• No results found

Like what you hear? Tweet it using: #Sec360

N/A
N/A
Protected

Academic year: 2021

Share "Like what you hear? Tweet it using: #Sec360"

Copied!
27
0
0

Full text

(1)
(2)

HADOOP SECURITY

(3)

HADOOP SECURITY

About Robert:

School: UW Madison, U St. Thomas Programming: 15 years, C, C++, Java Security Work:

§  Surescripts, Minneapolis (present)

§  Big Retail Company, Minneapolis

§  Big Healthcare Company, Minnetonka

OWASP Local Volunteer CISSP, CISM, CISA, CHPS

Email: bob@confidentialsoftware.com

(4)

HADOOP SECURITY

History

What is new?

Common Applications Threats

Security Architecture

Secure Baseline and Testing Policy Impact

(5)

HADOOP HISTORY

•  2002 : Doug Cutting & Mike Cafarella: Nutch

•  Crawl and index hundreds of millions of pages

•  2003: Google File System paper released

•  2004: Google MapReduce paper released

•  2006: Yahoo formed Hadoop 5 to 20 nodes

•  2008: Yahoo, Hadoop “behind every click”

•  2008: Google spun off Cloudera 2,000 Hadoop nodes

•  2008: Facebook open sourced Hive for Hadoop

•  2011: Yahoo spins out Hortonworks

•  Hortonworks Hadoop 42,000 nodes, hundreds of petabytes

Derrick Harris “The History of Hadoop from 4 nodes to the future of

data”, gigamon.com

(6)

HADOOP IS

The Apache Hadoop software library is a framework that allows for the distributed processing of large …

-  Software Framework

-  Distributed Processing

-  Large Data Sets

-  Clusters of Computers

-  High Availability

-  Scale to Thousands of Machines

Link:

(7)

MAPREDUCE IS NEW

REDUCE

MAP

(8)

HADOOP COMMON APPLICATIONS

1.

Web Search

2.

Advertising & recommendations

3.

Security Threat Identification

4.

Fraud Detection

(9)

Source: Yahoo:

(10)

PATIENT MATCHING AT SURESCRIPTS

-

Surescripts provides a Patient Matching service

-

230 Million Patients

-

Over 1 Billion matches last year

-

Requirements:

-

Reliability and performance

-

Data Protection at rest is required

-

Data Protection in transit is required

-

Comprehensive security logging is needed

-

ISO 27001 & EHNAC Audit Accreditation status must be

(11)

NOW WHAT?

(12)

HADOOP THREAT MODEL

1)  Unauthorized data access (protected health information access)

2)  Unauthorized data change

3)  Unauthorized job submission, delete or change

4)  Task may access other tasks or access local data

5)  Rogue DataNode, NameNode or Job Tracker

6)  User spoofing to submit workflow as another user

From:

“Adding Security to Apache Hadoop”, Das, O’Malley, Rhadia, Zhang, 2011,

(13)

HADOOP SECURITY

-  Network Security

-  Authentication

-  Authorization

-  Auditing

-  Data Protection

Admins

Data Nodes

Management

Nodes

Applications

Enterprise Identity,

Logging, Encryption,

Key Management

Application Users

(14)

DATA PROTECTION

-  Network Security

-  Authentication

-  Authorization

-  Auditing

-  Data Protection

-  Encryption at rest;

-  Volume, file

-  Encryption in transit:

-  HTTPS

Admins

Data Nodes

Management

Nodes

Applications

Enterprise Identity,

Logging, Encryption,

Key Management

Application Users

(15)

SECURITY AUDITING

-  Network Security

-  Authentication

-  Authorization

-  Auditing

-  Failed/Successful Authn.

