SlideShare une entreprise Scribd logo
1  sur  43
Matt Kennedy,
Sr. Product Manager - DataStax
Best Practices for Securing DataStax Enterprise
Finding the right analogy…
© DataStax, All Rights Reserved. 2
© DataStax, All Rights Reserved. 3
https://
© DataStax, All Rights Reserved. 4
https://upload.wikimedia.org/wikipedia/commons/0/04/Pound_layer_cake.jpg© User:Colin / Wikimedia Commons / CC BY-SA 3.0
© DataStax, All Rights Reserved. 5
Crying Child Image
© DataStax, All Rights Reserved. 6
mobile/
browser
app-tier
https
driver
app-code
driver
app-code
driver
app-code
[Internet]
[DBA-VPN]
DevCenter
[App-DMZ]
DC1
[DB-Net]
DC2
[Corp-Net]
cql+tls
DSE Cluster
cql+tls
tls
1 Network Security
2 Encryption-At-Rest
3 Authentication, Authorization & Auditing
4 Search & Analytics
5 Additional Strategies
7© DataStax, All Rights Reserved.
Preparing Certificates
© DataStax, All Rights Reserved. 8
https://docs.datastax.com/en/cassandra/3.0/cassandra/configuration/secureSSLCertificates.html
Also, install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files
© DataStax, All Rights Reserved. 9
mobile/
browser
app-tier
https
driver
app-code
driver
app-code
driver
app-code
[Internet]
[DBA-VPN]
DevCenter
[App-DMZ]
DC1
[DB-Net]
DC2
[Corp-Net]
cql+tls
DSE Cluster
cql+tls
tls
End User to App Tier
© DataStax, All Rights Reserved. 10
1. Use HTTPS
2. Do your homework on user password hash storage:
http://security.blogoverflow.com/2013/09/about-secure-password-hashing/
© DataStax, All Rights Reserved. 11
mobile/
browser
app-tier
https
driver
app-code
driver
app-code
driver
app-code
[Internet]
[DBA-VPN]
DevCenter
[App-DMZ]
DC1
[DB-Net]
DC2
[Corp-Net]
cql+tls
DSE Cluster
cql+tls
tls
Node to Node Encryption
© DataStax, All Rights Reserved. 12
server_encryption_options:
internode_encryption: [none|rack|dc|all]
keystore: resources/dse/conf/.keystore
keystore_password: <keystore password>
truststore: resources/dse/conf/.truststore
truststore_password: <truststore password>
require_client_auth: <true or false>
cassandra.yaml
By default: TLS_RSA_WITH_AES_128_CBC_SHA
© DataStax, All Rights Reserved. 13
IT SETS UP THE JAVA
PKI CERT STUFF FOR
YOU!!!
© DataStax, All Rights Reserved. 14
mobile/
browser
app-tier
https
driver
app-code
driver
app-code
driver
app-code
[Internet]
[DBA-VPN]
DevCenter
[App-DMZ]
DC1
[DB-Net]
DC2
[Corp-Net]
cql+tls
DSE Cluster
cql+tls
tls
Client to Node Encryption
© DataStax, All Rights Reserved. 15
client_encryption_options:
enabled: true
keystore: conf/keystore.node0
keystore_password: cassandra
require_client_auth: true
truststore: conf/truststore.node0
truststore_password: cassandra
cassandra.yaml
(Server Side)
© DataStax, All Rights Reserved. 16
Client to Node Encryption (Client Side)
© DataStax, All Rights Reserved. 17
Client Docs
cqlsh https://docs.datastax.com/en/cassandra/3.0/cassandra/configuration/secureCqlshSSL.html
DevCenter https://www.datastax.com/dev/blog/how-to-connect-devcenter-to-an-ssl-enabled-cassandra-cluster
Java https://github.com/datastax/java-driver/tree/3.0/manual/ssl
Python https://datastax.github.io/python-driver/security.html
C/C++ http://datastax.github.io/cpp-driver/topics/security/ssl/
C# http://docs.datastax.com/en/latest-csharp-driver-api/html/M_Cassandra_Builder_WithSSL_1.htm
Ruby http://docs.datastax.com/en/developer/ruby-driver/3.0/features/security/ssl_encryption/
1 Network Security
2 Encryption-At-Rest
3 Authentication, Authorization & Auditing
4 Search & Analytics
5 Additional Strategies
18© DataStax, All Rights Reserved.
© DataStax, All Rights Reserved. 19
mobile/
browser
app-tier
https
driver
app-code
driver
app-code
driver
app-code
[Internet]
[DBA VPN]
DevCenter
[App-DMZ]
DC1
[DB-Net]
DC2
[Corp-Net]
DSE Cluster
• Transparent Data Encryption (TDE)
© DataStax, All Rights Reserved. 20
• KMIP – Key Management Interoperability Protocol
• Standards based OASIS protocol
• Stores encryption keys off server
• DataStax Tests the Vormetric KMIP server
• Two categories of data to encrypt: system files & user data
• System: system_info_encryption in dse.yaml
• System Tables
• Commitlog
• Hints
• User: Configured on a per-table basis
• SSTables
• Solr Indexes
• Solr Commitlog
© DataStax, All Rights Reserved. 21
! SSTable Index files are not yet covered by TDE.
Partition keys are present in plaintext.
This would be a reason to consider full disk encryption.
