SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Data Security Challenges and Its
Solutions in Cloud Environment
Threats, Security Responsibilities, Compliances, Solutions
WAREVALLEY
http://www.warevalley.com
www.warevalley.com
1. Excessive and Unused Privileges
2. Privileges Abuse
3. Input Injection (Formerly SQL Injection)
4. Malware
5. Weak Audit Trail
6. Storage Media Exposure
7. Exploitation of Vulnerable, Misconfigured Databases
8. Unmanaged Sensitive Data
9. Denial of Service
10. Limited Security Expertise and Education
Top Ten Database Security Threat
Source : 2014 Verizon Data Breach Report
Traditional databases, Big Data / On-Premise or Cloud
www.warevalley.com
1. Default, Blank & Weak Username/Password
2. SQL Injections in the DBMS
3. Excessive User & Group Privilege
4. Unnecessary Enabled Database Features
5. Broken Configuration Management
6. Buffer Overflows
7. Privilege Escalation
8. Denial of Service Attack DoS
9. Unpatched Databases
10. Unencrypted Sensitive data – at rest and in motion
Top Ten Database Vulnerabilities and
Misconfigurations
Source : Team SHATTER
www.warevalley.com
Database Security on Cloud
1. What data are you moving ?
• Sensitive Data Discovery
• IT Compliances after you move data to cloud
• Security Hole in data migration
2. Who is accessing the database?
• Administrators, Developers and Applications
• DAP, Masking, Encryption, Approval Process
3. To where are you moving the data?
• Physical and Network Security infrastructures
• Who has administration access to the database ?
• Different geographic locations = Different regulations, laws and standards
Source : Security Week
www.warevalley.com
Responsibility Challenge on Cloud
1. Protecting the data as it moves to the cloud
• Data-in-motion encryption : SSL or VPN
2. Hardening instances
• With IaaS, the customer is responsible for securing the operating
system. This includes hardening processes, patches, security software
installation and following the database vendor’s security guidelines.
3. Protect management console access
• Role-based access to dashboard
• Data recovery plan to an external location
4. Prepare plan for availability, backups, DR and Business Continuity
• Using IaaS provider’s tools for backup and DR
• Customer is responsible for deploying others
Source : Security Week
www.warevalley.com
Shared Responsibility Model for Abstracted Services
Customer
Responsible for
Security ‘IN’ the Cloud
AWS
Responsible for
Security ‘OF’ the Cloud
www.warevalley.com
Shared Responsibility Model – Microsoft Azure
www.warevalley.com
Shared Responsibility Model by Service Type
www.warevalley.com
Compliance Challenge on Cloud
1. Understanding where the data
• Regulated data should be mapped to exact locations.
2. Separation of duties
• Between production and test environment data
• Between non-regulated and regulated applications
• Between the different roles involved with handling the data
3. Identity Management
4. Access controls should be in place
• All sensitive data should be governed, monitored and approved.
Source : Security Week
www.warevalley.com
Compliance Challenge on Cloud
5. Encryption and encryption alternatives
• Data encryption, tokenization, data masking
6. Detecting, Preventing and mitigating attacks
• Detect and prevent attacks on the database (e.g., SQL injection attacks)
• Adequate controls and audit infrastructure
7. Operational Security
• Govern asset management,
• Change management, production access,
• Periodic vulnerability scanning,
• Adequate remediation procedures,
• User access audit, management operation
• Event response procedures
Source : Security Week
www.warevalley.com
Considering database security on cloud
 Database Access Management
 Database Firewall
 Sensitive Data Discovery
 Database Encryption
 Dynamic Data Masking
 Database Authentication
 SQL Injection Attacks
 Database Compliance Reports
www.warevalley.com
Amazon RDS Security Features
• Run your DB instance in an Amazon Virtual Private Cloud (VPC)
– Network Access Control
• Use AWS Identity and Access Management (IAM) - assign
