SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
1
© Worldpay 2018. All rights reserved.
Not just a necessary evil, it’s good for business:
Implementing PCI DSS controls for the Hadoop
ecosystem at the UK’s largest payment processor
David Walker/Worldpay & Srikanth Venkat/HortonWorks
DataWorks Summit – Berlin
17-19 April 2018
2 © Worldpay 2018. All rights reserved.2
Session Synopsis & Your Speakers
David has over 20 years’ technical leadership expertise and
has led the development and management of complex BI
solutions, supporting technical architectures for a wide
range of organisations spanning SME start-ups to large
enterprise. In his role at Worldpay, David specialises in
developing and delivering the Enterprise Data Platform, a
multi-tenant highly secure Hadoop platform for decision
engines, analytics and reporting using his experience and
knowledge in technical architecture, data modelling, ETL
design, data quality, and metadata management. A key
aspect of David’s role also involves acting as the lynchpin
between Worldpay’s commercial and technical business
leaders by regularly engaging at the executive level. David
also manages cross-cultural teams in the analysis of
technical infrastructures and the delivery of innovative and
successful change programmes.
Srikanth Venkat is currently responsible for Security & Governance
portfolio of products at Hortonworks which include Apache Knox,
Apache Ranger, Apache Atlas, Platform wide security and
Hortonworks DataPlane Service. Prior to Hortonworks, Srikanth has
held multiple roles in areas of cloud services, marketplaces, security,
and business applications. His experience includes leadership across
Product Management, Strategy and Operations, and Technical
Architecture with broad experience in startups to global organizations
including Telefonica, Salesforce.com, Cisco-Webex, Proofpoint,
Dataguise, Trilogy Software, and Hewlett-Packard. Srikanth holds a
PhD in Engineering with a focus on Artificial Intelligence from
University of Pittsburgh, and an MBA in General Management from
Indiana University and a Masters in Global Management from
Thunderbird School of Global Management. Srikanth is a Data
Sciences & Machine Learning hobbyist and enjoys tinkering with Big
Data technologies.
For firms in the financial industry, especially within regulated organizations such as credit card processors and banks, PCI DSS compliance has become a business
and operational necessity. Although the blueprint of a PCI-compliant architecture varies from organization to organization, the mixture of modern Hadoop-based
data lakes and legacy systems are a common theme.
In this talk, we will discuss recent updates to PCI DSS and how significant portions of PCI DSS compliance controls can be achieved using open source Hadoop
security stack and technologies for the Hadoop ecosystem. We will provide a broad overview of implementing key aspects of PCI DSS standards at WorldPay such as
encryption management, data protection with anonymization, separation of duties, and deployment considerations regarding securing the Hadoop clusters at the
network layer from a practitioner’s perspective. The talk will provide patterns and practices map current Hadoop security capabilities to security controls that a PCI-
compliant environment requires.
3 © Worldpay 2017. All rights reserved.3
Transactions Daily.
On average that’s per second.
merchants using >
payment methods & currencies
in countries and in the UK we
process % of all non-cash transactions
Worldpay In (Big) Numbers
In Store
Online
Mobile
4 © Worldpay 2018. All rights reserved.4
Data Security & Regulatory Compliance are both in the news …
… but in reality they are two sides of the same coin
Payment Card
Industry Data
Security Standards*
General
Data
Protection
Regulations
Payment Services
Directive 2*
Data
Protection
Act(s)
* Other industries have
their own standards but the
principle is the same
5 © Worldpay 2018. All rights reserved.5
So why is this good for business ?
• In a digital world the success of our business
(regardless of industry) will be significantly
defined by our organisations ability to handle
and use data responsibly throughout our
business. We must protect our customers and
business partners from both data misuse and
from fraud. In short we need to be trusted by
our customers in the ways that we handle their
information
• Legal & regulatory standards are being set by
governments, regulators and industry bodies in
an attempt to set a minimum sufficient
standard to protect data subjects
6 © Worldpay 2018. All rights reserved.6
How do you develop a secure platform
• Compliance is not lip-service to doing security
– the auditing for PCI DSS is rigorous and we
have to continuously review and upgrade our
systems to maintain compliance
• Audit of and compliance with these standards
is a way of demonstrating that we have taken
appropriate steps to protect our data assets –
and in the worst case scenario it is also a way
of mitigating the financial and reputational
impact of an incident.
Either start with a blank piece of paper …. … or adopt and commit to security framework
7 © Worldpay 2018. All rights reserved.7
Todays Hadoop Environments Are The Big Targets Within Your Organisation
• If you are building or have built a large successful Hadoop deployment
that contains a large amount of your business data then you have just
created a massive target within your organisation
• PCI DSS only certifies a project or implementation
• No single product can deliver a PCI DSS compliant solution
• As the implementers of a system we are looking to get the
greatest amount of compliance by deploying the smallest number
of products and tools to do the job
8 © Worldpay 2018. All rights reserved.8
First Some Historical Context
• The Worldpay journey to build a big data platform started in April 2015
• We started with HortonWorks 2.2
• The Hortonworks Data Platform Security document did not exist
• Apache Ranger was new, Apache Atlas was a concept, HortonWorks DataPlane wasn’t even a
twinkle
• Today we are on 2.6.4 and have applied nearly every release in between
• Across the entire software product stack we did 298 patch sets and upgrades in 2017
• Besides the core platform paying for support and deploying HortonWorks SmartSense
significantly improves your security profile
• We are also interested in:
• https://workbench.cisecurity.org – Center for Internet Security
• http://owasp.org – Open Web Application Security Project
9 © Worldpay 2018. All rights reserved.9
Even your fish tank is a risk
to you data platform(s)
• PCI is about putting in place the
• Security
• Logging of activity
• Audit of that security
• Separation of duties
• Patching Cycles
• Etc.
• And then maintaining them
• We are just finishing our 2018 PCI cycle
and start planning 2019 PCI cycle in
September
10 © Worldpay 2018. All rights reserved.10
The PCI DSS 3.2 Requirements
Goals PCI DSS 3.2 Requirement
Build and Maintain a Secure Network and
Systems
1. Install and maintain a firewall configuration to protect cardholder data
2. Do not use vendor-supplied defaults for system passwords and other security
parameters
Protect Cardholder Data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability Management
Program
5. Protect all systems against malware and regularly update antivirus software or programs
6. Develop and maintain secure systems and applications
