taxonomy operational axis Big Data Registration, Security Model and Policy Enforcement Device, User, Asset, Services, Applications registration Security Metadata Model Policy Enforcement Identity and Access Management Virtualization Layer Identity Application Layer Identity End User Layer Identity Management Identity Provider Additional XACML Concepts Data Governance Encryption and Key Management (including Multi-Key) Isolation/Containerization Storage Security Data Loss Prevention, Detection Web Services Gateway Data Transformation Data Lifecycle Management End Point Input Validation Digital Rights Management Visibility and Infrastructure Management Threat and Vulnerability Management Monitoring, Alerting Mitigation Configuration Management Logging Malware Surveillance and Remediation Network Boundary Control Resiliency, Redundancy and Recovery Risk and Accountability Accountability Compliance Forensics Business Risk Model

Use Cases Retail/Marketing Consumer Digital Media Usage Nielsen Homescan: Family level Retail Transactions Web Traffic Analysis Healthcare Health Information Exchange Genetic Privacy Pharma Clinical Trial Data Sharing Cyber-security Network Protection Government Military Education Industrial Aviation: Sensor Data Storage and Analytics Transportation: Cargo Shipping 7

S e c u r i t y & P r i v a c y M a n a g e m e n t DATA SW I T V A L U E C H A I N Data Provider Data Consumer I N F O R M AT I O N V A L U E C H A I N System Orchestrator Big Data Application Provider DATA SW Collection Curation Analytics Visualization Access DATA SW Big Data Framework Provider Processing Frameworks (analytic tools, etc.) Horizontally Scalable Platforms (databases, etc.) Horizontally Scalable Vertically Scalable Vertically Scalable Infrastructures Horizontally Scalable (VM clusters) Vertically Scalable Physical and Virtual Resources (networking, computing, etc.) 8

Big Data Security Reference Architecture

Data Provider Interface of Data Providers -> BD App Provider Big Data Application Provider Collection Curation Analytics Visualization Access S&P Consideration Health Info Exchange Military UAV End-Point Input Validation Real Time Security Monitoring Strong authentication, perhaps through X.509v3 certificates, potential leverage of SAFE bridge in lieu of general PKI Validation of incoming records. May need to check for evidence of Informed Consent. Need to secure sensor to prevent spoofing/stolen sensor streams On-board & control station secondary sensor security monitoring Data Discovery and Classification Leverage HL7 and other standard formats opportunistically, but avoid attempts at schema normalization. Varies from media-specific encoding to sophisticated situation-awareness enhancing fusion schemes. Secure Data Aggregation Clear text columns can be deduplicated, perhaps columns with deduplication. Fusion challenges range from simple to complex. 10

Data Consumer Interface of BD App Provider -> Data Consumer Big Data Application Provider Collection Curation Analytics Visualization Access S&P Consideration Health Info Exchange Military UAV Privacy preserving data analytics and dissemination Searching on encrypted data. Determine if Geospatial constraints: cannot surveil drug administered will generate an beyond a UTM. Military secrecy: target, adverse reaction, without breaking the point of origin privacy. double blind. Compliance with regulations Govt access to data and freedom of expression concerns HIPAA security and privacy will require Numerous. Also standards issues. detailed accounting of access to HER data. CDC, Law Enforcement, Subpoenas and Warrants. Access may be toggled based Google lawsuit over streetview. on occurrence of a pandemic or receipt of a warrant. 11

Interface of BD App Provider -> BD Framework Provider Big Data Application Provider Collection Curation Analytics Visualization Access Big Data Framework Provider: Processing, Platform, Infrastructure, Resources S&P Consideration Health Info Exchange Military UAV Policy based encryption Policy management for access control Row-level and Column-level Encryption Role-based and claim-based Policy-based encryption, often dictated by legacy channel capacity/type. Transformations tend to be made within DoD-contractor devised system schemes. Computing on encrypted data Audits Privacy preserving access to relevant events, anomalies and trends. Facilitate HIPAA readiness, and HHS audits CSO, IG audit. Sometimes performed within vendorsupplied architectures, or by imageprocessing parallel architectures. 12

Internal to BD Framework Provider Big Data Framework Provider: Processing, Platform, Infrastructure, Resources S&P Consideration Health Info Exchange Military UAV Securing Data Stores and Transaction Logs Need to be protected for integrity and for privacy, but also for establishing completeness, with an emphasis on availability. The usual, plus data center security levels are tightly managed (e.g., field vs. battalion vs. HQ). Security Best Practices for nonrelational data End-to-end encryption. Not handled differently at present; this is changing in DoD. Security against DoS attacks Mandatory availability is a compliance requirement. DoD anti-jamming e-measures. Data Provenance Completeness and integrity of data with records of all accesses and modifications Must track to sensor point in time configuration, metadata. 13

Next Steps Taxonomy to Reference Architecture Mapping Scope for Standards 14

Next steps: Cryptography and Privacy Enhancing Technologies BIG Scale up existing solutions for volume, variety and velocity Retarget to Big Data infrastructural shift DATA Balance privacy and utility Enable analytics and governance on encrypted data Reconcile authentication and anonymity

Emerging Cryptographic Technologies Utility of Encrypted Client Data No operation possible at Cloud Controlled results visible at Cloud Policy-based Access Control Transformations possible, but results not visible to Cloud Technology Standard Encryption Searchable Encryption - Symmetric - Asymmetric Identity-based Encryption Attribute-based Encryption Homomorphic Encryption

Thank you! 17

Process The CSA Big Data Working Group Top 10 S&P Challenges Googledoc with initial set of topics and solicitation of use cases Taxonomy of topics Input from Reference Architecture Group Security Reference Architecture overlaid on RA Mapping use cases to the SRA Editorial phase Current Working Draft (M0110) 18

CSA BDWG: Top Ten Big Data Challenges10 Challenges Identified by CSA BDWG 1) Secure computations in distributed programming frameworks 2) Security best practices for nonrelational datastores 3) Secure data storage and transactions logs 4) End-point input validation/filtering 5) Real time security monitoring 6) Scalable and composable privacypreserving data mining and analytics 7) Cryptographically enforced access control and secure communication 8) Granular access control 9) Granular audits 10) Data provenance 4, 10 4, 8, 9 1, 3, 5, 6, 7, 8, 9, 10 Data Storage 10 2, 3, 5, 8, 9 19 Public/Private/Hybrid Cloud 5, 7, 8, 9

Top 10 Challenges in Crypto and PET identified by CSA BDWG Infrastructure Encryption Privacy Data Governance Communication protocols Access policy based encryption Secure dissemination Data integrity Key management Searching / filtering encrypted data Secure data collection / aggregation Proof of data storage Secure outsourcing of computation Secure collaboration