Big Data Security. Kevvie Fowler. kpmg.ca



Similar documents
Introduction to Big data. Why Big data? Case Studies. Introduction to Hadoop. Understanding Features of Hadoop. Hadoop Architecture.

White paper. The Big Data Security Gap: Protecting the Hadoop Cluster

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Secure Your Hadoop Cluster With Apache Sentry (Incubating) Xuefu Zhang Software Engineer, Cloudera April 07, 2014

Big Data Management and Security

Data Security in Hadoop

Upcoming Announcements

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

Infomatics. Big-Data and Hadoop Developer Training with Oracle WDP

Cyber Security For not-for-profit organizations. Kevvie Fowler, GCFA, CISSP February, 2015

Big Data Trust and Reputation, Privacy Cyber Threat Intelligence

Hadoop Forensics. Presented at SecTor. October, Kevvie Fowler, GCFA Gold, CISSP, MCTS, MCDBA, MCSD, MCSE

Olivier Renault Solu/on Engineer Hortonworks. Hadoop Security

Apache Sentry. Prasad Mujumdar

Fast, Low-Overhead Encryption for Apache Hadoop*

Spring,2015. Apache Hive BY NATIA MAMAIASHVILI, LASHA AMASHUKELI & ALEKO CHAKHVASHVILI SUPERVAIZOR: PROF. NODAR MOMTSELIDZE

Cloudera Navigator Installation and User Guide

Hadoop Evolution In Organizations. Mark Vervuurt Cluster Data Science & Analytics

Securing Your Enterprise Hadoop Ecosystem Comprehensive Security for the Enterprise with Cloudera

Deploying Hadoop with Manager

Data processing goes big

Practical Hadoop. Security. Bhushan Lakhe

Ensure PCI DSS compliance for your Hadoop environment. A Hortonworks White Paper October 2015

Hadoop & Spark Using Amazon EMR

Lambda Architecture for Batch and Real- Time Processing on AWS with Spark Streaming and Spark SQL. May 2015

Like what you hear? Tweet it using: #Sec360

Cloudera Backup and Disaster Recovery

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Important Notice. (c) Cloudera, Inc. All rights reserved.

Configuring Security Features of Session Recording

BM482E Introduction to Computer Security

docs.hortonworks.com

How to Hadoop Without the Worry: Protecting Big Data at Scale

On a Hadoop-based Analytics Service System

Keywords: Big Data, Hadoop, cluster, heterogeneous, HDFS, MapReduce

Hadoop IST 734 SS CHUNG

Qsoft Inc

Cloudera Enterprise Reference Architecture for Google Cloud Platform Deployments

Auditing Big Data for Privacy, Security and Compliance

Cloudera ODBC Driver for Apache Hive Version

Constructing a Data Lake: Hadoop and Oracle Database United!

A Modern Data Architecture with Apache Hadoop

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM

Auditing the Security of an SAP HANA Implementation

Open Source for Cloud Infrastructure

Sector vs. Hadoop. A Brief Comparison Between the Two Systems

Hadoop Ecosystem B Y R A H I M A.

Set Up Hortonworks Hadoop with SQL Anywhere

Securing your Big Data Environment

ITG Software Engineering

Implement Hadoop jobs to extract business value from large and varied data sets

How To Use Cloudera Manager Backup And Disaster Recovery (Brd) On A Microsoft Hadoop (Clouderma) On An Ubuntu Or 5.3.5

Testing Big data is one of the biggest

How To Create A Large Data Storage System

Maximizing Hadoop Performance and Storage Capacity with AltraHD TM

Cloudera Backup and Disaster Recovery

and Hadoop Technology

Integration of Apache Hive and HBase

An Oracle White Paper November Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics

Savanna Hadoop on. OpenStack. Savanna Technical Lead

Securing Your Enterprise Hadoop Ecosystem Comprehensive Security for the Enterprise with Cloudera

Mr. Apichon Witayangkurn Department of Civil Engineering The University of Tokyo

Important Notice. (c) Cloudera, Inc. All rights reserved.

Workshop on Hadoop with Big Data

ORACLE DATA INTEGRATOR ENTERPRISE EDITION

docs.hortonworks.com

Hadoop Introduction. Olivier Renault Solution Engineer - Hortonworks

Hadoop Job Oriented Training Agenda

Comprehensive Analytics on the Hortonworks Data Platform

Object Level Authentication

Integrating SAP BusinessObjects with Hadoop. Using a multi-node Hadoop Cluster

Hadoop. Apache Hadoop is an open-source software framework for storage and large scale processing of data-sets on clusters of commodity hardware.

