SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Lock it Up: Securing Sensitive Data
Sam Heywood vice president of marketing, Gazzang
*  Flexibility
*  Scalability
*  Performance
*  Manage massive volumes of structured and unstructured data
Apache Cassandra Benefits
*  Flexibility
*  Scalability
*  Performance
* Manage massive volumes of structured and
unstructured data
Apache Cassandra Benefits
*  Personally identifiable information
*  Insurance claim details
*  Genomics research data
*  Customer profile data
*  Medical treatment histories
*  Confidential financial records
*  Student records
*  DRM data
*  Social media credentials
*  GPS location data
Datasets Our Customers are Managing with Cassandra
*  Personally identifiable information
*  Insurance claim details
*  Genomics research data
*  Customer profile data
*  Medical treatment histories
*  Confidential financial records
*  Student records
*  DRM data
*  Social media credentials
Datasets Our Customers are Managing with Cassandra
*  Personally identifiable information
*  Insurance claim details
*  Genomics research data
*  Customer profile data
*  Medical treatment histories
* Confidential financial records
*  Student records
*  DRM data
*  Social media credentials
*  GPS location data
Datasets Our Customers are Managing with Cassandra
* Personally identifiable information
*  Insurance claim details
*  Genomics research data
*  Customer profile data
*  Medical treatment histories
*  Confidential financial records
* Student records
*  DRM data
*  Social media credentials
*  GPS location data
Datasets Our Customers are Managing with Cassandra
* Personally identifiable information
*  Insurance claim details
*  Genomics research data
* Customer profile data
*  Medical treatment histories
*  Confidential financial records
*  Student records
*  DRM data
* Social media credentials
*  GPS location data
Datasets Our Customers are Managing with Cassandra
Why Should You Protect this Data?
Breaches Hit Every Industry
*  The average cost of a data breach in the US is $5.5 million dollars
*  In March, the U.S Department of HHS and BCBS of Tennessee settled
for $1.5 million for potential HIPAA violations
•  1	
  million	
  individual’s	
  records	
  were	
  breached	
  off	
  unencrypted	
  hard	
  drives	
  
•  Stronger	
  HIPAA	
  rules	
  increase	
  fines	
  for	
  non-­‐compliance	
  
Breaches are Expensive
It’s the Right Thing To Do For Your Customers
Most Importantly…
*  “I need to protect sensitive data in my cloud”
•  Ensure	
  sensiBve	
  data	
  and	
  encrypBon	
  keys	
  are	
  never	
  stored	
  	
  
in	
  plain	
  text	
  or	
  exposed	
  publicly	
  	
  
•  Maintain	
  control	
  of	
  your	
  encrypBon	
  keys	
  and	
  your	
  regulatory	
  
data	
  to	
  ensure	
  compliance	
  
*  “Help me secure my big data infrastructure”
•  Harden	
  Big	
  Data	
  infrastructures	
  that	
  have	
  weak	
  security	
  and	
  no	
  	
  
cryptographic	
  protecBon	
  
•  Maintain	
  Big	
  Data	
  performance	
  and	
  availability	
  
What We Hear From Our Customers
*  “I need to maintain control of my keys”
•  Manage	
  the	
  rapid	
  growth	
  of	
  key,	
  cerBficate,	
  token,	
  and	
  object	
  
proliferaBon	
  caused	
  by	
  cloud/Big	
  Data	
  adopBon	
  
•  Consolidate	
  IT	
  security	
  objects	
  and	
  bring	
  them	
  under	
  a	
  	
  
consistent	
  set	
  of	
  controls	
  and	
  policies	
  
*  “My cloud provider should not have access to my data”
•  Deploy	
  mulB-­‐factor	
  authenBcaBon	
  in	
  the	
  cloud	
  
•  Establish	
  and	
  enforce	
  robust	
  access	
  controls	
  for	
  sensiBve	
  objects	
  
What We Hear From Our Customers
*  zNcrypt™	
  
•  Provides	
  transparent	
  data	
  encrypBon	
  to	
  secure	
  Big	
  Data	
  (NoSQL	
  and	
  SQL	
  open	
  
source	
  plaRorms)	
  in	
  the	
  cloud	
  or	
  on	
  premises.	
  	