Implement Strong Access Control
Measures
7. Restrict access to cardholder data by business need to know
8. Identify and authenticate access to system components
9. Restrict physical access to cardholder data
Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data
11. Regularly test security systems and processes
Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel
11 © Worldpay 2018. All rights reserved.11
Addressing The Requirements
1. Install and maintain a firewall configuration to
protect cardholder data
• The Worldpay network has defence in depth, much more than just firewalls including
virtualised jumpboxes and two factor authentication. Our network traffic is monitored
and logged
• Apache Knox is used to supplement perimeter security
2. Do not use vendor-supplied defaults for system
passwords and other security parameters
• Apache Ambari allows us to install, configure and manage the system passwords,
connection ports, certificates, etc.
• Apache Ambari is used to help implement Kerberos
• Keys stored in HSMs
3. Protect stored cardholder data • Hardware Encrypted Disks
• Apache Atlas is used to ‘tag’ columns as PCI or PII data
• Apache Atlas is used to mask data and/or remove data at run time
• Apache Ranger is used to restrict access to the data based on roles (RBAC)
• Apache Ranger is used to restrict access to the data based on attributes (ABAC)
• Apache Ranger is integrated to our LDAP/Active Directory
• Apache HDFS Transparent Data Encryption enabled
• HDFS ACLs enabled
• Microfocus SecureData (formerly HP Voltage) is used to either Tokenise or Encrypt
sensitive (PCI & PII) data
• Vormetric Disk Protection enabled
12 © Worldpay 2018. All rights reserved.12
Addressing The Requirements
4. Encrypt transmission of cardholder data
across open, public networks
• All of our components are use TLS 1.2 to encrypt network traffic – this has to be
supported by every HortonWorks component to be effective
5. Protect all systems against malware and
regularly update antivirus software or
programs
• Worldpay runs on Linux rather than Windows but we do still have anti-virus
• Worldpay implements File Integrity Management that checks critical files are not
being modified
• Regular patching of entire software stack including OS and all software packages
as patches and releases come out
• Worl;dpay limits what software can be downloaded and in stalled on an servers
• Hortonwork have/are specifically addressed vulnerabilities we have found
• Use Hortonworks SmartSense to ensure optimal configurations
6. Develop and maintain secure systems and
applications
• Worldpay peer reviews our code before deploying
• Worldpay developed code has to be scanned with tools like Vericode
• Worldpay develops to OWASP (Open Web Application Security Project) standards
for interfaces
13 © Worldpay 2018. All rights reserved.13
Addressing The Requirements
7. Restrict access to cardholder data by
business need to know
• Apache Ranger is used to restrict access to the data based on roles (RBAC)
• Apache Ranger is used to restrict access to the data based on attributes (ABAC)
8. Identify and authenticate access to system
components
• Kerberos enabled cluster
• Apache Ranger is integrated to our LDAP/Active Directory
• Apache Ranger implements user -> group -> role -> access relationship
9. Restrict physical access to cardholder data • Tightly restricted access to the data centres
• No disks returned on failure to the vendors
• Indirect server access via virtualised jumpboxes
14 © Worldpay 2018. All rights reserved.14
Addressing The Requirements
10. Track and monitor all access to network
resources and cardholder data
• Systems Access logged via Apache Ranger to Apache Solr and made available to
auditors
• All other Hortonworks audit functions also enabled
11. Regularly test security systems and
processes
• Worldpay ‘pentests’ systems regularly (i.e. on installation, after major changes
and annually) as part of the certification process
• The EDP Governance team defines and audits policies relating to security (as
well as other data management functions)
12. Maintain a policy that addresses
information security for all personnel
• Worldpay has a set of mandatory compliance training on PCI and other security
issues that has to be renewed each year by all employees
15 © Worldpay 2018. All rights reserved.15
Our 2.6.4 Components that help us create a PCI compliant system today
16
Srikanth Venkat – Senior Director, Product Management
Security & Governance in HDP:
From a PCI-DSS Perspective
17 © Hortonworks Inc. 2011 – 2016. All Rights Reserved
Authentication & API Security: Apache
Knox
18
Apache Knox Overview
WebSSO
Authentication
And
Federation
providers
Groovy based
DSL
Client DSL/SDK Services
HTTP
Proxying
Services
UIs
REST
APIs
Web
Sockets
Hive
Ambari
HBase
WebHCa
t
WebHDFS
Authentication Services
Proxying
Services
KnoxShell
SDK
Token
Sessions
REST
API
Classes
KnoxSSO/Token
YARN
Range
r
Zeppeli
n
Oozie
Phoenix
Gremlin
JDBC/
ODBC
SAML
OAuth
LDAP/AD
SPNEGO
Header
Based
YARN
RM
WebHCa
tWebHDF
S
Hive
YARN
RM
HBase
Proxying Services
★ Provide access to Hadoop via proxying of
HTTP resources
★ Ecosystem APIs and UIs + Hadoop oriented
dispatching for Kerberos + doAs
(impersonation) etc.
Authentication Services
★ REST API access, WebSSO flow for UIs
★ LDAP/AD, Header based PreAuth, and
Token Exchange
★ Kerberos, SAML, OAuth
Client DSL/SDK Services
★ Scripting through DSL
★ Using Knox Shell classes directly as SDK
HDP Certified as
of HDP 2.6.4
Community
supported
Atlas
Oozie
Druid
19 © Hortonworks Inc. 2011 – 2016. All Rights Reserved
Authentication: Kerberos
20
Background: Kerberos
⬢ Strongly authenticating and establishing a user’s identity is the basis for secure
access in Hadoop
⬢ Users need to be able to reliably “identify” themselves and have identity
propagated throughout the Hadoop cluster
⬢ Design & implementation of Kerberos security in native Apache Hadoop was
delivered by Hortonworks co-founder Owen O’Malley!
⬢ Why Kerberos?
⬢ Establishes identity for clients, hosts and services
⬢ Prevents impersonation/passwords are never sent over the wire
⬢ Integrates w/ enterprise identity mgmt tools such as LDAP &Active Directory
⬢ More granular auditing of data access/job execution
21
Background: HDP + Kerberos
Service
Component
A
Service
Component
B
HDP Cluster
KDC
keytabkeytab
Service
Component
C
keytab
Service
Component
D
keytab
Service
Component
X
Service
Component
X
keytabkeytab
Service
Component
X
keytab
Service
Component
X
keytab
Kerberos is used to
secure the
Components in the
cluster. Kerberos
identities are
managed via
“keytabs” on the
Component hosts.
Principals
for the
cluster are
managed in
the KDC.
22
Automated Kerberos Setup with Ambari
à Wizard driven and automated Kerberos
support (kerberos principal creation for service
accounts, keytab generation and distribution
for appropriate hosts, permissions, etc.)
à Removes cumbersome, time consuming and
error prone administration of Kerberos
à Works with existing Kerberos infrastructure,
including Active Directory to automate
common tasks, removing the burden from the
operator:
• Add/Delete Host
• Add Service
• Add/Delete Component
• Regenerate Keytabs
• Disable Kerberos
23
Kerberos + Active Directory
Page 23
Cross Realm Trust
Client
Hadoop Cluster
AD /
LDAP KDC
Users: smith@EXAMPLE.COM
Hosts: host1@HADOOP.EXAMPLE.COM
Services: hdfs/host1@HADOOP.EXAMPLE.COM
