Is Your Hadoop Environment Secure?

28
© 2012 Datameer, Inc. All rights reserved. © 2012 Datameer, Inc. All rights reserved. Building Secure Hadoop Environments

description

How do you protect the data in big data analytics projects? As big data initiatives focus on volume, velocity or variety of data, often overlooked in the big data project is the security of the data. This is especially important for financial services, healthcare and government or anytime sensitive data is analyzed. This webinar highlights: *Hadoop security landscape *Hadoop encryption, masking, and access control *Customer examples of securing hadoop environments

Transcript of Is Your Hadoop Environment Secure?

Page 1: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.© 2012 Datameer, Inc. All rights reserved.

Building Secure Hadoop Environments

Page 2: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

View the full recording

You can view the full recording of this on-demand webinar with slides at:

http://info.datameer.com/Slideshare-Building-Secure-Hadoop-Environments.html

Page 3: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

About our Speaker

Karen HsuWith over 15 years of experience in enterprise software, Karen Hsu has co-authored 4 patents and worked in a variety of engineering, marketing and sales roles.

Most recently she came from Informatica where she worked with the start-ups Informatica purchased to bring data quality, master data management, B2B and data security solutions to market. 

Karen has a Bachelors of Science degree in Management Science and Engineering from Stanford University.  

Page 4: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

About our Speaker

Filip SluneckoFilip is part of the Customer support team at Datameer.

He is a Linux professional and Python enthusiast. Before joining Datameer, he was on the Hadoop team at AVG, an antivirus/security company.

Filip now uses his 8 years experience with Linux servers and Hadoop security to help Datameer customers.

Page 5: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.© 2012 Datameer, Inc. All rights reserved.

Building Secure Hadoop Environments

Page 6: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Agenda

Challenges and use cases

Hadoop security landscape

Components for building successful Hadoop environments

Call to Action

Page 7: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Hadoop Data Security Challenges

Architectural issues

Hadoop security is developing

Vendors offer bolt-on solutions

Securosis, Oct 12, 2012

To add security capabilities into a big data environment, the capabilities need to scale with the data… Most security tools fail

to scale and perform with big data environments.- Adrian Lane, Securosis

Page 8: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Hadoop Security Use Cases

Use Case Requirement Example Description

Role based access

Data access is restricted through the abstraction layer

Users have a view of data in Hadoop they can manipulate

Transformation of sensitive values during load

Data is transformed, masked, or encrypted.

Cluster is copied and then masked/transformed so that analysts work on anonymized data

Page 9: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Role Based Access

Data Access

HDFSRestrict View

Map-Reduce

Pig / Hive

Page 10: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Transformation of Sensitive Values

Data Access

HDFS

Map-Reduce

Transform Data

Load

Page 11: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Load

Hybrid of Role Based Access and Transformation of Sensitive Values

Data Access

HDFS

Map-Reduce

Transform Restrict View

Page 12: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Hadoop Security Offerings

Type Description Example vendorsRole based access control Use LDAP / Active Directory (AD)

authentication to identify and manage users. Leveraging Kerberos to provide mutual authentication

Encryption • File encryption • Disk encryption• Format preserving encryption

Masking Data Masking performed before load

Block level encryption Linux directory level encryption with external key store

Page 13: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Components for Building Secure Hadoop Environment

Secure access – SSL

Access controls

Secure authentication

Kerberos

Logging – auditing

File Encryption

Disk encryption

Page 14: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Secure access

Page 15: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Access ControlsDatameer Example

Impersonation

Kerberos

LDAP

Roles

Object permission

Page 16: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Object PermissionDatameer Example

Info graphics

Export job

Workbooks

Data links

Import jobs

Object types

Page 17: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

RolesDatameer Example

Page 18: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Remote AuthenticatorDatameer Example

Integrating into an existing infrastructure

Active directory support

Import groups and users to Datameer

Centralized user management

Page 19: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Kerberos

Page 20: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Impersonation

Page 21: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Demonstration

Page 22: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Disk Encryption

Why it’s important• 1 year - 2%

• 2 year - 6-8%

Criteria for success• Encryption per process

• Key management

• Safe and in full compliance with HIPAA, PCI-DSS, FERPA

Page 23: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

File EncryptionEmerging Technology

Intel Hadoop

Project Rhino• Encryption and key management.

• A common authorization framework.

• Token based authentication and single sign on.

• Improve audit logging.

Page 24: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Logging and Auditing

Datameer

UI Access Job execution

Hadoop

File access Job runs

Page 25: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Logging and Auditing

Centralized logging

Collectors Storage Real Time Search Visualization

Datameer Datameer* Katta Datameer

Splunk Splunk Elasticsearch Splunk

Flume Elasticsearch Solr Greylog

Greylog Solr Graphite

Hive

Page 26: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Recap

Challenges and use cases

Hadoop security landscape

Components for building successful Hadoop environments• Secure access – SSL

• Access controls

• Secure authentication

• Kerberos

• Logging – auditing

• File Encryption

• Disk encryption

Page 27: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Call to Action

Contact• Filip Slunecko

[email protected]• Karen Hsu khsu

@datameer.com

Meet us atDiscover Big Data 8 City Workshop near you!http://info.datameer.com/Discover-Big-Data-RoadShow.html

Implementing Hadoop Security Workshop• Contact

[email protected] for more details

www.datameer.com

Page 28: Is Your Hadoop Environment Secure?

© 2012 Datameer, Inc. All rights reserved.

Online Resources

Try Datameer: www.datameer.com Follow us on Twitter @datameer