  
*  zTrustee™	
  
•  A	
  soUware	
  only	
  “virtual	
  HSM”	
  to	
  manage	
  and	
  secure	
  ANY	
  opaque	
  IT	
  object.	
  	
  
Policy-­‐driven	
  vault	
  for	
  securing	
  and	
  managing	
  an	
  organizaBon’s	
  most	
  important	
  
IT	
  security	
  items	
  (cryptographic	
  keys,	
  tokens,	
  cerBficates,	
  configs,	
  and	
  more).	
  	
  	
  
*  zOps™	
  
•  A	
  single,	
  unified	
  console	
  for	
  monitoring	
  Gazzang	
  acBons	
  and	
  their	
  impact	
  on	
  the	
  
“Big	
  Data	
  stack”(security	
  threats,	
  cloud	
  integrity,	
  IO,	
  performance,	
  machine	
  
behavior	
  and	
  more).	
  	
  
The Gazzang Solution Suite
zNcrypt sits between the file system and any database, application or
service running on Linux to encrypt data before written to the disk.
•  AES-256 encryption
•  Process-based ACLs
•  Multiple encrypted mount points
•  Requires no changes to app,
data or storage
•  Enterprise scalability
•  Packaged support for Cassandra,
Hadoop, MongoDB, MySQL,
PostgreSQL, Riak
Gazzang File Level Encryption
Securing “opaque objects” with policy management and adaptive
“trustee” authorization capabilities
Gazzang zTrustee™ - Controlling Authentication Objects
•  Trustee	
  votes	
  
•  Time	
  to	
  live	
  
•  Retrieval	
  limits	
  
•  Single-­‐use	
  URL	
  
•  Client	
  permissions	
  
Trustees	
  must	
  approve	
  release	
  of	
  objects	
  in	
  
accordance	
  with	
  the	
  deposit	
  policy	
  
API	
  Library	
  
•  Java	
  
•  Python	
  
•  C	
  library	
  
*  Install zNcrypt
•  Package	
  managers	
  (yum,	
  apt-­‐get)	
  and	
  Chef	
  
*  Create master encryption key
•  Passphrase	
  method	
  (opBonal	
  “split	
  security”)	
  
•  RSA	
  Key	
  file	
  method	
  
*  Create ACLs
•  Simple	
  command-­‐lines	
  (ALLOW/DENY	
  style)	
  
•  Almost	
  any	
  process	
  or	
  script	
  allowed:	
  
•  Virtually	
  any	
  applicaBon,	
  process	
  or	
  script:	
  	
  Apache,	
  Tomcat,	
  MongoDB,	
  MySQL,	
  backup	
  
soUware,	
  document	
  management,	
  etc	
  
*  Encrypt data
•  Simple	
  command	
  line	
  calls,	
  down	
  to	
  the	
  file	
  level	
  
Ease of Deployment
Chef – Opscode Community
https://github.com/gazzang/cookbooks/tree/master/zncrypt
zNcrypt Cookbook Source on github
*  Headquartered in Austin, TX
*  Focused on high-performance data encryption
and key management
*  Specialize in securing cloud and big data
environments: Apache Cassandra and Hadoop
*  Serve a variety of verticals: Health care, retail,
government, education, IT
About Gazzang
*  Visit www.gazzang.com/csummitsf
•  Take	
  our	
  survey	
  for	
  a	
  chance	
  to	
  win	
  a	
  $200	
  Amex	
  
•  Download	
  our	
  “Securing	
  Cassandra”	
  white	
  paper	
  
•  Watch	
  the	
  Gazzang-­‐DataStax	
  security	
  webinar	
  
•  Stop	
  by	
  our	
  booth	
  for	
  a	
  chance	
  to	
  win	
  a	
  GoPro	
  camera	
  