User Store
Use existing directory
tools to manage users
Use Kerberos tools to
manage host + service
principals
Authentication
24 © Hortonworks Inc. 2011 – 2016. All Rights Reserved
Authorization & Audits: Apache Ranger
25
Apache Ranger
• Central audit location for all
access requests
• Support multiple destination
sources (HDFS, Solr, etc.)
• Real-time visual query
interface
AuditingAuthorization
• Store and manage encryption
keys
• Support HDFS Transparent Data
Encryption
• Integration with HSM
• Safenet LUNA
Ranger KMS
• Centralized platform to define, administer
and manage security policies consistently
across Hadoop components
• HDFS, Hive, HBase, YARN, Kafka, Solr,
Storm, Knox, NiFi, Atlas
• Extensible Architecture
• Custom policy conditions, user
context enrichers
• Easy to add new component types
for authorization
26
Ranger – ABAC Model
v ABAC Model
v Combination of the subject, action,
resource, and environment
v Uses descriptive attributes: AD group,
Apache Atlas-based tags or
classifications, geo-location, etc.
v Ranger approach is consistent with NIST
800-162
v Avoid role proliferation and
manageability issues
27
Dynamic Row Filtering & Column Masking: Apache Ranger with Apache Hive
User 2: Ivanna
Location : EU
Group: HRUser 1: Joe
Location : US
Group: Analyst
Original Query:
SELECT country, nationalid,
ccnumber, mrn, name FROM
ww_customers
Country National
ID
CC No DOB MRN Name Policy ID
US 232323233 4539067047629850 9/12/1969 8233054331 John Doe nj23j424
US 333287465 5391304868205600 8/13/1979 3736885376 Jane Doe cadsd984
Germany T22000129 4532786256545550 3/5/1963 876452830A Ernie Schwarz KK-2345909
Country National ID CC No MR
N
Name
US xxxxx3233 4539 xxxx xxxx xxxx null John Doe
US xxxxx7465 5391 xxxx xxxx xxxx null Jane Doe
Ranger Policy Enforcement
Query Rewritten based on Dynamic Ranger
Policies: Filter rows by region & apply
relevant column masking
Users from US Analyst group see data
for US persons with CC and National ID
(SSN) as masked values and MRN is
nullified
Country National ID Name MRN
Germany T22000129 Ernie
Schwarz
876452830A
EU HR Policy Admins can see
unmasked but are restricted
by row filtering policies to
see data for EU persons only
Original Query:
SELECT country, nationalid,
name, mrn FROM
ww_customers
Analysts
HR Marketing
28 © Hortonworks Inc. 2011 – 2016. All Rights Reserved
Data Protection
29
Data Protection in Hadoop
must be applied at three different layers in
Apache Hadoop
Storage: encrypt data while it is at rest
Transparent Data Encryption in HDFS, Ranger KMS + HSM, Partner
Products (HPE Voltage, Protegrity, Dataguise)
Transmission: encrypt data as it is in motion
Native Apache Hadoop 2.0 provides wire encryption.
Upon Access: apply restrictions when accessed
Ranger (Dynamic Column Masking + Row Filtering), Partner Masking +
Encryption
Data Protection
30
Data Protection – Layered
Approach• Encryption of Data at Rest
– OS Level Encryption (LUKS)
– Certified Partners for volume encryption (e.g: Vormetric (Thales) Protegrity, HPE Voltage Security)
– HDFS TDE file/folder level encryption with keys managed by Ranger KMS, External HSM integration
• Encryption of Data on the Wire
– All wire protocols can be encrypted by HDP platform
– Wire-level encryption enhancements (SSL).
• Granular Data Protection
– Dynamic Masking + Row Filtering for Hive with Ranger
– Classification Based Security with Ranger + Atlas
– Element level encryption/masking from certified partners (HPE Voltage, Protegrity)
31
Ranger KMS
Transparent Data Encryption in HDFS
NN
A B
C D
HDFS Client
A B
C D
A B
C D
DN DN DN
Benefits
v Selective encryption of relevant files/folders
v Prevent rogue admin access to sensitive data
v Fine grained access controls
v Transparent to end application w/o changes
v Ranger KMS integrated to external HSM
(Safenet Luna) adding to reliability/security of
KMS
SafeNet-
Luna HSM
32
HSM integration with Ranger KMS
à HSM client needs to be setup in
KMS nodes
à When installing Ranger KMS, HSM
parameters can be specified
à If KMS is already installed with DB,
Master key can be migrated to HSM
à All other TDE functionality remains
unchanged
33
HSM integration with Ranger KMS
Only master key
will be in HSM
Other keys stored
in Ranger KMS DB
34 © Hortonworks Inc. 2011 – 2016. All Rights Reserved
Governance with Apache Atlas
35
Apache Atlas Vision: Open Metadata & Governance Services
STRUCTURED
UNSTRUCTURED
TRADITIONAL
RDBMS
METADATA
MPP
APPLIANCES
Kafka Storm
Sqoop
Hive
ATLAS
METADATA
Falcon
RANGER
STREAMING
Custom
Partners
Comprehensive Enterprise Data Catalog
• Lists all of your data, where it is located, its origin (lineage), owner, structure,
meaning, classification and quality
• Integrate both on-premise and cloud platforms to provide enterprise wide view
Open Enterprise Data Connectors
• Interoperable connector framework to connect to your data catalog out of the
box with many vendor technologies
• No expensive population of proprietary siloed metadata repositories
Dynamic Metadata Discovery
• Metadata is added automatically to the catalog as new data is created or data is
updated
• Extensible discovery processes that characterize and classify the data
Enabling Collaboration & Workflows
• Subject matter experts locate the data they need quickly and efficiently, share
their knowledge about the data and its usage to help others
• Interested parties and processes are notified automatically
Automated Governance Processes
• Metadata-driven access control
• Auditing, metering, and monitoring
• Quality control and exception management
• Rights (entitlement) management
Predefined standards for glossaries, data schemas, rules and regulations
Vision:
Metadata-driven foundational
governance services for enterprise data
ecosystem
• Open frameworks and APIs
• Agile and secure collaboration around data and advanced
analytics
• Reduce operational costs while extracting economic value
of data
36
HDP – Security & Governance
Classification
Prohibition
Time
Location
Policies
PDP
Resource
Cache
Ranger
Manage Access Policies
and Audit Logs
Track Metadata
and Lineage
Atlas Client
Subscribers
to Topic
Gets Metadata
Updates
Atlas
Metastore
Tags
Assets
Entitles
Streams
Pipelines
Feeds
Hive
Tables
HDFS
Files
HBase
Tables
Entities
in Data
Lake
Industry First: Dynamic Tag-based Security Policies
37
Walk Through
38
Walk Through Items
⬢ Ranger
⬢ ABAC Fine Grained Security
⬢ Resource/Masking/Row Filtering Policies
⬢ Audits – self audits/access/plugin audits, logins
⬢ User/Group/Roles in Ranger
⬢ Atlas
⬢ Search and tag assets
⬢ Tag Attributes
⬢ Tag based policies in Ranger
39 © Worldpay 2018. All rights reserved.39
WorldPay – Hortonworks Partnership
• WorldPay has partnered closely with Hortonworks to
improve security and governance features across HDP and
to certify their internal platforms for PCI-DSS
• Collaboration has resulted in the community enhancements
via Apache Knox, Apache Ranger, and Apache Atlas, wire
encryption & TDE
• Ongoing collaboration on HDP platform security fixes from
external audits
• Key learnings incorporated into Hortonworks DataPlane
Service – Data Steward Studio (DSS)
40
© Worldpay 2018. All rights reserved.
Leaders in Modern Money
Innovating In Secure Modern Data Analytics
Thank You
David M Walker (david.walker@worldpay.com)
Enterprise Data Platform Programme Director, Worldpay
Srikanth Venkat
Senior Director, Product Management, Hortonworks

