Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture



Similar documents
MongoDB Security Guide

MySQL Security: Best Practices

MongoDB Security Guide Release 3.0.6

APIs The Next Hacker Target Or a Business and Security Opportunity?

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

With Great Power comes Great Responsibility: Managing Privileged Users

Protecting Sensitive Data Reducing Risk with Oracle Database Security

The Essential Security Checklist. for Enterprise Endpoint Backup

Centrify Cloud Connector Deployment Guide

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

F-Secure Messaging Security Gateway. Deployment Guide

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Network Security Administrator

D50323GC20 Oracle Database 11g: Security Release 2

Securing Data in Oracle Database 12c

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Oracle Database 11g: Security Release 2

MongoDB Security Guide

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Oracle Database 11g: Security. What you will learn:

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Websense Support Webinar: Questions and Answers

Oracle Database 11g: Security

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Trust but Verify: Best Practices for Monitoring Privileged Users

Administering the Web Server (IIS) Role of Windows Server

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

The Education Fellowship Finance Centralisation IT Security Strategy

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Introduction to the EIS Guide

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

Privileged Identity Management

Product Comparison List

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Real-Time Database Protection and. Overview IBM Corporation

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

BMC s Security Strategy for ITSM in the SaaS Environment

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Big Data, Big Risk, Big Rewards. Hussein Syed

Data Protection: From PKI to Virtualization & Cloud

Cisco ASA. Administrators

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

MS 10972A Administering the Web Server (IIS) Role of Windows Server

Alliance Key Manager A Solution Brief for Technical Implementers

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Knowledge-Based Authentication Challenge Response System

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

10972-Administering the Web Server (IIS) Role of Windows Server

The Comprehensive Guide to PCI Security Standards Compliance

Achieving PCI-Compliance through Cyberoam

Acano solution. Security Considerations. August E

QRadar SIEM 6.3 Datasheet

Security and Compliance in Big Data

LDAP User Guide PowerSchool Premier 5.1 Student Information System

CorreLog Alignment to PCI Security Standards Compliance

SolarWinds Log & Event Manager

Intelligent Security Design, Development and Acquisition

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Introduction to Cyber Security / Information Security

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

JD Edwards Security Best Practices

information security and its Describe what drives the need for information security.

74% 96 Action Items. Compliance

SonicWALL PCI 1.1 Implementation Guide

Defending the Database Techniques and best practices

FileCloud Security FAQ

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

CloudPassage Halo Technical Overview

Alliance Key Manager Cloud HSM Frequently Asked Questions

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Securing Active Directory Presented by Michael Ivy

PATROL Console Server and RTserver Getting Started

Overcoming PCI Compliance Challenges

Best Practices for PCI DSS V3.0 Network Security Compliance

Microsoft Exam

SANS Top 20 Critical Controls for Effective Cyber Defense

FileMaker Security Guide The Key to Securing Your Apps

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Remote Services. Managing Open Systems with Remote Services

Transcription:

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture Mat Keep MongoDB Product Management & Marketing mat.keep@mongodb.com @matkeep

Agenda Data Security Landscape and Challenges Best Practices and MongoDB Implementation Resources to Get Started 2

Security Breaches: More Users, More Cost 3 http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

and it s getting worse $5.4m average cost of a data breach 10% annual growth in financial impact of cybercrime Source: Symantec 4 96% of thefts come from database records

Security: #2 Spending Increase 5

Security: Largest Skills Deficit 6

More Data, New Data Data growth: 1.8 trillion gigabytes in 2011 to 7.9 trillion gigabytes by 2015 (IDC) Technologies Growth: DB-Engines now tracks over 210 data stores Market Growth: Big data market forecast to reach $50bn by 2017 (Wikibon) 7

New Reality Analytics derived from big data becoming as valuable as traditional enterprise data Big data technologies must evolve to meet compliance standards of industry & government 8

Regulatory Compliance Multiple standards PCI-DSS, HIPAA, NIST, STIG, EU Data Protection Directive, APEC data protection standardization Common requirements Data access controls Data protection controls Data permission Data audit 9

Requirements Define Security Architecture Database 10

Best Practices & Enforcement in MongoDB

Authentication Confirming identity for everything accessing the database Create unique credentials for each entity Clients, admins/devs, software systems, other cluster nodes Integrated with the corporate authentication standards Application Reporting ETL application@enterprise.com reporting@enterprise.com etl@enterprise.com Joe.Blow@enterprise.com Jane.Doe@enterprise.com Sam.Stein@enterprise.com shard1@enterprise.com shard2@enterprise.com shard3@enterprise.com 12

Authentication in MongoDB Integrate with choice of corporate authentication mechanisms 13 Kerberos protocol, with support for Active Directory PKI integration with x.509 Certificates, for clients and intercluster nodes IdM integration with LDAP support Red Hat Identity Management

Authorization User Identity Commands Responses Resource Authorization Defines what an entity can do in the database Control which actions an entity can perform Grant access only to the specific data needed 14

Authorization in MongoDB User-defined roles assign fine-grained privileges, applied per collection, delegate across teams 15