-  System changes

-  Access to PHI

-  Application logs: HDFS,

YARN, MapReduce… -  Data Protection

Admins

Data Nodes

Management

Nodes

Applications

Enterprise Identity,

Logging, Encryption,

Key Management

Application Users

(16)

AUTHORIZATION

-  Network Security

-  Authentication

-  Authorization

-  Limit user access to

function

-  Limit user access to objects

-  Manage delegation of

access -  Auditing

-  Data Protection

Admins

Data Nodes

Management

Nodes

Applications

Enterprise Identity,

Logging, Encryption,

Key Management

Application Users

(17)

AUTHENTICATION

-  Network Security

-  Authentication

-  All users, all applications,

all access paths

-  Apache Knox Gateway

-  Authorization

-  Auditing

-  Data Protection

Admins

Data Nodes

Management

Nodes

Applications

Enterprise Identity,

Logging, Encryption,

Key Management

Application Users

HTTPS

(18)

NETWORK SECURITY

-  Network Security

-  Authentication

-  Authorization

-  Auditing

-  Data Protection

Admins

Data Nodes

Management

Nodes

Applications

Enterprise Identity,

Logging, Encryption,

Key Management

Application Users

(19)

HADOOP SECURE MODE

Apache Hadoop Secure Mode: 2.6.0 (March 14’)

-  Authentication

-  Covers HDFS, YARN, MapReduce & Web Console

-  Uses central LDAP Server or Active Directory

-  Requires Kerberos keytabs for each application -  Authorization

-  Each Hadoop service has a list of users and groups

-  Group permissions on HDFS filesystem components -  Audit

-  Hadoop log, YARN log, other logs -  Data Protection

-  Encryption in transit between Hadoop services & clients

-  Encryption in transit between DataNodes

-  Encryption in transit between web console & clients (HTTPS)

(20)

HADOOP SECURE MODE

Apache Hadoop Secure Mode: 2.6.0 (March 14’)

Data

Access

Data

Change

Job

Submission

Task

Access

Rogue

Node

User

Spoofing

Network

Security

Authentication

Authorization

Audit

Data

(21)

APACHE KNOX

The Apache Knox Gateway is a REST API Gateway for interacting with

Hadoop clusters. The Knox Gateway provides a single access point for all REST interactions with Hadoop clusters.

Knox can provide:

•  Authentication (LDAP and Active Directory Authentication Provider)

•  Federation/SSO (HTTP Header Based Identity Federation)

•  Authorization (Service Level Authorization)

•  Auditing Integrations:

- WebHDFS (HDFS), Templeton (Hcatalog), Stargate (Hbase), Oozie, Hive/ JDBC

(22)

APACHE RANGER

A centralized security framework to manage fine grained access control.

Status: Incubating Authentication

•  Kerberos in native Apache Hadoop

•  Secured by the Apache Knox Gateway via the HTTP/REST API

Authorization

•  on the folder and file level, via HDFS

•  on the database, table and column level, via Hive

•  on the table, column family and column level, via HBase

Audit

User access auditing in HDFS, Hive and HBase at IP address, Resource/resource type, Timestamp, Access granted or denied

Data Protection

•  Wire, volume and file/column encryotion

•  HDFS Transparent Encryption (TDE)

•  Third-Party Partners (Hortonworks)

Administration

•  Policy management, administration and delegation

(23)

HADOOP SECURITY POLICY

Authentication of processes:

-  May go into existing application security policy

Security Logging requirements:

-  Which applications must be logged?

-  Add node identifier to standard log records

De-anonymization Issues

-  Sparse data can be de-anonymized through matching to public sources

-  Could 200 days of tweets be matched to any of my de-identified data?

(24)

BUILD A SECURITY BASELINE

-  Start with your Vendor’s distribution

-  Add your company’s sauce

-  Review Hadoop Security Benchmark project at the Center For Internet

Security:

-  Apache Hadoop 2.6.0 Benchmark

-  Community Discussion

-  Editors and members get free access to validation tools

-  Everyone gets free access to baselines

-  Registration is moderated. That means human registrants are approved and

receive a welcome email.