Contenu connexe

Tendances

White Paper - Data Warehouse Project Management
White Paper - Data Warehouse Project ManagementWhite Paper - Data Warehouse Project Management
White Paper - Data Warehouse Project Management
David Walker
 
Wallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation RoadmapWallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation Roadmap
David Walker
 
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Denodo
 
Dw hk-white paper
Dw hk-white paperDw hk-white paper
Dw hk-white paper
july12jana
 
Big data ibm keynote d advani presentation
Big data ibm keynote d advani presentationBig data ibm keynote d advani presentation
Big data ibm keynote d advani presentation
MassTLC
 
Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714
Niu Bai
 
Why Infrastructure Matters for Big Data & Analytics
Why Infrastructure Matters for Big Data & AnalyticsWhy Infrastructure Matters for Big Data & Analytics
Why Infrastructure Matters for Big Data & Analytics
Rick Perret
 

Tendances (20)

White Paper - Data Warehouse Project Management
White Paper - Data Warehouse Project ManagementWhite Paper - Data Warehouse Project Management
White Paper - Data Warehouse Project Management
 
Next Generation BI: current state and changing product assumptions
Next Generation BI: current state and changing product assumptionsNext Generation BI: current state and changing product assumptions
Next Generation BI: current state and changing product assumptions
 
Extended Data Warehouse - A New Data Architecture for Modern BI with Claudia ...
Extended Data Warehouse - A New Data Architecture for Modern BI with Claudia ...Extended Data Warehouse - A New Data Architecture for Modern BI with Claudia ...
Extended Data Warehouse - A New Data Architecture for Modern BI with Claudia ...
 
Database Architecture Proposal
Database Architecture ProposalDatabase Architecture Proposal
Database Architecture Proposal
 
White Paper - Process Neutral Data Modelling
White Paper -  Process Neutral Data ModellingWhite Paper -  Process Neutral Data Modelling
White Paper - Process Neutral Data Modelling
 
Wallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation RoadmapWallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation Roadmap
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
 
All Together Now: A Recipe for Successful Data Governance
All Together Now: A Recipe for Successful Data GovernanceAll Together Now: A Recipe for Successful Data Governance
All Together Now: A Recipe for Successful Data Governance
 
Understanding Reference Data with Aaron Zornes
Understanding Reference Data with Aaron ZornesUnderstanding Reference Data with Aaron Zornes
Understanding Reference Data with Aaron Zornes
 
Dw hk-white paper
Dw hk-white paperDw hk-white paper
Dw hk-white paper
 
Big data ibm keynote d advani presentation
Big data ibm keynote d advani presentationBig data ibm keynote d advani presentation
Big data ibm keynote d advani presentation
 
Big Data Analytics Infrastructure for Dummies
Big Data Analytics Infrastructure for DummiesBig Data Analytics Infrastructure for Dummies
Big Data Analytics Infrastructure for Dummies
 
Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714
 
Why Infrastructure Matters for Big Data & Analytics
Why Infrastructure Matters for Big Data & AnalyticsWhy Infrastructure Matters for Big Data & Analytics
Why Infrastructure Matters for Big Data & Analytics
 
Big Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning associationBig Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning association
 
Netspend: Maintaining "High Operations Tempo" via Multidomain MDM
Netspend: Maintaining "High Operations Tempo" via Multidomain MDMNetspend: Maintaining "High Operations Tempo" via Multidomain MDM
Netspend: Maintaining "High Operations Tempo" via Multidomain MDM
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
 
The opportunity of the business data lake
The opportunity of the business data lakeThe opportunity of the business data lake
The opportunity of the business data lake
 
Unlocking Business Value Using Data
Unlocking Business Value Using DataUnlocking Business Value Using Data
Unlocking Business Value Using Data
 

Similaire à Data Works Berlin 2018 - Worldpay - PCI Compliance

Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
Evgeniya Shumakher
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
gaborvodics
 

Similaire à Data Works Berlin 2018 - Worldpay - PCI Compliance (20)

Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICE
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
 
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
 
Data Works Summit Munich 2017 - Worldpay - Multi Tenancy Clusters
Data Works Summit Munich 2017 - Worldpay - Multi Tenancy ClustersData Works Summit Munich 2017 - Worldpay - Multi Tenancy Clusters
Data Works Summit Munich 2017 - Worldpay - Multi Tenancy Clusters
 
Will Your Cloud Be Compliant? OpenStack Security
Will Your Cloud Be Compliant?  OpenStack SecurityWill Your Cloud Be Compliant?  OpenStack Security
Will Your Cloud Be Compliant? OpenStack Security
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Rightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public CloudRightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public Cloud
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your Business
 

