9 Tips for Securing Big Data


#4 Encrypt data both at rest and in motion:

"File encryption addresses two attacker methods for circumventing normal application security controls," says Adrian Lane, analyst and CTO of security research and advisory firm Securosis. "Encryption protects in case malicious users or administrators gain access to data nodes and directly inspect files, and it also renders stolen files or disk images unreadable. It is transparent to both Hadoop and calling applications and scales out as the cluster grows. This is a cost-effective way to address several data security threats.”

#5 Separate your keys and your encrypted data:

Security methods like server encryption and code security is not the only protective measure that an organization needs. It’s better to deploy a key management system which allows storing encryption keys safely and separately from the data that needs to be protected.

#6 Use the Kerberos network authentication protocol:

"This is an effective method for keeping rogue nodes and applications off your cluster," Lane says. "And it can help protect web console access, making administrative functions harder to compromise. We know Kerberos is a pain to set up, and re-validation of new nodes and applications take work. But without bi-directional trust establishment, it is too easy to fool Hadoop into letting malicious applications into the cluster, or into accepting the introduction of malicious nodes—-which can then add, alter or extract data. Kerberos is one of the most effective security controls at your disposal, and it's built into the Hadoop infrastructure, so use it."

Also Read: 9 Must-Watch 'Everything-as-a-Service' (XaaS) Companies

Also Read: 10 Most Common Mistakes You Make With Your Data Centre