October 29, 2015 By Kathryn Zeidenstein 2 min read

Big Data Systems Get Serious

The use of big data programs such as Hadoop and NoSQL systems is on the rise. Security teams working with the Hadoop teams in their organizations may see an attempt by the latter to convince them that Hadoop security can be handled by built-in mechanisms. These big data staffers may throw a lot of strange names at you and dazzle you with marketing collateral.

Don’t get me wrong: It’s a great thing that Hadoop is beefing up security. But it’s your job to look at the big picture for big data security and compliance. If the organization has standardized a data security and compliance platform, and if that platform supports Hadoop, then the infrastructure is in place to bring Hadoop under your security umbrella.

Register for the tech talk: Guarding against insider threats to Hadoop: What’s new in Guardium

Making the Most of Security Controls

Work with the Hadoop teams to understand how and when native controls fit the bill. Then identify those cases in which compensating controls are required. It may even be that the security solutions complement each other nicely, allowing the organization as a whole to optimize its data security and compliance infrastructure and processes.

These complementary capabilities may include:

  • Automated compliance workflow to help automate the solution and to obtain auditable sign-off of reports;
  • Policy-based infrastructure that can be used across the data landscape, not just within the Hadoop cluster;
  • Low-impact monitoring paired with rich reporting and investigative capabilities;
  • Separation of duties in which auditing data is separate from the Hadoop cluster and its privileged admins;
  • Use of dynamic data masking and blocking as a compensating control for certain cases; and
  • Analytics of user or group behavior to detect outliers that can help filter out the noise from the activity.

For More Technical Information

For the more technical among you, this recorded tech talk provides a deeper dive into the security implications for Hadoop. For the latest and greatest, see this developerWorks article, which includes an overview of the significant enhancements made for security and auditing in Hadoop environments.  This information can help you learn more about how the platform can extend to big data and beyond.

More from Data Protection

Why safeguarding sensitive data is so crucial

4 min read - A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other.The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction recovery help and mental health treatment in Connecticut, Florida, Texas and other states.The breach, first reported by WIRED, involved PII, such as patient names and addresses,…

Addressing growing concerns about cybersecurity in manufacturing

4 min read - Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface.According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in the industrial sector was $5.56 million. This reflects an 18% increase for the sector compared to 2023.Apparently, the data being stored in industrial control systems is…

3 proven use cases for AI in preventative cybersecurity

3 min read - IBM’s Cost of a Data Breach Report 2024 highlights a ground-breaking finding: The application of AI-powered automation in prevention has saved organizations an average of $2.2 million.Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance.Here are three ways how AI is helping to make that possible:1. Attack surface management: Proactive defense with AIIncreased complexity and interconnectedness are a growing headache for security teams, and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today