1 Network Security
2 Encryption-At-Rest
3 Authentication, Authorization & Auditing
4 Search & Analytics
5 Additional Strategies
22© DataStax, All Rights Reserved.
Authentication, Authorization & Auditing
© DataStax, All Rights Reserved. 23
• Authentication: Who are you?
• Authorization: What are you allowed to do?
• Auditing: What have you done?!
Authentication
© DataStax, All Rights Reserved. 24
© DataStax, All Rights Reserved. 25
Role Based Access Control (RBAC)
RBAC introduced to OSS C* in v 2.2
RBAC is a mainstay of conventional database security
Roles are assigned database permissions, users are assigned to roles to obtain permissions
© 2016 DataStax, All Rights Reserved. Company Confidential
admin
alice
bob
bi
bob
charlie
role names
users
RBAC + LDAP in DSE 5.0
Roles
admin
bi
app
{alice: hasRole:admin}
{bob: hasRole:admin,bi}
{charlie: hasRole:bi}
LDAP
What are the user’s roles?
Auditing
© DataStax, All Rights Reserved. 28
• Records user activity in the cluster
• Per-node config
• Can log to a logback file or a table (optionally w/TTL)
Auditing Search
© DataStax, All Rights Reserved. 29
<filter-mapping>
<filter-name>DseAuditLoggingFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
Uncomment in the Tomcat web.xml
1 Network Security
2 Encryption-At-Rest
3 Authentication, Authorization & Auditing
4 Search & Analytics
5 Additional Strategies
30© DataStax, All Rights Reserved.
One more thing about Search…
• Use the CQL interface to search for secured clusters
• The HTTP endpoint has a known performance
degradation when authentication is in use
• The above isn’t a huge problem for administrative usage,
but could be a problem for application usage
© DataStax, All Rights Reserved. 31
Analytics
• In dse.yaml, set:
• spark_security_enabled (Authentication)
• spark_security_encryption_enabled
• Authentication uses Spark shared secrets
• https://spark.apache.org/docs/1.6.1/security.html
• Jacek’s Talk: Thursday@10AM Advanced DSE analytics client configuration
• In DSE, the shared secret is propagated through C* tables.
© DataStax, All Rights Reserved. 32
© DataStax, All Rights Reserved. 33
! Securing the Spark WebUI is not yet natively supported in DSE.
DSE-FS communication and blocks are not encrypted.
1 Network Security
2 Encryption-At-Rest
3 Authentication, Authorization & Auditing
4 Search & Analytics
5 Additional Strategies
34© DataStax, All Rights Reserved.
Additional Strategies
• There will always be more complex security requirements than your
database supports
• We are working to close the gap, but new security models are
always being developed
• If you can’t wait, build additional security in the app-tier
• Example: Attribute Based Access Control (ABAC)
© DataStax, All Rights Reserved. 35
Example ABAC Requirements
• Users have different access levels
• Each column may have a different access level
• Some columns may have “need to know” requirements
• These requirements can be time-boxed and geo-fenced
• Column visibility should be based on:
• User access level > column level
• User’s physical location
• User’s “need to know” at a given time of day (during shift, or not?)
© DataStax, All Rights Reserved. 36
Final Hints and Reminders
• Don’t forget your history files – cqlsh has a history file!
• Bash can be configured to skip recording commands that have a leading
space. This can be a huge convenience if you have to pass sensitive
info.
• chmod 700 is your friend
• Be cognizant of process listings
• Belts AND Suspenders, you can never be too cautious
© DataStax, All Rights Reserved. 37
UnifiedAuth in DSE 5.0
© DataStax, All Rights Reserved. 39
DSEAuthenticator
Human users have their identities stored in
Directory Servers (LDAP & Active Directory).
Application users often aren’t real people
(mobileappuser, webtieruser, device_source).
Flexibility
Table Design Style
Content Content Content Content Content Content
Content Content Content Content Content Content
Content Content Content Content Content Content
Content Content Content Content Content Content
Content Content Content Content Content Content
Content Content Content Content Content Content
Content Content Content Content Content Content
Content Content Content Content Content Content
© DataStax, All Rights Reserved. 40
© DataStax, All Rights Reserved. 42
© DataStax, All Rights Reserved. 43