Plus de David Walker

Building a data warehouse of call data records
Building a data warehouse of call data recordsBuilding a data warehouse of call data records
Building a data warehouse of call data records
David Walker
 
Struggling with data management
Struggling with data managementStruggling with data management
Struggling with data management
David Walker
 
A linux mac os x command line interface
A linux mac os x command line interfaceA linux mac os x command line interface
A linux mac os x command line interface
David Walker
 
Connections a life in the day of - david walker
Connections   a life in the day of - david walkerConnections   a life in the day of - david walker
Connections a life in the day of - david walker
David Walker
 
Conspectus data warehousing appliances – fad or future
Conspectus   data warehousing appliances – fad or futureConspectus   data warehousing appliances – fad or future
Conspectus data warehousing appliances – fad or future
David Walker
 
Implementing Netezza Spatial
Implementing Netezza SpatialImplementing Netezza Spatial
Implementing Netezza Spatial
David Walker
 
Storage Characteristics Of Call Data Records In Column Store Databases
Storage Characteristics Of Call Data Records In Column Store DatabasesStorage Characteristics Of Call Data Records In Column Store Databases
Storage Characteristics Of Call Data Records In Column Store Databases
David Walker
 
UKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
UKOUG06 - An Introduction To Process Neutral Data Modelling - PresentationUKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
UKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
David Walker
 
Oracle BI06 From Volume To Value - Presentation
Oracle BI06   From Volume To Value - PresentationOracle BI06   From Volume To Value - Presentation
Oracle BI06 From Volume To Value - Presentation
David Walker
 
Openworld04 - Information Delivery - The Change In Data Management At Network...
Openworld04 - Information Delivery - The Change In Data Management At Network...Openworld04 - Information Delivery - The Change In Data Management At Network...
Openworld04 - Information Delivery - The Change In Data Management At Network...
David Walker
 
IRM09 - What Can IT Really Deliver For BI and DW - Presentation
IRM09 - What Can IT Really Deliver For BI and DW - PresentationIRM09 - What Can IT Really Deliver For BI and DW - Presentation
IRM09 - What Can IT Really Deliver For BI and DW - Presentation
David Walker
 

Plus de David Walker (20)

Big Data Analytics 2017 - Worldpay - Empowering Payments
Big Data Analytics 2017  - Worldpay - Empowering PaymentsBig Data Analytics 2017  - Worldpay - Empowering Payments
Big Data Analytics 2017 - Worldpay - Empowering Payments
 
Data Driven Insurance Underwriting
Data Driven Insurance UnderwritingData Driven Insurance Underwriting
Data Driven Insurance Underwriting
 
Data Driven Insurance Underwriting (Dutch Language Version)
Data Driven Insurance Underwriting (Dutch Language Version)Data Driven Insurance Underwriting (Dutch Language Version)
Data Driven Insurance Underwriting (Dutch Language Version)
 
An introduction to data virtualization in business intelligence
An introduction to data virtualization in business intelligenceAn introduction to data virtualization in business intelligence
An introduction to data virtualization in business intelligence
 
BI SaaS & Cloud Strategies for Telcos
BI SaaS & Cloud Strategies for TelcosBI SaaS & Cloud Strategies for Telcos
BI SaaS & Cloud Strategies for Telcos
 
Building an analytical platform
Building an analytical platformBuilding an analytical platform
Building an analytical platform
 
Gathering Business Requirements for Data Warehouses
Gathering Business Requirements for Data WarehousesGathering Business Requirements for Data Warehouses
Gathering Business Requirements for Data Warehouses
 
Building a data warehouse of call data records
Building a data warehouse of call data recordsBuilding a data warehouse of call data records
Building a data warehouse of call data records
 
Struggling with data management
Struggling with data managementStruggling with data management
Struggling with data management
 
A linux mac os x command line interface
A linux mac os x command line interfaceA linux mac os x command line interface
A linux mac os x command line interface
 
Connections a life in the day of - david walker
Connections   a life in the day of - david walkerConnections   a life in the day of - david walker
Connections a life in the day of - david walker
 
Conspectus data warehousing appliances – fad or future
Conspectus   data warehousing appliances – fad or futureConspectus   data warehousing appliances – fad or future
Conspectus data warehousing appliances – fad or future
 
An introduction to social network data
An introduction to social network dataAn introduction to social network data
An introduction to social network data
 
Using the right data model in a data mart
Using the right data model in a data martUsing the right data model in a data mart
Using the right data model in a data mart
 
Implementing Netezza Spatial
Implementing Netezza SpatialImplementing Netezza Spatial
Implementing Netezza Spatial
 
Storage Characteristics Of Call Data Records In Column Store Databases
Storage Characteristics Of Call Data Records In Column Store DatabasesStorage Characteristics Of Call Data Records In Column Store Databases
Storage Characteristics Of Call Data Records In Column Store Databases
 
UKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
UKOUG06 - An Introduction To Process Neutral Data Modelling - PresentationUKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
UKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
 
Oracle BI06 From Volume To Value - Presentation
Oracle BI06   From Volume To Value - PresentationOracle BI06   From Volume To Value - Presentation
Oracle BI06 From Volume To Value - Presentation
 
Openworld04 - Information Delivery - The Change In Data Management At Network...
Openworld04 - Information Delivery - The Change In Data Management At Network...Openworld04 - Information Delivery - The Change In Data Management At Network...
Openworld04 - Information Delivery - The Change In Data Management At Network...
 
IRM09 - What Can IT Really Deliver For BI and DW - Presentation
IRM09 - What Can IT Really Deliver For BI and DW - PresentationIRM09 - What Can IT Really Deliver For BI and DW - Presentation
IRM09 - What Can IT Really Deliver For BI and DW - Presentation
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Data Works Berlin 2018 - Worldpay - PCI Compliance