*  Email sales@gazzang.com to set up a demo
Thank You
THANK YOU

Mais conteúdo relacionado

Mais procurados

NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
North Texas Chapter of the ISSA
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
Evgeniya Shumakher
 
Graphics for big data reference architecture blog
Graphics for big data reference architecture blogGraphics for big data reference architecture blog
Graphics for big data reference architecture blog
Sunil Soares
 
Alota yotta products and services
Alota yotta products and servicesAlota yotta products and services
Alota yotta products and services
alotayotta
 
SQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi CohnSQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi Cohn
sqlserver.co.il
 

Mais procurados (20)

The Key to Strong Cloud Security
The Key to Strong Cloud SecurityThe Key to Strong Cloud Security
The Key to Strong Cloud Security
 
Simplified Encryption and Key Management
Simplified Encryption and Key ManagementSimplified Encryption and Key Management
Simplified Encryption and Key Management
 
Slides for CC & IAAS
Slides for CC & IAASSlides for CC & IAAS
Slides for CC & IAAS
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production Environment
 
Spring boot-vault
Spring boot-vaultSpring boot-vault
Spring boot-vault
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak namData Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 
Quick Bytes eZine by Seagate - April 2015
Quick Bytes eZine by Seagate - April 2015Quick Bytes eZine by Seagate - April 2015
Quick Bytes eZine by Seagate - April 2015
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud Deutschland
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
 
Graphics for big data reference architecture blog
Graphics for big data reference architecture blogGraphics for big data reference architecture blog
Graphics for big data reference architecture blog
 
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best Practices
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best PracticesFuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best Practices
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best Practices
 
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionKeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
 
Alota yotta products and services
Alota yotta products and servicesAlota yotta products and services
Alota yotta products and services
 
SQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi CohnSQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi Cohn
 
Wso2con identity patterns
Wso2con identity patternsWso2con identity patterns
Wso2con identity patterns
 
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
 
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPRMicrosoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
 

Destaque

Performance Tuning and Monitoring Using MMS
Performance Tuning and Monitoring Using MMSPerformance Tuning and Monitoring Using MMS
Performance Tuning and Monitoring Using MMS
MongoDB
 
Punten en lijnen
Punten en lijnenPunten en lijnen
Punten en lijnen
westmus
 
Cassandra drivers
Cassandra driversCassandra drivers
Cassandra drivers
Tyler Hobbs
 
Cassandra background-and-architecture
Cassandra background-and-architectureCassandra background-and-architecture
Cassandra background-and-architecture
Markus Klems
 

Destaque (20)

Performance Tuning and Monitoring Using MMS
Performance Tuning and Monitoring Using MMSPerformance Tuning and Monitoring Using MMS
Performance Tuning and Monitoring Using MMS
 
Punten en lijnen
Punten en lijnenPunten en lijnen
Punten en lijnen
 
Cassandra drivers
Cassandra driversCassandra drivers
Cassandra drivers
 
Cassandra for Python Developers
Cassandra for Python DevelopersCassandra for Python Developers
Cassandra for Python Developers
 
Cassandra@Coursera: AWS deploy and MySQL transition
Cassandra@Coursera: AWS deploy and MySQL transitionCassandra@Coursera: AWS deploy and MySQL transition
Cassandra@Coursera: AWS deploy and MySQL transition
 
Cassandra and security
Cassandra and securityCassandra and security
Cassandra and security
 
Cassandra REST API with Pagination TEAM 15
Cassandra REST API with Pagination TEAM 15Cassandra REST API with Pagination TEAM 15
Cassandra REST API with Pagination TEAM 15
 
Cassandra basics 2.0
Cassandra basics 2.0Cassandra basics 2.0
Cassandra basics 2.0
 
Introduction to Cassandra Architecture
Introduction to Cassandra ArchitectureIntroduction to Cassandra Architecture
Introduction to Cassandra Architecture
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
 
Building a Fast, Resilient Time Series Store with Cassandra (Alex Petrov, Dat...
Building a Fast, Resilient Time Series Store with Cassandra (Alex Petrov, Dat...Building a Fast, Resilient Time Series Store with Cassandra (Alex Petrov, Dat...
Building a Fast, Resilient Time Series Store with Cassandra (Alex Petrov, Dat...
 