permissions that determine who is allowed to manage RDS resources
• Use security groups - control what IP addresses or EC2 instances can
connect to your databases on a DB instance
• Use Secure Socket Layer (SSL) connections with DB instances
• Use RDS encryption - AES-256 encryption algorithm to encrypt your
data
• Use network encryption and transparent data encryption with
Oracle DB instances
• Use the security features of your DB engine
Source : AWS
www.warevalley.com
Azure Database Security Features
• Firewall - IP addresses, can access a logical Azure SQL Server or a
specific database
• Secure Connection - Secure communication from clients based
on the TDS protocol over TLS (Transport Layer Security)
• Auditing - auditing events include insert, update, and delete
events on tables /Audit logs in Azure table storage and build
reports on top of them
• Data masking - SQL users excluded from masking, Masking rules
& functions
• Row-level Security - Aimed at multi-tenant applications that
share data in a single table within the same database.
Source : blogs.msdn.microsoft.com
www.warevalley.com
DCAP Capabilities offered by Vendors
Source : Gartner (Nov. 2014)
Data-Centric Audit and Protection
www.warevalley.com
Chakra MAX V2
• Database(System) Audit and Protection
• Database(System) Activity Monitoring
• Database(System) Work Approval Process
• Dynamic Data Masking
• Sensitive Data Discovery
• Compliance Reports
Systems
Windows
HP-UX
AIX
Solaris
Linux
Mainframe
Databases
Oracle / Time-Stan /Exadata
Microsoft SQL Server
IBM DB2 (Mainframe, UDB)
SAP Sybase IQ/ASE
SAP HANA
Mysql / MariaDB
IBM Netezza
TeraData
PostgreSQL / Greenplum
Altibase / Tibero / Cubrid / Kairos / SunDB
Amazon RedShift / Aurora
Dameng DM7
Fujitsu Symfoware
PetaSQL
Chakra MAX(Database Audit and Protection) on Cloud
www.warevalley.com
Chakra MAX(Database Audit and Protection) on Cloud
DB service
STAP
Chakra MAX for AWS RDS(DB as a service)
• Sniffing is Impossible - Port Mirror (X), TAP(X), STAP(X)
• Gateway(Proxy Sever) is OK
Chakra MAX for EC2 (Infrastructure as a service)
• Sniffing is Possible – STAP
• Gateway(Proxy Server) is OK
DB service
STAP
RDS
EC2
Gateway Only
Gateway + Sniffing
www.warevalley.com
Chakra MAX(Database Audit and Protection) on Cloud
Client A
AWS
Client B
WAS (EC2)
DB (RDS)
Chakra Max SAGENT
Chakra Max (EC2)
SAGENT analyze end user’s information
and notify it to Chakra MAX
Client A
Client B
WEB Users
Internet
DB Users
①
①
①
②
Internet
②
DB users connect to DB
through Chakra MAX server
as gateway(Proxy) mode.
Blocking backdoor
connection
User Access Control
DNS
Mapping DNS to real IP Address
Sniffing Mode (Database Activity Monitoring)
Gateway Mode (Database Audit and Protection)
www.warevalley.com
Systems DatabasesWeb
Cyclone V3
• Auto Service Discovery
• Sensitive Data Discovery in System/DB
• Database Audit / Change Management
• DB Vulnerability Assessment
• Compliance Reports
Cyclone(Database Security Assessment) on Cloud
www.warevalley.com
Cyclone(Database Security Assessment) on Cloud
Sensitive Data, Security Holes, Vulnerabilities on your Database !
www.warevalley.com
Plugin
Authorized User (Plain Text)
Unauthorized User (Cipher Text or Masked)
Sensitive Data (Columns)
has been Encrypted
End User (Plain Text)
Galea(Database Encryption-Column Level) on Cloud
API
Authorized Applications
www.warevalley.com
Galea(Database Encryption-Column Level) on Cloud
Column-Level Encryption Plan
(Algorithm, Keys ..)
Authorization Policies to Decrypt
(Client IP, DB User, Application, Time & Date)
Return Masked Data
Return Encrypted Data
Return Decrypted Data
Unauthorized Users
Authorized Users
No need to modify customer’s application !
www.warevalley.com
WAREVALLEY : Database Security and Management
DB Encryption (Plugin) DB Encryption (API)
DB (System) Audit and Protection
Dynamic Data Masking
Work Flow Process
DB Administration, Performance Monitoring
Data Quality Assessment
Sensitive Data Discovery
DB Security Assessment
DB Vulnerability Assessment
Big Data Analysis
Datawarehouse