Contenu connexe

Tendances

Cassandra Tuning - above and beyond
Cassandra Tuning - above and beyondCassandra Tuning - above and beyond
Cassandra Tuning - above and beyondMatija Gobec
 
Processing 50,000 events per second with Cassandra and Spark
Processing 50,000 events per second with Cassandra and SparkProcessing 50,000 events per second with Cassandra and Spark
Processing 50,000 events per second with Cassandra and SparkBen Slater
 
Understanding DSE Search by Matt Stump
Understanding DSE Search by Matt StumpUnderstanding DSE Search by Matt Stump
Understanding DSE Search by Matt StumpDataStax
 
DataStax | DSE Search 5.0 and Beyond (Nick Panahi & Ariel Weisberg) | Cassand...
DataStax | DSE Search 5.0 and Beyond (Nick Panahi & Ariel Weisberg) | Cassand...DataStax | DSE Search 5.0 and Beyond (Nick Panahi & Ariel Weisberg) | Cassand...
DataStax | DSE Search 5.0 and Beyond (Nick Panahi & Ariel Weisberg) | Cassand...DataStax
 
Managing Cassandra at Scale by Al Tobey
Managing Cassandra at Scale by Al TobeyManaging Cassandra at Scale by Al Tobey
Managing Cassandra at Scale by Al TobeyDataStax Academy
 
Sanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansSanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansPeter Clapham
 
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax EnterpriseCassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax EnterpriseDataStax Academy
 
A Detailed Look At cassandra.yaml (Edward Capriolo, The Last Pickle) | Cassan...
A Detailed Look At cassandra.yaml (Edward Capriolo, The Last Pickle) | Cassan...A Detailed Look At cassandra.yaml (Edward Capriolo, The Last Pickle) | Cassan...
A Detailed Look At cassandra.yaml (Edward Capriolo, The Last Pickle) | Cassan...DataStax
 
DataStax | DataStax Tools for Developers (Alex Popescu) | Cassandra Summit 2016
DataStax | DataStax Tools for Developers (Alex Popescu) | Cassandra Summit 2016DataStax | DataStax Tools for Developers (Alex Popescu) | Cassandra Summit 2016
DataStax | DataStax Tools for Developers (Alex Popescu) | Cassandra Summit 2016DataStax
 
Building a Multi-Region Cluster at Target (Aaron Ploetz, Target) | Cassandra ...
Building a Multi-Region Cluster at Target (Aaron Ploetz, Target) | Cassandra ...Building a Multi-Region Cluster at Target (Aaron Ploetz, Target) | Cassandra ...
Building a Multi-Region Cluster at Target (Aaron Ploetz, Target) | Cassandra ...DataStax
 
Highly available, scalable and secure data with Cassandra and DataStax Enterp...
Highly available, scalable and secure data with Cassandra and DataStax Enterp...Highly available, scalable and secure data with Cassandra and DataStax Enterp...
Highly available, scalable and secure data with Cassandra and DataStax Enterp...Johnny Miller
 
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...DataStax
 
Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...
Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...
Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...DataStax
 
Introducing SciaaS @ Sanger
Introducing SciaaS @ SangerIntroducing SciaaS @ Sanger
Introducing SciaaS @ SangerPeter Clapham
 
Load testing Cassandra applications
Load testing Cassandra applicationsLoad testing Cassandra applications
Load testing Cassandra applicationsBen Slater
 
Troubleshooting Cassandra (J.B. Langston, DataStax) | C* Summit 2016
Troubleshooting Cassandra (J.B. Langston, DataStax) | C* Summit 2016Troubleshooting Cassandra (J.B. Langston, DataStax) | C* Summit 2016
Troubleshooting Cassandra (J.B. Langston, DataStax) | C* Summit 2016DataStax
 
How to size up an Apache Cassandra cluster (Training)
How to size up an Apache Cassandra cluster (Training)How to size up an Apache Cassandra cluster (Training)
How to size up an Apache Cassandra cluster (Training)DataStax Academy
 

Tendances (20)

Cassandra Tuning - above and beyond
Cassandra Tuning - above and beyondCassandra Tuning - above and beyond
Cassandra Tuning - above and beyond
 
Processing 50,000 events per second with Cassandra and Spark
Processing 50,000 events per second with Cassandra and SparkProcessing 50,000 events per second with Cassandra and Spark
Processing 50,000 events per second with Cassandra and Spark
 
Understanding DSE Search by Matt Stump
Understanding DSE Search by Matt StumpUnderstanding DSE Search by Matt Stump
Understanding DSE Search by Matt Stump
 
DataStax | DSE Search 5.0 and Beyond (Nick Panahi & Ariel Weisberg) | Cassand...
DataStax | DSE Search 5.0 and Beyond (Nick Panahi & Ariel Weisberg) | Cassand...DataStax | DSE Search 5.0 and Beyond (Nick Panahi & Ariel Weisberg) | Cassand...
DataStax | DSE Search 5.0 and Beyond (Nick Panahi & Ariel Weisberg) | Cassand...
 
Managing Cassandra at Scale by Al Tobey
Managing Cassandra at Scale by Al TobeyManaging Cassandra at Scale by Al Tobey
Managing Cassandra at Scale by Al Tobey
 
Sanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansSanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticians
 
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax EnterpriseCassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
 
A Detailed Look At cassandra.yaml (Edward Capriolo, The Last Pickle) | Cassan...
A Detailed Look At cassandra.yaml (Edward Capriolo, The Last Pickle) | Cassan...A Detailed Look At cassandra.yaml (Edward Capriolo, The Last Pickle) | Cassan...
A Detailed Look At cassandra.yaml (Edward Capriolo, The Last Pickle) | Cassan...
 