MongoDB Field Level Redaction Enables a single document to to store data with multiple security levels 16 User 1 - Confidential - Secret User 2 - Top Secret - Secret - Confidential User 3 - Unclassified Field Level Access Control { _id: xyz, field1: { level: [ Confidential ], data: 123 }, field2: { level: [ Top Secret ], data: 456 }, field3: { level: [ Unclassified ], data: 789 } }

Field Level Redaction User 1 - Confidential - Secret User 2 - Top Secret - Secret - Confidential User 3 - Unclassified Field Level Access Control { _id: xyz, field1: { level: [ Confidential ], data: 123 }, field2: { level: [ Top Secret ], data: 456 }, field3: { level: [ Unclassified ], data: 789 } } 17

Field Level Redaction User 1 - Confidential - Secret User 2 - Top Secret - Secret - Confidential User 3 - Unclassified Field Level Access Control { _id: xyz, field1: { level: [ Confidential ], data: 123 }, field2: { level: [ Top Secret ], data: 456 }, field3: { level: [ Unclassified ], data: 789 } } 18

Field Level Redaction User 1 - Confidential - Secret User 2 - Top Secret - Secret - Confidential User 3 - Unclassified Field Level Access Control { _id: xyz, field1: { level: [ Confidential ], data: 123 }, field2: { level: [ Top Secret ], data: 456 }, field3: { level: [ Unclassified ], data: 789 } } 19

Field Level Redaction: Implementation 20

Auditing Database Audit Trail Collection Capture actions in the database Access Data Database configuration Used for compliance and forensics 21

Auditing in MongoDB Capture Schema operations & database configuration changes Authentication & authorization activities Configurable filters Write log to multiple destinations in JSON or BSON Partner solutions for capture of read / write activity IBM Guardium 22

Encryption Encoding of data in transit & at rest Connections to database, and between nodes Data stored on disk protected against attacks targeting OS or physical storage Mechanisms to sign & rotate keys FIPS-compliant cryptography 23

Encryption in MongoDB 24 SSL on all connections & utilities FIPS 140-2 mode Mix with non-ssl on the same port On-disk encryption via partner solutions Gazzang LUKS IBM Guardium Bitlocker & TrueCrypt

MongoDB Management Service Monitor Visualize 100+ system metrics Custom alerts Backup Continuous incremental backups Point-in-time recovery Automate (tech preview) Provision in minutes Hot upgrades 25

Environmental Control Network filters: Router ACLs and Firewall Bind IP Addresses: limits network interfaces Run in VPN Dedicated OS user account: don t run as root File system permissions: protect data, configuration & keyfiles 26

Putting it all Together

MongoDB Enterprise-Grade Security Business Needs Security Features Authentication Authorization Auditing Encryption In Database LDAP* Kerberos* x.509 Certificates Built-in Roles User-Defined Roles Field Level Redaction Admin Operations* Queries (via Partner Solutions) Network: SSL (with FIPS 140-2) Disk: Partner Solutions 28 *Requires a MongoDB Subscription

Subscriptions Basic Standard Enterprise Mgt. Tools Cloud On-Prem & Cloud On-Prem & Cloud Advanced Security On-Demand Training SSL SLA 4 hours 1 Hour 30 Minutes Support 9am 9pm M F 24x7x365 24x7x365 License AGPL Commercial Commercial 29

Try it Out MongoDB Security Architecture Whitepaper & Security Checklist Extensive tutorials in the documentation Download MongoDB Enterprise 30

For More Information Resource MongoDB Downloads Free Online Training Webinars and Events White Papers Case Studies Presentations Documentation Additional Info Location mongodb.com/download education.mongodb.com mongodb.com/events mongodb.com/white-papers mongodb.com/customers mongodb.com/presentations docs.mongodb.org info@mongodb.com 31

Global Community 7,000,000+ MongoDB Downloads 150,000+ Online Education Registrants 30,000+ MongoDB Management Service (MMS) Users 25,000+ MongoDB User Group Members 20,000+ MongoDB Days Attendees 33

MongoDB Use Cases Big Data Product & Asset Catalogs Security & Fraud Internet of Things Database-as-aService Top Global Shipping Company Top US Retailer Top Investment and Retail Banks Mobile Apps 34 Customer Data Management Top Media Company Intelligence Agencies Top Industrial Equipment Manufacturer Top Investment and Retail Banks Data Hub Social & Collaboration Content Management

MongoDB Products and Services Subscriptions Development & Production On-Prem Monitoring, Advanced Security, Professional Support and Commercial License Consulting Expert Resources for All Phases of MongoDB Implementations MongoDB University Certification and Training for Developers and Administrators Online & In-Person MongoDB Management Service (MMS) Cloud-Based Service for Monitoring, Alerts, Backup and Restore 35

MongoDB Company Overview 350+ employees 1,000+ customers 13 offices around the world Over $231 million in funding 36

Fortune 500 & Global 500 27 of the Top 100 Organizations 10 of the Top Financial Services Institutions 10 of the Top Electronics Companies 10 of the Top Media and Entertainment Companies 10 of the Top Retailers 10 of the Top Telcos 8 of the Top Technology Companies 6 of the Top Healthcare Companies 37

Costs Measured in Billions 38