-  Link:

(25)

HADOOP SECURITY REVIEW

1.  Start with the threats

2.  Choose your diagram

3.  Ask the standard security questions: u Network Security

u Authentication

u Authorization

u Security Audit

u Data Protection

4.  Update your policy

(26)

HADOOP SECURITY RESOURCES

1.  Apache “Hadoop in Secure Mode

http://tinyurl.com/hadoopSecureMode 2.  Yahoo Hadoop Tutorial

https://developer.yahoo.com/hadoop/tutorial

3.  Securosis: “Securing Big Data: Security Recommendations for Hadoop and NoSQL

Environments”, 10/12/2012, Adrian Lane

https://securosis.com/assets/library/reports/SecuringBigData_FINAL.pdf 4.  Cloudera: “Introduction to Hadoop Security”

http://tinyurl.com/cloudera50security 5.  Hortonworks: “Security for Enterprise Hadoop

http://hortonworks.com/innovation/security/ 6.  Center for Internet Security: Hadoop Security Baseline

http://tinyurl.com/HadoopSecurityBenchmark

(27)

QUESTIONS

?

References

Related documents

The Servizio dashboards, grids & reports provide clear data display and ease interrogation of data, which gives you certainty in your information so you can make

UCS Manufacturer shall responsible to assemble the panel components of this catalogue according to the Standard specifications listed above.. PRIMICERI SPA VIA DELLE AZALEE, 10 -

Samsung KNOX is a holistic enterprise mobility management solution based on the underlying security needs of enterprises' mobility initiatives.. KNOX is designed

If you would like someone to pray with you, pastors will be available at the front of the Worship Center after the service.. New at Knox or ready to get

Therefore, students enrolled in this course who, for individual assignments, submit another author’s or student’s work as their own, who submit templates or generic material

1. Gate access requires Knox box for key or Knox Gate switch for electronic bypass. Vegetation on this parcel shall comply with the requirements of the Tiburon Fire

Source: John Cribbs, PhD Candidate – Arizona State University Data Collection Period: 28 April, 2015 to 17 June, 2015 Model Stacking = Perpetual Updates. Perpetual Updates =

On the other hand, two-player zero-sum games lead to strategies guaranteeing a worst-case performance no matter how the environment behaves — however such strategies may be far

Recommendations regarding decision to proceed to a sibling-matched related donor (MRD) or matched- unrelated donor (MUD) allogeneic hematopoietic stem cell transplant (HSCT) as

For over 20 years the US Government has had as a major policy objective the use of Federal Government R&D programmes to support smaller businesses, and the key policy instrument

SATELLITE LAUNCHES FOR ASIA AND INDIA Arianespace will orbit two communications satellites on its third launch of the year: ST-2 for the operator ST-2 Satellite Ventures Pte Ltd.,

We find that the relation between cost complexity parameter, number of splits and cross-validation error is similar to the one in previous model (entropy tree).. As before, to

The ANOVA investigation indicated that the percentage contribution to the variance in the system was dominated by the cutting condition even more so than the tool wear, while

Discussion: The PREVENT-trial is a multicenter randomized controlled trial powered to determine whether prophylactic placement of a polypropylene mesh decreases the incidence of

In order to support the changing practices of teaching, from this study, the library and the School of Business will be able to utilize the suggestions that were recommended

Assessment data in Knox County point to a disturbing inconsistency in academic achievement across 

In the email app, tap left hardware button to display the menu > tap Settings > select your email account you wish to have signing and encryption > tap More settings

From within the Container view, tap the Menu key (lower left button) and select KNOX settings. From this view you can change your password, determine your KNOX application version,

KNOX 1.0 Manage untrusted certificate restriction list KNOX 1.0 Certificates Revocation Status Check KNOX 1.0 Certificate Validation at install time KNOX 1.0 Container

Second, we tested whether interindividual differences in this peripheral sensitivity to the chances of winning were explained by trait impulsivity, reward sensitivity, and

has an influence on the bonding characteristics onto zirconia ceramic substrate. As 5% and 10% are the most commonly adopted hydrofluoric acid concentrations used to etch lithium

Table 3: This NCC comparison table shows that the values of the noisy image and various filters such as median filter, mean filter, FMM (fuzzy-mean-median filter) filter and