DataStax | DataStax Tools for Developers (Alex Popescu) | Cassandra Summit 2016
DataStax | DataStax Tools for Developers (Alex Popescu) | Cassandra Summit 2016DataStax | DataStax Tools for Developers (Alex Popescu) | Cassandra Summit 2016
DataStax | DataStax Tools for Developers (Alex Popescu) | Cassandra Summit 2016
 
Building a Multi-Region Cluster at Target (Aaron Ploetz, Target) | Cassandra ...
Building a Multi-Region Cluster at Target (Aaron Ploetz, Target) | Cassandra ...Building a Multi-Region Cluster at Target (Aaron Ploetz, Target) | Cassandra ...
Building a Multi-Region Cluster at Target (Aaron Ploetz, Target) | Cassandra ...
 
Highly available, scalable and secure data with Cassandra and DataStax Enterp...
Highly available, scalable and secure data with Cassandra and DataStax Enterp...Highly available, scalable and secure data with Cassandra and DataStax Enterp...
Highly available, scalable and secure data with Cassandra and DataStax Enterp...
 
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
 
Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...
Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...
Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...
 
Introducing SciaaS @ Sanger
Introducing SciaaS @ SangerIntroducing SciaaS @ Sanger
Introducing SciaaS @ Sanger
 
Load testing Cassandra applications
Load testing Cassandra applicationsLoad testing Cassandra applications
Load testing Cassandra applications
 
AppFabric Velocity
AppFabric VelocityAppFabric Velocity
AppFabric Velocity
 
Troubleshooting Cassandra (J.B. Langston, DataStax) | C* Summit 2016
Troubleshooting Cassandra (J.B. Langston, DataStax) | C* Summit 2016Troubleshooting Cassandra (J.B. Langston, DataStax) | C* Summit 2016
Troubleshooting Cassandra (J.B. Langston, DataStax) | C* Summit 2016
 
Clustering van IT-componenten
Clustering van IT-componentenClustering van IT-componenten
Clustering van IT-componenten
 
Apache cassandra v4.0
Apache cassandra v4.0Apache cassandra v4.0
Apache cassandra v4.0
 
How to size up an Apache Cassandra cluster (Training)
How to size up an Apache Cassandra cluster (Training)How to size up an Apache Cassandra cluster (Training)
How to size up an Apache Cassandra cluster (Training)
 

Similaire à DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | Cassandra Summit 2016

Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityGeorgi Kodinov
 
ppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdfppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdfcamyla81
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseEDB
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationGerardo Pardo-Castellote
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...Cloudera, Inc.
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
How to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
How to Build Multi-disciplinary Analytics Applications on a Shared Data PlatformHow to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
How to Build Multi-disciplinary Analytics Applications on a Shared Data PlatformCloudera, Inc.
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB DeploymentMongoDB
 
Druid and Hive Together : Use Cases and Best Practices
Druid and Hive Together : Use Cases and Best PracticesDruid and Hive Together : Use Cases and Best Practices
Druid and Hive Together : Use Cases and Best PracticesDataWorks Summit
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Andrejs Prokopjevs
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingDLT Solutions
 
Big Data Fabric: A Necessity For Any Successful Big Data Initiative
Big Data Fabric: A Necessity For Any Successful Big Data InitiativeBig Data Fabric: A Necessity For Any Successful Big Data Initiative
Big Data Fabric: A Necessity For Any Successful Big Data InitiativeDenodo
 
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopBelgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopDenodo
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesDataStax
 
Logical Data Fabric and Industry-Focused Solutions by IQZ Systems
Logical Data Fabric and Industry-Focused Solutions by IQZ SystemsLogical Data Fabric and Industry-Focused Solutions by IQZ Systems
Logical Data Fabric and Industry-Focused Solutions by IQZ SystemsDenodo
 

Similaire à DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | Cassandra Summit 2016 (20)

Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
 
ppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdfppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdf
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway Specification
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
How to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
How to Build Multi-disciplinary Analytics Applications on a Shared Data PlatformHow to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
How to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Druid and Hive Together : Use Cases and Best Practices
Druid and Hive Together : Use Cases and Best PracticesDruid and Hive Together : Use Cases and Best Practices
Druid and Hive Together : Use Cases and Best Practices
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
 
Big Data Fabric: A Necessity For Any Successful Big Data Initiative
Big Data Fabric: A Necessity For Any Successful Big Data InitiativeBig Data Fabric: A Necessity For Any Successful Big Data Initiative
Big Data Fabric: A Necessity For Any Successful Big Data Initiative
 
Database Options
Database OptionsDatabase Options
Database Options
 
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopBelgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 
Logical Data Fabric and Industry-Focused Solutions by IQZ Systems
Logical Data Fabric and Industry-Focused Solutions by IQZ SystemsLogical Data Fabric and Industry-Focused Solutions by IQZ Systems
Logical Data Fabric and Industry-Focused Solutions by IQZ Systems
 

Plus de DataStax

Is Your Enterprise Ready to Shine This Holiday Season?
Is Your Enterprise Ready to Shine This Holiday Season?Is Your Enterprise Ready to Shine This Holiday Season?
Is Your Enterprise Ready to Shine This Holiday Season?DataStax
 