Enter the Snake Pit for Fast and Easy Spark
Enter the Snake Pit for Fast and Easy SparkEnter the Snake Pit for Fast and Easy Spark
Enter the Snake Pit for Fast and Easy Spark
 
Cassandra Core Concepts
Cassandra Core ConceptsCassandra Core Concepts
Cassandra Core Concepts
 
Diagnosing Problems in Production (Nov 2015)
Diagnosing Problems in Production (Nov 2015)Diagnosing Problems in Production (Nov 2015)
Diagnosing Problems in Production (Nov 2015)
 
Cassandra DataTables Using RESTful API
Cassandra DataTables Using RESTful APICassandra DataTables Using RESTful API
Cassandra DataTables Using RESTful API
 
Instaclustr: Securing Cassandra
Instaclustr: Securing CassandraInstaclustr: Securing Cassandra
Instaclustr: Securing Cassandra
 
Cassandra background-and-architecture
Cassandra background-and-architectureCassandra background-and-architecture
Cassandra background-and-architecture
 
Securing Cassandra The Right Way
Securing Cassandra The Right WaySecuring Cassandra The Right Way
Securing Cassandra The Right Way
 
Securing Cassandra for Compliance
Securing Cassandra for ComplianceSecuring Cassandra for Compliance
Securing Cassandra for Compliance
 
Cassandra Summit 2014: Performance Tuning Cassandra in AWS
Cassandra Summit 2014: Performance Tuning Cassandra in AWSCassandra Summit 2014: Performance Tuning Cassandra in AWS
Cassandra Summit 2014: Performance Tuning Cassandra in AWS
 

Semelhante a C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood

201504 securing cassandraanddse
201504 securing cassandraanddse201504 securing cassandraanddse
201504 securing cassandraanddse
Johnny Miller
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Denodo
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database security
elshiekh1980
 

Semelhante a C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood (20)

Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
 
201504 securing cassandraanddse
201504 securing cassandraanddse201504 securing cassandraanddse
201504 securing cassandraanddse
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
 
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax EnterpriseCassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
BigData Security - A Point of View
BigData Security - A Point of ViewBigData Security - A Point of View
BigData Security - A Point of View
 
MongoDB .local Bengaluru 2019: New Encryption Capabilities in MongoDB 4.2: A ...
MongoDB .local Bengaluru 2019: New Encryption Capabilities in MongoDB 4.2: A ...MongoDB .local Bengaluru 2019: New Encryption Capabilities in MongoDB 4.2: A ...
MongoDB .local Bengaluru 2019: New Encryption Capabilities in MongoDB 4.2: A ...
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database security
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
Mining software vulns in SCCM / NIST's NVD
Mining software vulns in SCCM / NIST's NVDMining software vulns in SCCM / NIST's NVD
Mining software vulns in SCCM / NIST's NVD
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWS
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 

Mais de DataStax Academy

Cassandra on Docker @ Walmart Labs
Cassandra on Docker @ Walmart LabsCassandra on Docker @ Walmart Labs
Cassandra on Docker @ Walmart Labs
DataStax Academy
 
Cassandra Adoption on Cisco UCS & Open stack
Cassandra Adoption on Cisco UCS & Open stackCassandra Adoption on Cisco UCS & Open stack
Cassandra Adoption on Cisco UCS & Open stack
DataStax Academy
 