Más contenido relacionado

La actualidad más candente

Next gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forteNext gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forte
Microsoft Singapore
 
Components of a Data-Warehouse
Components of a Data-WarehouseComponents of a Data-Warehouse
Components of a Data-Warehouse
Abdul Aslam
 
A3 oracle database 12c extreme performance for cloud computing
A3   oracle database 12c extreme performance for cloud computingA3   oracle database 12c extreme performance for cloud computing
A3 oracle database 12c extreme performance for cloud computing
Dr. Wilfred Lin (Ph.D.)
 

La actualidad más candente (20)

5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-Ready5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-Ready
 
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and Roadmap
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and RoadmapDenodo DataFest 2016: What’s New in Denodo Platform – Demo and Roadmap
Denodo DataFest 2016: What’s New in Denodo Platform – Demo and Roadmap
 
Dbm630_Lecture02-03
Dbm630_Lecture02-03Dbm630_Lecture02-03
Dbm630_Lecture02-03
 
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with OktopusDenodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
 
EDB Guide
EDB GuideEDB Guide
EDB Guide
 
Future of Data Strategy
Future of Data StrategyFuture of Data Strategy
Future of Data Strategy
 
Gdpr ccpa automated compliance - spark java application features and functi...
Gdpr   ccpa automated compliance - spark java application features and functi...Gdpr   ccpa automated compliance - spark java application features and functi...
Gdpr ccpa automated compliance - spark java application features and functi...
 
White paper making an-operational_data_store_(ods)_the_center_of_your_data_...
White paper   making an-operational_data_store_(ods)_the_center_of_your_data_...White paper   making an-operational_data_store_(ods)_the_center_of_your_data_...
White paper making an-operational_data_store_(ods)_the_center_of_your_data_...
 
Reconciling your Enterprise Data Warehouse to Source Systems
Reconciling your Enterprise Data Warehouse to Source SystemsReconciling your Enterprise Data Warehouse to Source Systems
Reconciling your Enterprise Data Warehouse to Source Systems
 
Metastudio DRM. Product presentation (en)
Metastudio DRM. Product presentation (en)Metastudio DRM. Product presentation (en)
Metastudio DRM. Product presentation (en)
 
Big Data: SQL query federation for Hadoop and RDBMS data
Big Data:  SQL query federation for Hadoop and RDBMS dataBig Data:  SQL query federation for Hadoop and RDBMS data
Big Data: SQL query federation for Hadoop and RDBMS data
 
Data warehouse testing
Data warehouse testingData warehouse testing
Data warehouse testing
 
Next gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forteNext gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forte
 
3 dw architectures
3 dw architectures3 dw architectures
3 dw architectures
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on Hadoop
 
Components of a Data-Warehouse
Components of a Data-WarehouseComponents of a Data-Warehouse
Components of a Data-Warehouse
 
Knowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your diseaseKnowing me, knowing you, knowing your disease
Knowing me, knowing you, knowing your disease
 
2013 OHSUG - Clinical Data Warehouse Implementation
2013 OHSUG - Clinical Data Warehouse Implementation2013 OHSUG - Clinical Data Warehouse Implementation
2013 OHSUG - Clinical Data Warehouse Implementation
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
 
A3 oracle database 12c extreme performance for cloud computing
A3   oracle database 12c extreme performance for cloud computingA3   oracle database 12c extreme performance for cloud computing
A3 oracle database 12c extreme performance for cloud computing
 

Destacado

跨平台開發從測試到架構
跨平台開發從測試到架構跨平台開發從測試到架構
跨平台開發從測試到架構
Chris Jeng
 

Destacado (18)

[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료
[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료
[2016 데이터 그랜드 컨퍼런스] 6 2(전략,솔루션). 큐브리드 오픈소스 dbms의 클라우드 구축 사례-발표자료
 
Trees in RDBs
Trees in RDBsTrees in RDBs
Trees in RDBs
 
PHP and database functionality
PHP and database functionalityPHP and database functionality
PHP and database functionality
 
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안
[2016 데이터 그랜드 컨퍼런스] 6 1(전략,솔루션). 지티원 dw 및 bi 환경에서의 효율적 데이터 흐름 관리 및 모니터링 방안
 