  • 1. 1 © Worldpay 2018. All rights reserved. Not just a necessary evil, it’s good for business: Implementing PCI DSS controls for the Hadoop ecosystem at the UK’s largest payment processor David Walker/Worldpay & Srikanth Venkat/HortonWorks DataWorks Summit – Berlin 17-19 April 2018
  • 2. 2 © Worldpay 2018. All rights reserved.2 Session Synopsis & Your Speakers David has over 20 years’ technical leadership expertise and has led the development and management of complex BI solutions, supporting technical architectures for a wide range of organisations spanning SME start-ups to large enterprise. In his role at Worldpay, David specialises in developing and delivering the Enterprise Data Platform, a multi-tenant highly secure Hadoop platform for decision engines, analytics and reporting using his experience and knowledge in technical architecture, data modelling, ETL design, data quality, and metadata management. A key aspect of David’s role also involves acting as the lynchpin between Worldpay’s commercial and technical business leaders by regularly engaging at the executive level. David also manages cross-cultural teams in the analysis of technical infrastructures and the delivery of innovative and successful change programmes. Srikanth Venkat is currently responsible for Security & Governance portfolio of products at Hortonworks which include Apache Knox, Apache Ranger, Apache Atlas, Platform wide security and Hortonworks DataPlane Service. Prior to Hortonworks, Srikanth has held multiple roles in areas of cloud services, marketplaces, security, and business applications. His experience includes leadership across Product Management, Strategy and Operations, and Technical Architecture with broad experience in startups to global organizations including Telefonica, Salesforce.com, Cisco-Webex, Proofpoint, Dataguise, Trilogy Software, and Hewlett-Packard. Srikanth holds a PhD in Engineering with a focus on Artificial Intelligence from University of Pittsburgh, and an MBA in General Management from Indiana University and a Masters in Global Management from Thunderbird School of Global Management. Srikanth is a Data Sciences & Machine Learning hobbyist and enjoys tinkering with Big Data technologies. For firms in the financial industry, especially within regulated organizations such as credit card processors and banks, PCI DSS compliance has become a business and operational necessity. Although the blueprint of a PCI-compliant architecture varies from organization to organization, the mixture of modern Hadoop-based data lakes and legacy systems are a common theme. In this talk, we will discuss recent updates to PCI DSS and how significant portions of PCI DSS compliance controls can be achieved using open source Hadoop security stack and technologies for the Hadoop ecosystem. We will provide a broad overview of implementing key aspects of PCI DSS standards at WorldPay such as encryption management, data protection with anonymization, separation of duties, and deployment considerations regarding securing the Hadoop clusters at the network layer from a practitioner’s perspective. The talk will provide patterns and practices map current Hadoop security capabilities to security controls that a PCI- compliant environment requires.
  • 3. 3 © Worldpay 2017. All rights reserved.3 Transactions Daily. On average that’s per second. merchants using > payment methods & currencies in countries and in the UK we process % of all non-cash transactions Worldpay In (Big) Numbers In Store Online Mobile
  • 4. 4 © Worldpay 2018. All rights reserved.4 Data Security & Regulatory Compliance are both in the news … … but in reality they are two sides of the same coin Payment Card Industry Data Security Standards* General Data Protection Regulations Payment Services Directive 2* Data Protection Act(s) * Other industries have their own standards but the principle is the same
  • 5. 5 © Worldpay 2018. All rights reserved.5 So why is this good for business ? • In a digital world the success of our business (regardless of industry) will be significantly defined by our organisations ability to handle and use data responsibly throughout our business. We must protect our customers and business partners from both data misuse and from fraud. In short we need to be trusted by our customers in the ways that we handle their information • Legal & regulatory standards are being set by governments, regulators and industry bodies in an attempt to set a minimum sufficient standard to protect data subjects
  • 6. 6 © Worldpay 2018. All rights reserved.6 How do you develop a secure platform • Compliance is not lip-service to doing security – the auditing for PCI DSS is rigorous and we have to continuously review and upgrade our systems to maintain compliance • Audit of and compliance with these standards is a way of demonstrating that we have taken appropriate steps to protect our data assets – and in the worst case scenario it is also a way of mitigating the financial and reputational impact of an incident. Either start with a blank piece of paper …. … or adopt and commit to security framework
  • 7. 7 © Worldpay 2018. All rights reserved.7 Todays Hadoop Environments Are The Big Targets Within Your Organisation • If you are building or have built a large successful Hadoop deployment that contains a large amount of your business data then you have just created a massive target within your organisation • PCI DSS only certifies a project or implementation • No single product can deliver a PCI DSS compliant solution • As the implementers of a system we are looking to get the greatest amount of compliance by deploying the smallest number of products and tools to do the job
  • 8. 8 © Worldpay 2018. All rights reserved.8 First Some Historical Context • The Worldpay journey to build a big data platform started in April 2015 • We started with HortonWorks 2.2 • The Hortonworks Data Platform Security document did not exist • Apache Ranger was new, Apache Atlas was a concept, HortonWorks DataPlane wasn’t even a twinkle • Today we are on 2.6.4 and have applied nearly every release in between • Across the entire software product stack we did 298 patch sets and upgrades in 2017 • Besides the core platform paying for support and deploying HortonWorks SmartSense significantly improves your security profile • We are also interested in: • https://workbench.cisecurity.org – Center for Internet Security • http://owasp.org – Open Web Application Security Project
  • 9. 9 © Worldpay 2018. All rights reserved.9 Even your fish tank is a risk to you data platform(s) • PCI is about putting in place the • Security • Logging of activity • Audit of that security • Separation of duties • Patching Cycles • Etc. • And then maintaining them • We are just finishing our 2018 PCI cycle and start planning 2019 PCI cycle in September
  • 10. 10 © Worldpay 2018. All rights reserved.10 The PCI DSS 3.2 Requirements Goals PCI DSS 3.2 Requirement Build and Maintain a Secure Network and Systems 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program 5. Protect all systems against malware and regularly update antivirus software or programs 6. Develop and maintain secure systems and applications Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need to know 8. Identify and authenticate access to system components 9. Restrict physical access to cardholder data Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel
  • 11. 11 © Worldpay 2018. All rights reserved.11 Addressing The Requirements 1. Install and maintain a firewall configuration to protect cardholder data • The Worldpay network has defence in depth, much more than just firewalls including virtualised jumpboxes and two factor authentication. Our network traffic is monitored and logged • Apache Knox is used to supplement perimeter security 2. Do not use vendor-supplied defaults for system passwords and other security parameters • Apache Ambari allows us to install, configure and manage the system passwords, connection ports, certificates, etc. • Apache Ambari is used to help implement Kerberos • Keys stored in HSMs 3. Protect stored cardholder data • Hardware Encrypted Disks • Apache Atlas is used to ‘tag’ columns as PCI or PII data • Apache Atlas is used to mask data and/or remove data at run time • Apache Ranger is used to restrict access to the data based on roles (RBAC) • Apache Ranger is used to restrict access to the data based on attributes (ABAC) • Apache Ranger is integrated to our LDAP/Active Directory • Apache HDFS Transparent Data Encryption enabled • HDFS ACLs enabled • Microfocus SecureData (formerly HP Voltage) is used to either Tokenise or Encrypt sensitive (PCI & PII) data • Vormetric Disk Protection enabled
  • 12. 12 © Worldpay 2018. All rights reserved.12 Addressing The Requirements 4. Encrypt transmission of cardholder data across open, public networks • All of our components are use TLS 1.2 to encrypt network traffic – this has to be supported by every HortonWorks component to be effective 5. Protect all systems against malware and regularly update antivirus software or programs • Worldpay runs on Linux rather than Windows but we do still have anti-virus • Worldpay implements File Integrity Management that checks critical files are not being modified • Regular patching of entire software stack including OS and all software packages as patches and releases come out • Worl;dpay limits what software can be downloaded and in stalled on an servers • Hortonwork have/are specifically addressed vulnerabilities we have found • Use Hortonworks SmartSense to ensure optimal configurations 6. Develop and maintain secure systems and applications • Worldpay peer reviews our code before deploying • Worldpay developed code has to be scanned with tools like Vericode • Worldpay develops to OWASP (Open Web Application Security Project) standards for interfaces
  • 13. 13 © Worldpay 2018. All rights reserved.13 Addressing The Requirements 7. Restrict access to cardholder data by business need to know • Apache Ranger is used to restrict access to the data based on roles (RBAC) • Apache Ranger is used to restrict access to the data based on attributes (ABAC) 8. Identify and authenticate access to system components • Kerberos enabled cluster • Apache Ranger is integrated to our LDAP/Active Directory • Apache Ranger implements user -> group -> role -> access relationship 9. Restrict physical access to cardholder data • Tightly restricted access to the data centres • No disks returned on failure to the vendors • Indirect server access via virtualised jumpboxes
  • 14. 14 © Worldpay 2018. All rights reserved.14 Addressing The Requirements 10. Track and monitor all access to network resources and cardholder data • Systems Access logged via Apache Ranger to Apache Solr and made available to auditors • All other Hortonworks audit functions also enabled 11. Regularly test security systems and processes • Worldpay ‘pentests’ systems regularly (i.e. on installation, after major changes and annually) as part of the certification process • The EDP Governance team defines and audits policies relating to security (as well as other data management functions) 12. Maintain a policy that addresses information security for all personnel • Worldpay has a set of mandatory compliance training on PCI and other security issues that has to be renewed each year by all employees
  • 15. 15 © Worldpay 2018. All rights reserved.15 Our 2.6.4 Components that help us create a PCI compliant system today
  • 16. 16 Srikanth Venkat – Senior Director, Product Management Security & Governance in HDP: From a PCI-DSS Perspective
  • 17. 17 © Hortonworks Inc. 2011 – 2016. All Rights Reserved Authentication & API Security: Apache Knox
  • 18. 18 Apache Knox Overview WebSSO Authentication And Federation providers Groovy based DSL Client DSL/SDK Services HTTP Proxying Services UIs REST APIs Web Sockets Hive Ambari HBase WebHCa t WebHDFS Authentication Services Proxying Services KnoxShell SDK Token Sessions REST API Classes KnoxSSO/Token YARN Range r Zeppeli n Oozie Phoenix Gremlin JDBC/ ODBC SAML OAuth LDAP/AD SPNEGO Header Based YARN RM WebHCa tWebHDF S Hive YARN RM HBase Proxying Services ★ Provide access to Hadoop via proxying of HTTP resources ★ Ecosystem APIs and UIs + Hadoop oriented dispatching for Kerberos + doAs (impersonation) etc. Authentication Services ★ REST API access, WebSSO flow for UIs ★ LDAP/AD, Header based PreAuth, and Token Exchange ★ Kerberos, SAML, OAuth Client DSL/SDK Services ★ Scripting through DSL ★ Using Knox Shell classes directly as SDK HDP Certified as of HDP 2.6.4 Community supported Atlas Oozie Druid
  • 19. 19 © Hortonworks Inc. 2011 – 2016. All Rights Reserved Authentication: Kerberos
  • 20. 20 Background: Kerberos ⬢ Strongly authenticating and establishing a user’s identity is the basis for secure access in Hadoop ⬢ Users need to be able to reliably “identify” themselves and have identity propagated throughout the Hadoop cluster ⬢ Design & implementation of Kerberos security in native Apache Hadoop was delivered by Hortonworks co-founder Owen O’Malley! ⬢ Why Kerberos? ⬢ Establishes identity for clients, hosts and services ⬢ Prevents impersonation/passwords are never sent over the wire ⬢ Integrates w/ enterprise identity mgmt tools such as LDAP &Active Directory ⬢ More granular auditing of data access/job execution
  • 21. 21 Background: HDP + Kerberos Service Component A Service Component B HDP Cluster KDC keytabkeytab Service Component C keytab Service Component D keytab Service Component X Service Component X keytabkeytab Service Component X keytab Service Component X keytab Kerberos is used to secure the Components in the cluster. Kerberos identities are managed via “keytabs” on the Component hosts. Principals for the cluster are managed in the KDC.
  • 22. 22 Automated Kerberos Setup with Ambari à Wizard driven and automated Kerberos support (kerberos principal creation for service accounts, keytab generation and distribution for appropriate hosts, permissions, etc.) à Removes cumbersome, time consuming and error prone administration of Kerberos à Works with existing Kerberos infrastructure, including Active Directory to automate common tasks, removing the burden from the operator: • Add/Delete Host • Add Service • Add/Delete Component • Regenerate Keytabs • Disable Kerberos
  • 23. 23 Kerberos + Active Directory Page 23 Cross Realm Trust Client Hadoop Cluster AD / LDAP KDC Users: smith@EXAMPLE.COM Hosts: host1@HADOOP.EXAMPLE.COM Services: hdfs/host1@HADOOP.EXAMPLE.COM User Store Use existing directory tools to manage users Use Kerberos tools to manage host + service principals Authentication