SECURING YOUR ENTERPRISE HADOOP ECOSYSTEM

Fighting Cyber Fraud with Hadoop. Niel Dunnage Senior Solutions Architect

The Greenplum Analytics Workbench

WHITE PAPER USING CLOUDERA TO IMPROVE DATA PROCESSING

How Companies are! Using Spark

Integrate Master Data with Big Data using Oracle Table Access for Hadoop

Evaluation of Security in Hadoop

Cloudera Manager Training: Hands-On Exercises

Hadoop Ecosystem Overview. CMSC 491 Hadoop-Based Distributed Computing Spring 2015 Adam Shook

Getting Started with Hadoop. Raanan Dagan Paul Tibaldi

An Oracle White Paper June High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database

Securing Hadoop in an Enterprise Context

Hadoop. Sunday, November 25, 12

How To Secure Your Data Center From Hackers

HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics

Ubuntu and Hadoop: the perfect match

Supported Platforms. HP Vertica Analytic Database. Software Version: 7.0.x

Apache Hadoop: The Big Data Refinery

Policy-based Pre-Processing in Hadoop

Chase Wu New Jersey Ins0tute of Technology

Microsoft Dynamics CRM Server 2011 software requirements

An Oracle White Paper April Network Isolation in Private Database Clouds

Big Data Training - Hackveda

Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software. SC13, November, 2013

Transcription:

Big Data Security Kevvie Fowler kpmg.ca

About myself Kevvie Fowler, CISSP, GCFA Partner, Advisory Services KPMG Canada Industry contributions

Big data security definitions Definitions Big data Datasets so large/complex they become difficult to work with using existing technology Big data technology Specialized technology developed to manage large/complex data sets

Big data security industry demand The big data landscape

Big data security industry demand Explosive growth is occurring within the big data market 2012 $11.6B 2018 $46.34B Apache Hadoop 54.7% growth (~2018) 20.9B market by 2018 Big Data Market By Types - Worldwide Forecasts & Analysis (2013 2018)

Big data security Hadoop architecture Hadoop architecture

Big data security The challenge The Hadoop security challenge Architectural design Sheer volume of data to be secured Minimal native security features

Big data security The challenge Can t you secure Hadoop with 3 rd party products? Several overlays on the market RBAC Logging Encryption The problem with many Hadoop security overlays Don t scale with the data Point solutions Can t substitute for ground-up security builds

Big data security The challenge Big data can be a perfect storm of risk for an organization Massive amount of data Little effective security Big data breaches are inevitable They will dwarf the large breaches of today Cost to recover Investigative abilities De-centralized storage You can significantly increase your protection against attack by following 8 steps

Big data security Step #1 Identify big data use data and associated security/privacy requirements 1 If you don t need sensitive data, don t store it Obfuscate sensitive information whenever possible

Hadoop security Step #2 Use a configuration management tool to deploy and manage your cluster 2 Logging Management Cluster Mgt. Solution

Hadoop security Step #3 Validation of nodes and requests 3 Validate nodes and client applications before admission to the cluster

Hadoop security Step #3 Validation of nodes and requests (continued) 3 Authentication By default there is no authentication Secure RPC & HTTP Web consoles (Hadoop s Web UIs, WebHDFS, and HttpFS) Simple Authentication and Security Layer (SASL) Kerberos Authorization Set your HDFS file permissions MapReduce ACL s

Hadoop security Step #4 Secure the underlying OS 4 Server hardening Encrypt sensitive data-at-rest

Hadoop security Step #5 5 Use transmission level security Most clusters use RPC, TCP/IP & HTTP SSL / TLS to authenticate and ensure privacy of communications between cluster nodes

Hadoop security Step #6 Have a choke point 6 Clients communicate directly with resource managers and nodes implement a choke point to block access to users/ip s as required.

Hadoop security Step #7 Secure Hadoop-related applications 7 Hadoop extensions 3 rd party applications

Hadoop security Step #7 Secure Hadoop-related applications Hive (continued) 7 Hive is a data warehouse system for Hadoop HiveQL is a language based on SQL that allows a user friendly front-end to MapReduce

Hadoop security Step #7 Secure Hadoop-related applications Hive 7 SQL Injection meets the Hive

Hadoop security Step #7 Secure Hadoop-related applications Hive (continued) 7 HiveQL includes many operators, functions and expressions commonly abused by SQL by injection attacks Count Union Distinct Wait for Sub queries Expressions joined by OR in a WHERE clause Comparisons between two constants Type of injection Simple SQL/ASP.NET HIVEQL/ HUE Dynamic SQL Injection X X Blind SQL Injection X X Stacked queries X X

Hadoop security Step #7 Secure Hadoop-related applications Hive (continued) 7 Protecting against HiveQL injection Accountability (user developed functions, views, logic) Security reviews of MapReduce/HiveQL applications Revoke access where possible Use Hive Server 2!

Hadoop security Step #8 Ensure your IR and Forensics program incorporates big data technology 8 Traditional IR/Forensics practices aren t effective against big data technology Potential for enormous organizational impact, little information on how to manage it 10

Hadoop security Future enhancements Upcoming Hadoop security enhancements HBASE Security (HBASE-6222) Token-based authentication (HADOOP-9466) Encrypted data at rest (HADOOP-9331) 10

Hadoop security References www.intel.com www.cloudera.com www.hortonworks.com

Thank you Kevvie Fowler, CISSP, GCFA Partner Advisory Services Office: (416) 777-3742 Email: kevviefowler@kpmg.ca

The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. 2013 KPMG LLP, a limited liability partnership and the Canadian member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. The KPMG name, logo and "cutting through complexity" are registered trademarks or trademarks of KPMG International Cooperative ("KPMG International"). 26