Designing Fault-Tolerant Applications with DataStax Enterprise and Apache Cas...
Designing Fault-Tolerant Applications with DataStax Enterprise and Apache Cas...Designing Fault-Tolerant Applications with DataStax Enterprise and Apache Cas...
Designing Fault-Tolerant Applications with DataStax Enterprise and Apache Cas...DataStax
 
Running DataStax Enterprise in VMware Cloud and Hybrid Environments
Running DataStax Enterprise in VMware Cloud and Hybrid EnvironmentsRunning DataStax Enterprise in VMware Cloud and Hybrid Environments
Running DataStax Enterprise in VMware Cloud and Hybrid EnvironmentsDataStax
 
Best Practices for Getting to Production with DataStax Enterprise Graph
Best Practices for Getting to Production with DataStax Enterprise GraphBest Practices for Getting to Production with DataStax Enterprise Graph
Best Practices for Getting to Production with DataStax Enterprise GraphDataStax
 
Webinar | Data Management for Hybrid and Multi-Cloud: A Four-Step Journey
Webinar | Data Management for Hybrid and Multi-Cloud: A Four-Step JourneyWebinar | Data Management for Hybrid and Multi-Cloud: A Four-Step Journey
Webinar | Data Management for Hybrid and Multi-Cloud: A Four-Step JourneyDataStax
 
Webinar | How to Understand Apache Cassandra™ Performance Through Read/Writ...
Webinar  |  How to Understand Apache Cassandra™ Performance Through Read/Writ...Webinar  |  How to Understand Apache Cassandra™ Performance Through Read/Writ...
Webinar | How to Understand Apache Cassandra™ Performance Through Read/Writ...DataStax
 
Webinar | Better Together: Apache Cassandra and Apache Kafka
Webinar  |  Better Together: Apache Cassandra and Apache KafkaWebinar  |  Better Together: Apache Cassandra and Apache Kafka
Webinar | Better Together: Apache Cassandra and Apache KafkaDataStax
 
Top 10 Best Practices for Apache Cassandra and DataStax Enterprise
Top 10 Best Practices for Apache Cassandra and DataStax EnterpriseTop 10 Best Practices for Apache Cassandra and DataStax Enterprise
Top 10 Best Practices for Apache Cassandra and DataStax EnterpriseDataStax
 
Introduction to Apache Cassandra™ + What’s New in 4.0
Introduction to Apache Cassandra™ + What’s New in 4.0Introduction to Apache Cassandra™ + What’s New in 4.0
Introduction to Apache Cassandra™ + What’s New in 4.0DataStax
 
Webinar: How Active Everywhere Database Architecture Accelerates Hybrid Cloud...
Webinar: How Active Everywhere Database Architecture Accelerates Hybrid Cloud...Webinar: How Active Everywhere Database Architecture Accelerates Hybrid Cloud...
Webinar: How Active Everywhere Database Architecture Accelerates Hybrid Cloud...DataStax
 
Designing a Distributed Cloud Database for Dummies
Designing a Distributed Cloud Database for DummiesDesigning a Distributed Cloud Database for Dummies
Designing a Distributed Cloud Database for DummiesDataStax
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudDataStax
 
How to Evaluate Cloud Databases for eCommerce
How to Evaluate Cloud Databases for eCommerceHow to Evaluate Cloud Databases for eCommerce
How to Evaluate Cloud Databases for eCommerceDataStax
 
Webinar: DataStax Enterprise 6: 10 Ways to Multiply the Power of Apache Cassa...
Webinar: DataStax Enterprise 6: 10 Ways to Multiply the Power of Apache Cassa...Webinar: DataStax Enterprise 6: 10 Ways to Multiply the Power of Apache Cassa...
Webinar: DataStax Enterprise 6: 10 Ways to Multiply the Power of Apache Cassa...DataStax
 
Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...
Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...
Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...DataStax
 
Webinar - Real-Time Customer Experience for the Right-Now Enterprise featurin...
Webinar - Real-Time Customer Experience for the Right-Now Enterprise featurin...Webinar - Real-Time Customer Experience for the Right-Now Enterprise featurin...
Webinar - Real-Time Customer Experience for the Right-Now Enterprise featurin...DataStax
 
Datastax - The Architect's guide to customer experience (CX)
Datastax - The Architect's guide to customer experience (CX)Datastax - The Architect's guide to customer experience (CX)
Datastax - The Architect's guide to customer experience (CX)DataStax
 
An Operational Data Layer is Critical for Transformative Banking Applications
An Operational Data Layer is Critical for Transformative Banking ApplicationsAn Operational Data Layer is Critical for Transformative Banking Applications
An Operational Data Layer is Critical for Transformative Banking ApplicationsDataStax
 
Becoming a Customer-Centric Enterprise Via Real-Time Data and Design Thinking
Becoming a Customer-Centric Enterprise Via Real-Time Data and Design ThinkingBecoming a Customer-Centric Enterprise Via Real-Time Data and Design Thinking
Becoming a Customer-Centric Enterprise Via Real-Time Data and Design ThinkingDataStax
 
Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionDataStax
 

Plus de DataStax (20)

Is Your Enterprise Ready to Shine This Holiday Season?
Is Your Enterprise Ready to Shine This Holiday Season?Is Your Enterprise Ready to Shine This Holiday Season?
Is Your Enterprise Ready to Shine This Holiday Season?
 
