Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Data protection2015

645 vues

Publié le

Hadoop has long had strong authentication via integration with Kerberos, authorization via user/group/other HDFS permissions and auditing via the audit log. Recent developments in Hadoop have added HDFS file access control lists, pluggable encryption key provider APIs, HDFS snapshots, and HDFS encryption zones. These features combine to given important new data protection features that every company should be using to protect their data. This talk will cover what the new features are and when and how to use them in enterprise production environments. Upcoming features including columnar encryption in the ORC file format will also be covered.

Publié dans : Technologie
  • Soyez le premier à commenter

Data protection2015

  1. 1. © Hortonworks Inc. 2015 Protecting Enterprise Data in Apache Hadoop April 2015 Page 1 Owen O’Malley owen@hortonworks.com @owen_omalley
  2. 2. © Hortonworks Inc. 2015 Security Page 2
  3. 3. © Hortonworks Inc. 2015 Security Architecture Page 3
  4. 4. © Hortonworks Inc. 2015 Attack Vectors Page 4
  5. 5. © Hortonworks Inc. 2015 Attack Vectors Page 5
  6. 6. © Hortonworks Inc. 2015 Threat: Accidental Damage Page 6
  7. 7. © Hortonworks Inc. 2015 Threat: Remote Access Page 7
  8. 8. © Hortonworks Inc. 2015 Threat: Eavesdropping Page 8
  9. 9. © Hortonworks Inc. 2015 Threat: User accesses private data Page 9
  10. 10. © Hortonworks Inc. 2015 Threat: Physical access Page 10
  11. 11. © Hortonworks Inc. 2015 Threat: Hadoop Admin in Cluster Page 11
  12. 12. © Hortonworks Inc. 2015 HDFS Encryption Page 12
  13. 13. © Hortonworks Inc. 2015 KeyProvider API Page 13
  14. 14. © Hortonworks Inc. 2015 Encryption Scheme Page 14
  15. 15. © Hortonworks Inc. 2015 Threat: User reads private columns Page 15
  16. 16. © Hortonworks Inc. 2015 ORC File Layout Page 16 File Footer Postscript Index Data Row Data Stripe Footer 256MBStripe Index Data Row Data Stripe Footer 256MBStripe Index Data Row Data Stripe Footer 256MBStripe Column 1 Column 2 Column 7 Column 8 Column 3 Column 6 Column 4 Column 5 Column 1 Column 2 Column 7 Column 8 Column 3 Column 6 Column 4 Column 5 Stream 2.1 Stream 2.2 Stream 2.3 Stream 2.4
  17. 17. © Hortonworks Inc. 2015 Threat: User reads hidden values Page 17
  18. 18. © Hortonworks Inc. 2015 Threat: Shadow Security Page 18
  19. 19. © Hortonworks Inc. 2015 Resources Page 19
  20. 20. © Hortonworks Inc. 2015 Thank You! Page 20

×