Cassandra @ Netflix: Monitoring C* at Scale, Gossip and Tickler & Python
Cassandra @ Netflix: Monitoring C* at Scale, Gossip and Tickler & PythonCassandra @ Netflix: Monitoring C* at Scale, Gossip and Tickler & Python
Cassandra @ Netflix: Monitoring C* at Scale, Gossip and Tickler & Python
DataStax Academy
 
Standing Up Your First Cluster
Standing Up Your First ClusterStanding Up Your First Cluster
Standing Up Your First Cluster
DataStax Academy
 
Real Time Analytics with Dse
Real Time Analytics with DseReal Time Analytics with Dse
Real Time Analytics with Dse
DataStax Academy
 
Introduction to Data Modeling with Apache Cassandra
Introduction to Data Modeling with Apache CassandraIntroduction to Data Modeling with Apache Cassandra
Introduction to Data Modeling with Apache Cassandra
DataStax Academy
 
Enabling Search in your Cassandra Application with DataStax Enterprise
Enabling Search in your Cassandra Application with DataStax EnterpriseEnabling Search in your Cassandra Application with DataStax Enterprise
Enabling Search in your Cassandra Application with DataStax Enterprise
DataStax Academy
 
Advanced Data Modeling with Apache Cassandra
Advanced Data Modeling with Apache CassandraAdvanced Data Modeling with Apache Cassandra
Advanced Data Modeling with Apache Cassandra
DataStax Academy
 

Mais de DataStax Academy (20)

Forrester CXNYC 2017 - Delivering great real-time cx is a true craft
Forrester CXNYC 2017 - Delivering great real-time cx is a true craftForrester CXNYC 2017 - Delivering great real-time cx is a true craft
Forrester CXNYC 2017 - Delivering great real-time cx is a true craft
 
Introduction to DataStax Enterprise Graph Database
Introduction to DataStax Enterprise Graph DatabaseIntroduction to DataStax Enterprise Graph Database
Introduction to DataStax Enterprise Graph Database
 
Introduction to DataStax Enterprise Advanced Replication with Apache Cassandra
Introduction to DataStax Enterprise Advanced Replication with Apache CassandraIntroduction to DataStax Enterprise Advanced Replication with Apache Cassandra
Introduction to DataStax Enterprise Advanced Replication with Apache Cassandra
 
Cassandra on Docker @ Walmart Labs
Cassandra on Docker @ Walmart LabsCassandra on Docker @ Walmart Labs
Cassandra on Docker @ Walmart Labs
 
Cassandra 3.0 Data Modeling
Cassandra 3.0 Data ModelingCassandra 3.0 Data Modeling
Cassandra 3.0 Data Modeling
 
Cassandra Adoption on Cisco UCS & Open stack
Cassandra Adoption on Cisco UCS & Open stackCassandra Adoption on Cisco UCS & Open stack
Cassandra Adoption on Cisco UCS & Open stack
 
Data Modeling for Apache Cassandra
Data Modeling for Apache CassandraData Modeling for Apache Cassandra
Data Modeling for Apache Cassandra
 
Coursera Cassandra Driver
Coursera Cassandra DriverCoursera Cassandra Driver
Coursera Cassandra Driver
 
Production Ready Cassandra
Production Ready CassandraProduction Ready Cassandra
Production Ready Cassandra
 
Cassandra @ Netflix: Monitoring C* at Scale, Gossip and Tickler & Python
Cassandra @ Netflix: Monitoring C* at Scale, Gossip and Tickler & PythonCassandra @ Netflix: Monitoring C* at Scale, Gossip and Tickler & Python
Cassandra @ Netflix: Monitoring C* at Scale, Gossip and Tickler & Python
 
Cassandra @ Sony: The good, the bad, and the ugly part 1
Cassandra @ Sony: The good, the bad, and the ugly part 1Cassandra @ Sony: The good, the bad, and the ugly part 1
Cassandra @ Sony: The good, the bad, and the ugly part 1
 