Designing Fault-Tolerant Applications with DataStax Enterprise and Apache Cas...
Designing Fault-Tolerant Applications with DataStax Enterprise and Apache Cas...Designing Fault-Tolerant Applications with DataStax Enterprise and Apache Cas...
Designing Fault-Tolerant Applications with DataStax Enterprise and Apache Cas...
 
Running DataStax Enterprise in VMware Cloud and Hybrid Environments
Running DataStax Enterprise in VMware Cloud and Hybrid EnvironmentsRunning DataStax Enterprise in VMware Cloud and Hybrid Environments
Running DataStax Enterprise in VMware Cloud and Hybrid Environments
 
Best Practices for Getting to Production with DataStax Enterprise Graph
Best Practices for Getting to Production with DataStax Enterprise GraphBest Practices for Getting to Production with DataStax Enterprise Graph
Best Practices for Getting to Production with DataStax Enterprise Graph
 
Webinar | Data Management for Hybrid and Multi-Cloud: A Four-Step Journey
Webinar | Data Management for Hybrid and Multi-Cloud: A Four-Step JourneyWebinar | Data Management for Hybrid and Multi-Cloud: A Four-Step Journey
Webinar | Data Management for Hybrid and Multi-Cloud: A Four-Step Journey
 
Webinar | How to Understand Apache Cassandra™ Performance Through Read/Writ...
Webinar  |  How to Understand Apache Cassandra™ Performance Through Read/Writ...Webinar  |  How to Understand Apache Cassandra™ Performance Through Read/Writ...
Webinar | How to Understand Apache Cassandra™ Performance Through Read/Writ...
 
Webinar | Better Together: Apache Cassandra and Apache Kafka
Webinar  |  Better Together: Apache Cassandra and Apache KafkaWebinar  |  Better Together: Apache Cassandra and Apache Kafka
Webinar | Better Together: Apache Cassandra and Apache Kafka
 
Top 10 Best Practices for Apache Cassandra and DataStax Enterprise
Top 10 Best Practices for Apache Cassandra and DataStax EnterpriseTop 10 Best Practices for Apache Cassandra and DataStax Enterprise
Top 10 Best Practices for Apache Cassandra and DataStax Enterprise
 
Introduction to Apache Cassandra™ + What’s New in 4.0
Introduction to Apache Cassandra™ + What’s New in 4.0Introduction to Apache Cassandra™ + What’s New in 4.0
Introduction to Apache Cassandra™ + What’s New in 4.0
 
Webinar: How Active Everywhere Database Architecture Accelerates Hybrid Cloud...
Webinar: How Active Everywhere Database Architecture Accelerates Hybrid Cloud...Webinar: How Active Everywhere Database Architecture Accelerates Hybrid Cloud...
Webinar: How Active Everywhere Database Architecture Accelerates Hybrid Cloud...
 
Designing a Distributed Cloud Database for Dummies
Designing a Distributed Cloud Database for DummiesDesigning a Distributed Cloud Database for Dummies
Designing a Distributed Cloud Database for Dummies
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
 
How to Evaluate Cloud Databases for eCommerce
How to Evaluate Cloud Databases for eCommerceHow to Evaluate Cloud Databases for eCommerce
How to Evaluate Cloud Databases for eCommerce
 
Webinar: DataStax Enterprise 6: 10 Ways to Multiply the Power of Apache Cassa...
Webinar: DataStax Enterprise 6: 10 Ways to Multiply the Power of Apache Cassa...Webinar: DataStax Enterprise 6: 10 Ways to Multiply the Power of Apache Cassa...
Webinar: DataStax Enterprise 6: 10 Ways to Multiply the Power of Apache Cassa...
 
Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...
Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...
Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...
 
Webinar - Real-Time Customer Experience for the Right-Now Enterprise featurin...
Webinar - Real-Time Customer Experience for the Right-Now Enterprise featurin...Webinar - Real-Time Customer Experience for the Right-Now Enterprise featurin...
Webinar - Real-Time Customer Experience for the Right-Now Enterprise featurin...
 