  • 24. 24 © Hortonworks Inc. 2011 – 2016. All Rights Reserved Authorization & Audits: Apache Ranger
  • 25. 25 Apache Ranger • Central audit location for all access requests • Support multiple destination sources (HDFS, Solr, etc.) • Real-time visual query interface AuditingAuthorization • Store and manage encryption keys • Support HDFS Transparent Data Encryption • Integration with HSM • Safenet LUNA Ranger KMS • Centralized platform to define, administer and manage security policies consistently across Hadoop components • HDFS, Hive, HBase, YARN, Kafka, Solr, Storm, Knox, NiFi, Atlas • Extensible Architecture • Custom policy conditions, user context enrichers • Easy to add new component types for authorization
  • 26. 26 Ranger – ABAC Model v ABAC Model v Combination of the subject, action, resource, and environment v Uses descriptive attributes: AD group, Apache Atlas-based tags or classifications, geo-location, etc. v Ranger approach is consistent with NIST 800-162 v Avoid role proliferation and manageability issues
  • 27. 27 Dynamic Row Filtering & Column Masking: Apache Ranger with Apache Hive User 2: Ivanna Location : EU Group: HRUser 1: Joe Location : US Group: Analyst Original Query: SELECT country, nationalid, ccnumber, mrn, name FROM ww_customers Country National ID CC No DOB MRN Name Policy ID US 232323233 4539067047629850 9/12/1969 8233054331 John Doe nj23j424 US 333287465 5391304868205600 8/13/1979 3736885376 Jane Doe cadsd984 Germany T22000129 4532786256545550 3/5/1963 876452830A Ernie Schwarz KK-2345909 Country National ID CC No MR N Name US xxxxx3233 4539 xxxx xxxx xxxx null John Doe US xxxxx7465 5391 xxxx xxxx xxxx null Jane Doe Ranger Policy Enforcement Query Rewritten based on Dynamic Ranger Policies: Filter rows by region & apply relevant column masking Users from US Analyst group see data for US persons with CC and National ID (SSN) as masked values and MRN is nullified Country National ID Name MRN Germany T22000129 Ernie Schwarz 876452830A EU HR Policy Admins can see unmasked but are restricted by row filtering policies to see data for EU persons only Original Query: SELECT country, nationalid, name, mrn FROM ww_customers Analysts HR Marketing
  • 28. 28 © Hortonworks Inc. 2011 – 2016. All Rights Reserved Data Protection
  • 29. 29 Data Protection in Hadoop must be applied at three different layers in Apache Hadoop Storage: encrypt data while it is at rest Transparent Data Encryption in HDFS, Ranger KMS + HSM, Partner Products (HPE Voltage, Protegrity, Dataguise) Transmission: encrypt data as it is in motion Native Apache Hadoop 2.0 provides wire encryption. Upon Access: apply restrictions when accessed Ranger (Dynamic Column Masking + Row Filtering), Partner Masking + Encryption Data Protection
  • 30. 30 Data Protection – Layered Approach• Encryption of Data at Rest – OS Level Encryption (LUKS) – Certified Partners for volume encryption (e.g: Vormetric (Thales) Protegrity, HPE Voltage Security) – HDFS TDE file/folder level encryption with keys managed by Ranger KMS, External HSM integration • Encryption of Data on the Wire – All wire protocols can be encrypted by HDP platform – Wire-level encryption enhancements (SSL). • Granular Data Protection – Dynamic Masking + Row Filtering for Hive with Ranger – Classification Based Security with Ranger + Atlas – Element level encryption/masking from certified partners (HPE Voltage, Protegrity)
  • 31. 31 Ranger KMS Transparent Data Encryption in HDFS NN A B C D HDFS Client A B C D A B C D DN DN DN Benefits v Selective encryption of relevant files/folders v Prevent rogue admin access to sensitive data v Fine grained access controls v Transparent to end application w/o changes v Ranger KMS integrated to external HSM (Safenet Luna) adding to reliability/security of KMS SafeNet- Luna HSM
  • 32. 32 HSM integration with Ranger KMS à HSM client needs to be setup in KMS nodes à When installing Ranger KMS, HSM parameters can be specified à If KMS is already installed with DB, Master key can be migrated to HSM à All other TDE functionality remains unchanged
  • 33. 33 HSM integration with Ranger KMS Only master key will be in HSM Other keys stored in Ranger KMS DB
  • 34. 34 © Hortonworks Inc. 2011 – 2016. All Rights Reserved Governance with Apache Atlas
  • 35. 35 Apache Atlas Vision: Open Metadata & Governance Services STRUCTURED UNSTRUCTURED TRADITIONAL RDBMS METADATA MPP APPLIANCES Kafka Storm Sqoop Hive ATLAS METADATA Falcon RANGER STREAMING Custom Partners Comprehensive Enterprise Data Catalog • Lists all of your data, where it is located, its origin (lineage), owner, structure, meaning, classification and quality • Integrate both on-premise and cloud platforms to provide enterprise wide view Open Enterprise Data Connectors • Interoperable connector framework to connect to your data catalog out of the box with many vendor technologies • No expensive population of proprietary siloed metadata repositories Dynamic Metadata Discovery • Metadata is added automatically to the catalog as new data is created or data is updated • Extensible discovery processes that characterize and classify the data Enabling Collaboration & Workflows • Subject matter experts locate the data they need quickly and efficiently, share their knowledge about the data and its usage to help others • Interested parties and processes are notified automatically Automated Governance Processes • Metadata-driven access control • Auditing, metering, and monitoring • Quality control and exception management • Rights (entitlement) management Predefined standards for glossaries, data schemas, rules and regulations Vision: Metadata-driven foundational governance services for enterprise data ecosystem • Open frameworks and APIs • Agile and secure collaboration around data and advanced analytics • Reduce operational costs while extracting economic value of data
  • 36. 36 HDP – Security & Governance Classification Prohibition Time Location Policies PDP Resource Cache Ranger Manage Access Policies and Audit Logs Track Metadata and Lineage Atlas Client Subscribers to Topic Gets Metadata Updates Atlas Metastore Tags Assets Entitles Streams Pipelines Feeds Hive Tables HDFS Files HBase Tables Entities in Data Lake Industry First: Dynamic Tag-based Security Policies
  • 38. 38 Walk Through Items ⬢ Ranger ⬢ ABAC Fine Grained Security ⬢ Resource/Masking/Row Filtering Policies ⬢ Audits – self audits/access/plugin audits, logins ⬢ User/Group/Roles in Ranger ⬢ Atlas ⬢ Search and tag assets ⬢ Tag Attributes ⬢ Tag based policies in Ranger
  • 39. 39 © Worldpay 2018. All rights reserved.39 WorldPay – Hortonworks Partnership • WorldPay has partnered closely with Hortonworks to improve security and governance features across HDP and to certify their internal platforms for PCI-DSS • Collaboration has resulted in the community enhancements via Apache Knox, Apache Ranger, and Apache Atlas, wire encryption & TDE • Ongoing collaboration on HDP platform security fixes from external audits • Key learnings incorporated into Hortonworks DataPlane Service – Data Steward Studio (DSS)
  • 40. 40 © Worldpay 2018. All rights reserved. Leaders in Modern Money Innovating In Secure Modern Data Analytics Thank You David M Walker (david.walker@worldpay.com) Enterprise Data Platform Programme Director, Worldpay Srikanth Venkat Senior Director, Product Management, Hortonworks