Cassandra @ Sony: The good, the bad, and the ugly part 2
Cassandra @ Sony: The good, the bad, and the ugly part 2Cassandra @ Sony: The good, the bad, and the ugly part 2
Cassandra @ Sony: The good, the bad, and the ugly part 2
 
Standing Up Your First Cluster
Standing Up Your First ClusterStanding Up Your First Cluster
Standing Up Your First Cluster
 
Real Time Analytics with Dse
Real Time Analytics with DseReal Time Analytics with Dse
Real Time Analytics with Dse
 
Introduction to Data Modeling with Apache Cassandra
Introduction to Data Modeling with Apache CassandraIntroduction to Data Modeling with Apache Cassandra
Introduction to Data Modeling with Apache Cassandra
 
Cassandra Core Concepts
Cassandra Core ConceptsCassandra Core Concepts
Cassandra Core Concepts
 
Enabling Search in your Cassandra Application with DataStax Enterprise
Enabling Search in your Cassandra Application with DataStax EnterpriseEnabling Search in your Cassandra Application with DataStax Enterprise
Enabling Search in your Cassandra Application with DataStax Enterprise
 
Bad Habits Die Hard
Bad Habits Die Hard Bad Habits Die Hard
Bad Habits Die Hard
 
Advanced Data Modeling with Apache Cassandra
Advanced Data Modeling with Apache CassandraAdvanced Data Modeling with Apache Cassandra
Advanced Data Modeling with Apache Cassandra
 
Advanced Cassandra
Advanced CassandraAdvanced Cassandra
Advanced Cassandra
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood

  • 1. Lock it Up: Securing Sensitive Data Sam Heywood vice president of marketing, Gazzang
  • 2. *  Flexibility *  Scalability *  Performance *  Manage massive volumes of structured and unstructured data Apache Cassandra Benefits
  • 3. *  Flexibility *  Scalability *  Performance * Manage massive volumes of structured and unstructured data Apache Cassandra Benefits
  • 4. *  Personally identifiable information *  Insurance claim details *  Genomics research data *  Customer profile data *  Medical treatment histories *  Confidential financial records *  Student records *  DRM data *  Social media credentials *  GPS location data Datasets Our Customers are Managing with Cassandra
  • 5. *  Personally identifiable information *  Insurance claim details *  Genomics research data *  Customer profile data *  Medical treatment histories *  Confidential financial records *  Student records *  DRM data *  Social media credentials Datasets Our Customers are Managing with Cassandra
  • 6. *  Personally identifiable information *  Insurance claim details *  Genomics research data *  Customer profile data *  Medical treatment histories * Confidential financial records *  Student records *  DRM data *  Social media credentials *  GPS location data Datasets Our Customers are Managing with Cassandra
  • 7. * Personally identifiable information *  Insurance claim details *  Genomics research data *  Customer profile data *  Medical treatment histories *  Confidential financial records * Student records *  DRM data *  Social media credentials *  GPS location data Datasets Our Customers are Managing with Cassandra
  • 8. * Personally identifiable information *  Insurance claim details *  Genomics research data * Customer profile data *  Medical treatment histories *  Confidential financial records *  Student records *  DRM data * Social media credentials *  GPS location data Datasets Our Customers are Managing with Cassandra
  • 9. Why Should You Protect this Data?
  • 10. Breaches Hit Every Industry
  • 11. *  The average cost of a data breach in the US is $5.5 million dollars *  In March, the U.S Department of HHS and BCBS of Tennessee settled for $1.5 million for potential HIPAA violations •  1  million  individual’s  records  were  breached  off  unencrypted  hard  drives   •  Stronger  HIPAA  rules  increase  fines  for  non-­‐compliance   Breaches are Expensive
  • 12. It’s the Right Thing To Do For Your Customers Most Importantly…
  • 13. *  “I need to protect sensitive data in my cloud” •  Ensure  sensiBve  data  and  encrypBon  keys  are  never  stored     in  plain  text  or  exposed  publicly     •  Maintain  control  of  your  encrypBon  keys  and  your  regulatory   data  to  ensure  compliance   *  “Help me secure my big data infrastructure” •  Harden  Big  Data  infrastructures  that  have  weak  security  and  no     cryptographic  protecBon   •  Maintain  Big  Data  performance  and  availability   What We Hear From Our Customers
  • 14. *  “I need to maintain control of my keys” •  Manage  the  rapid  growth  of  key,  cerBficate,  token,  and  object   proliferaBon  caused  by  cloud/Big  Data  adopBon   •  Consolidate  IT  security  objects  and  bring  them  under  a     consistent  set  of  controls  and  policies   *  “My cloud provider should not have access to my data” •  Deploy  mulB-­‐factor  authenBcaBon  in  the  cloud   •  Establish  and  enforce  robust  access  controls  for  sensiBve  objects   What We Hear From Our Customers
  • 15. *  zNcrypt™   •  Provides  transparent  data  encrypBon  to  secure  Big  Data  (NoSQL  and  SQL  open   source  plaRorms)  in  the  cloud  or  on  premises.     *  zTrustee™   •  A  soUware  only  “virtual  HSM”  to  manage  and  secure  ANY  opaque  IT  object.     Policy-­‐driven  vault  for  securing  and  managing  an  organizaBon’s  most  important   IT  security  items  (cryptographic  keys,  tokens,  cerBficates,  configs,  and  more).       *  zOps™   •  A  single,  unified  console  for  monitoring  Gazzang  acBons  and  their  impact  on  the   “Big  Data  stack”(security  threats,  cloud  integrity,  IO,  performance,  machine   behavior  and  more).     The Gazzang Solution Suite
  • 16. zNcrypt sits between the file system and any database, application or service running on Linux to encrypt data before written to the disk. •  AES-256 encryption •  Process-based ACLs •  Multiple encrypted mount points •  Requires no changes to app, data or storage •  Enterprise scalability •  Packaged support for Cassandra, Hadoop, MongoDB, MySQL, PostgreSQL, Riak Gazzang File Level Encryption
  • 17. Securing “opaque objects” with policy management and adaptive “trustee” authorization capabilities Gazzang zTrustee™ - Controlling Authentication Objects •  Trustee  votes   •  Time  to  live   •  Retrieval  limits   •  Single-­‐use  URL   •  Client  permissions   Trustees  must  approve  release  of  objects  in   accordance  with  the  deposit  policy   API  Library   •  Java   •  Python   •  C  library  
  • 18. *  Install zNcrypt •  Package  managers  (yum,  apt-­‐get)  and  Chef   *  Create master encryption key •  Passphrase  method  (opBonal  “split  security”)   •  RSA  Key  file  method   *  Create ACLs •  Simple  command-­‐lines  (ALLOW/DENY  style)   •  Almost  any  process  or  script  allowed:   •  Virtually  any  applicaBon,  process  or  script:    Apache,  Tomcat,  MongoDB,  MySQL,  backup   soUware,  document  management,  etc   *  Encrypt data •  Simple  command  line  calls,  down  to  the  file  level   Ease of Deployment
  • 19. Chef – Opscode Community
  • 21. *  Headquartered in Austin, TX *  Focused on high-performance data encryption and key management *  Specialize in securing cloud and big data environments: Apache Cassandra and Hadoop *  Serve a variety of verticals: Health care, retail, government, education, IT About Gazzang
  • 22. *  Visit www.gazzang.com/csummitsf •  Take  our  survey  for  a  chance  to  win  a  $200  Amex   •  Download  our  “Securing  Cassandra”  white  paper   •  Watch  the  Gazzang-­‐DataStax  security  webinar   •  Stop  by  our  booth  for  a  chance  to  win  a  GoPro  camera   *  Email sales@gazzang.com to set up a demo Thank You