Datastax - The Architect's guide to customer experience (CX)
Datastax - The Architect's guide to customer experience (CX)Datastax - The Architect's guide to customer experience (CX)
Datastax - The Architect's guide to customer experience (CX)
 
An Operational Data Layer is Critical for Transformative Banking Applications
An Operational Data Layer is Critical for Transformative Banking ApplicationsAn Operational Data Layer is Critical for Transformative Banking Applications
An Operational Data Layer is Critical for Transformative Banking Applications
 
Becoming a Customer-Centric Enterprise Via Real-Time Data and Design Thinking
Becoming a Customer-Centric Enterprise Via Real-Time Data and Design ThinkingBecoming a Customer-Centric Enterprise Via Real-Time Data and Design Thinking
Becoming a Customer-Centric Enterprise Via Real-Time Data and Design Thinking
 
Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud Detection
 

Dernier

10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 

Dernier (20)

10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 

DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | Cassandra Summit 2016

  • 1. Matt Kennedy, Sr. Product Manager - DataStax Best Practices for Securing DataStax Enterprise
  • 2. Finding the right analogy… © DataStax, All Rights Reserved. 2
  • 3. © DataStax, All Rights Reserved. 3 https://
  • 4. © DataStax, All Rights Reserved. 4 https://upload.wikimedia.org/wikipedia/commons/0/04/Pound_layer_cake.jpg© User:Colin / Wikimedia Commons / CC BY-SA 3.0
  • 5. © DataStax, All Rights Reserved. 5 Crying Child Image
  • 6. © DataStax, All Rights Reserved. 6 mobile/ browser app-tier https driver app-code driver app-code driver app-code [Internet] [DBA-VPN] DevCenter [App-DMZ] DC1 [DB-Net] DC2 [Corp-Net] cql+tls DSE Cluster cql+tls tls
  • 7. 1 Network Security 2 Encryption-At-Rest 3 Authentication, Authorization & Auditing 4 Search & Analytics 5 Additional Strategies 7© DataStax, All Rights Reserved.
  • 8. Preparing Certificates © DataStax, All Rights Reserved. 8 https://docs.datastax.com/en/cassandra/3.0/cassandra/configuration/secureSSLCertificates.html Also, install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files
  • 9. © DataStax, All Rights Reserved. 9 mobile/ browser app-tier https driver app-code driver app-code driver app-code [Internet] [DBA-VPN] DevCenter [App-DMZ] DC1 [DB-Net] DC2 [Corp-Net] cql+tls DSE Cluster cql+tls tls
  • 10. End User to App Tier © DataStax, All Rights Reserved. 10 1. Use HTTPS 2. Do your homework on user password hash storage: http://security.blogoverflow.com/2013/09/about-secure-password-hashing/
  • 11. © DataStax, All Rights Reserved. 11 mobile/ browser app-tier https driver app-code driver app-code driver app-code [Internet] [DBA-VPN] DevCenter [App-DMZ] DC1 [DB-Net] DC2 [Corp-Net] cql+tls DSE Cluster cql+tls tls
  • 12. Node to Node Encryption © DataStax, All Rights Reserved. 12 server_encryption_options: internode_encryption: [none|rack|dc|all] keystore: resources/dse/conf/.keystore keystore_password: <keystore password> truststore: resources/dse/conf/.truststore truststore_password: <truststore password> require_client_auth: <true or false> cassandra.yaml By default: TLS_RSA_WITH_AES_128_CBC_SHA
  • 13. © DataStax, All Rights Reserved. 13 IT SETS UP THE JAVA PKI CERT STUFF FOR YOU!!!
  • 14. © DataStax, All Rights Reserved. 14 mobile/ browser app-tier https driver app-code driver app-code driver app-code [Internet] [DBA-VPN] DevCenter [App-DMZ] DC1 [DB-Net] DC2 [Corp-Net] cql+tls DSE Cluster cql+tls tls
  • 15. Client to Node Encryption © DataStax, All Rights Reserved. 15 client_encryption_options: enabled: true keystore: conf/keystore.node0 keystore_password: cassandra require_client_auth: true truststore: conf/truststore.node0 truststore_password: cassandra cassandra.yaml (Server Side)
  • 16. © DataStax, All Rights Reserved. 16
  • 17. Client to Node Encryption (Client Side) © DataStax, All Rights Reserved. 17 Client Docs cqlsh https://docs.datastax.com/en/cassandra/3.0/cassandra/configuration/secureCqlshSSL.html DevCenter https://www.datastax.com/dev/blog/how-to-connect-devcenter-to-an-ssl-enabled-cassandra-cluster Java https://github.com/datastax/java-driver/tree/3.0/manual/ssl Python https://datastax.github.io/python-driver/security.html C/C++ http://datastax.github.io/cpp-driver/topics/security/ssl/ C# http://docs.datastax.com/en/latest-csharp-driver-api/html/M_Cassandra_Builder_WithSSL_1.htm Ruby http://docs.datastax.com/en/developer/ruby-driver/3.0/features/security/ssl_encryption/
  • 18. 1 Network Security 2 Encryption-At-Rest 3 Authentication, Authorization & Auditing 4 Search & Analytics 5 Additional Strategies 18© DataStax, All Rights Reserved.
  • 19. © DataStax, All Rights Reserved. 19 mobile/ browser app-tier https driver app-code driver app-code driver app-code [Internet] [DBA VPN] DevCenter [App-DMZ] DC1 [DB-Net] DC2 [Corp-Net] DSE Cluster
  • 20. • Transparent Data Encryption (TDE) © DataStax, All Rights Reserved. 20 • KMIP – Key Management Interoperability Protocol • Standards based OASIS protocol • Stores encryption keys off server • DataStax Tests the Vormetric KMIP server • Two categories of data to encrypt: system files & user data • System: system_info_encryption in dse.yaml • System Tables • Commitlog • Hints • User: Configured on a per-table basis • SSTables • Solr Indexes • Solr Commitlog
  • 21. © DataStax, All Rights Reserved. 21 ! SSTable Index files are not yet covered by TDE. Partition keys are present in plaintext. This would be a reason to consider full disk encryption.
  • 22. 1 Network Security 2 Encryption-At-Rest 3 Authentication, Authorization & Auditing 4 Search & Analytics 5 Additional Strategies 22© DataStax, All Rights Reserved.
  • 23. Authentication, Authorization & Auditing © DataStax, All Rights Reserved. 23 • Authentication: Who are you? • Authorization: What are you allowed to do? • Auditing: What have you done?!
  • 24. Authentication © DataStax, All Rights Reserved. 24
  • 25. © DataStax, All Rights Reserved. 25
  • 26. Role Based Access Control (RBAC) RBAC introduced to OSS C* in v 2.2 RBAC is a mainstay of conventional database security Roles are assigned database permissions, users are assigned to roles to obtain permissions © 2016 DataStax, All Rights Reserved. Company Confidential admin alice bob bi bob charlie role names users
  • 27. RBAC + LDAP in DSE 5.0 Roles admin bi app {alice: hasRole:admin} {bob: hasRole:admin,bi} {charlie: hasRole:bi} LDAP What are the user’s roles?
  • 28. Auditing © DataStax, All Rights Reserved. 28 • Records user activity in the cluster • Per-node config • Can log to a logback file or a table (optionally w/TTL)
  • 29. Auditing Search © DataStax, All Rights Reserved. 29 <filter-mapping> <filter-name>DseAuditLoggingFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> Uncomment in the Tomcat web.xml
  • 30. 1 Network Security 2 Encryption-At-Rest 3 Authentication, Authorization & Auditing 4 Search & Analytics 5 Additional Strategies 30© DataStax, All Rights Reserved.
  • 31. One more thing about Search… • Use the CQL interface to search for secured clusters • The HTTP endpoint has a known performance degradation when authentication is in use • The above isn’t a huge problem for administrative usage, but could be a problem for application usage © DataStax, All Rights Reserved. 31
  • 32. Analytics • In dse.yaml, set: • spark_security_enabled (Authentication) • spark_security_encryption_enabled • Authentication uses Spark shared secrets • https://spark.apache.org/docs/1.6.1/security.html • Jacek’s Talk: Thursday@10AM Advanced DSE analytics client configuration • In DSE, the shared secret is propagated through C* tables. © DataStax, All Rights Reserved. 32
  • 33. © DataStax, All Rights Reserved. 33 ! Securing the Spark WebUI is not yet natively supported in DSE. DSE-FS communication and blocks are not encrypted.
  • 34. 1 Network Security 2 Encryption-At-Rest 3 Authentication, Authorization & Auditing 4 Search & Analytics 5 Additional Strategies 34© DataStax, All Rights Reserved.
  • 35. Additional Strategies • There will always be more complex security requirements than your database supports • We are working to close the gap, but new security models are always being developed • If you can’t wait, build additional security in the app-tier • Example: Attribute Based Access Control (ABAC) © DataStax, All Rights Reserved. 35
  • 36. Example ABAC Requirements • Users have different access levels • Each column may have a different access level • Some columns may have “need to know” requirements • These requirements can be time-boxed and geo-fenced • Column visibility should be based on: • User access level > column level • User’s physical location • User’s “need to know” at a given time of day (during shift, or not?) © DataStax, All Rights Reserved. 36
  • 37. Final Hints and Reminders • Don’t forget your history files – cqlsh has a history file! • Bash can be configured to skip recording commands that have a leading space. This can be a huge convenience if you have to pass sensitive info. • chmod 700 is your friend • Be cognizant of process listings • Belts AND Suspenders, you can never be too cautious © DataStax, All Rights Reserved. 37
  • 38.
  • 39. UnifiedAuth in DSE 5.0 © DataStax, All Rights Reserved. 39 DSEAuthenticator Human users have their identities stored in Directory Servers (LDAP & Active Directory). Application users often aren’t real people (mobileappuser, webtieruser, device_source). Flexibility
  • 40. Table Design Style Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content Content © DataStax, All Rights Reserved. 40
  • 41.
  • 42. © DataStax, All Rights Reserved. 42
  • 43. © DataStax, All Rights Reserved. 43

Notes de l'éditeur

  1. https://commons.wikimedia.org/wiki/File:Pound_layer_cake.jpg (Public Domain)
  2. https://commons.wikimedia.org/wiki/File:Mixed_onions.jpg
  3. https://https://www.flickr.com/photos/crimfants/327861820/ Author: Crimfants (https://https://www.flickr.com/photos/crimfants) Creative Commons Attribution-ShareAlike 2.0
  4. This is what DSE 5.0 has over Open Source Cassandra. Inherits basic behavior from OSS C*. (assign users to roles in C*) Adds DSE Role Manager: Permissions assigned to roles in C* Users mapped to roles via LDAP/ActiveDirectory