跨平台開發從測試到架構
跨平台開發從測試到架構跨平台開發從測試到架構
跨平台開發從測試到架構
 
2016 네이버sw기술소개
2016 네이버sw기술소개2016 네이버sw기술소개
2016 네이버sw기술소개
 
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대
[IGC 2016] 마인드셋 김승연 - 인공지능 플랫폼을 이용한 게임의 고객응대
 
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot
[2016 데이터 그랜드 컨퍼런스] 4 3(인공지능). 마인드셋 intro to mindbot
 
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측
[2016 데이터 그랜드 컨퍼런스] 4 2(인공지능). 위세아이텍 머신러닝플랫폼기반의철도사고위험예측
 
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스
[2016 데이터 그랜드 컨퍼런스] 3 3(io t). 메디플러스-phr 데이터를 활용한 환자건강관리서비스
 
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론
[2016 데이터 그랜드 컨퍼런스] 4 1(인공지능). 경희대 이경전 교수 경험과 사례를 통한 인공지능 응용 및 사업 방법론
 
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...
[2016 데이터 그랜드 컨퍼런스] 1 2. bk2(티맥스) 2016데이터그랜드컨퍼런스-티맥스소프트_클라우드 시대의 데이터베이스 시스템 변...
 
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data
[2016 데이터 그랜드 컨퍼런스] 6 5(전략, 솔루션). 뉴스젤리 social innovation with data
 
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...
[2016 데이터 그랜드 컨퍼런스] 3 1(io t). 핸디소프트-finding benefits of iot_service by case ...
 
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안
[2016 데이터 그랜드 컨퍼런스] 2 5(빅데이터). 유비원 비정형데이터 중심의 big data 활용방안
 
저성장 시대 데이터 경제만이 살길이다
저성장 시대 데이터 경제만이 살길이다저성장 시대 데이터 경제만이 살길이다
저성장 시대 데이터 경제만이 살길이다
 
Data Science Driven Malware Detection
Data Science Driven Malware DetectionData Science Driven Malware Detection
Data Science Driven Malware Detection
 
[FAST CAMPUS] 1강 data science overview
[FAST CAMPUS] 1강 data science overview [FAST CAMPUS] 1강 data science overview
[FAST CAMPUS] 1강 data science overview
 

Similar a [2016 데이터 그랜드 컨퍼런스] 5 1(보안,품질). 웨어밸리 data security challenges and its solutions in cloud environment

Rackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSRackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWS
Amazon Web Services
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
Amazon Web Services
 

Similar a [2016 데이터 그랜드 컨퍼런스] 5 1(보안,품질). 웨어밸리 data security challenges and its solutions in cloud environment (20)

Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud Infrastructure
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginners
 
Cloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWSCloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWS
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 
HIPAA Compliance in the Cloud
HIPAA Compliance in the CloudHIPAA Compliance in the Cloud
HIPAA Compliance in the Cloud
 
Rackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSRackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWS
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
Aws Architecture Fundamentals | Dallas
Aws Architecture Fundamentals | DallasAws Architecture Fundamentals | Dallas
Aws Architecture Fundamentals | Dallas
 
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
 
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account Structures
 
Big data security in AWS.pptx
Big data security in AWS.pptxBig data security in AWS.pptx
Big data security in AWS.pptx
 

Más de K data

Más de K data (15)

[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향
[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향
[2016 데이터 그랜드 컨퍼런스] 6 4(전략,솔루션). 신테카바이오 insilico-임상연구동향
 
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상
[2016 데이터 그랜드 컨퍼런스] 6 3(전략, 솔루션).크레딧데이터 공공데이터를 활용한 생활의 질 향상
 
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 비투엔 4차산업혁명의성공 데이터품질
 
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안
[2016 데이터 그랜드 컨퍼런스] 5 4(보안,품질). 바넷정보기술 컴플라이언스 대응을 위한 효율적인 데이터 관리 방안
 
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화
[2016 데이터 그랜드 컨퍼런스] 5 3(보안,품질). nh은행 금융플랫폼을 통한 핀테크 생태계 변화
 
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이 데이터정제와품질검증을위한mdm 시스템의기능과역할
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이  데이터정제와품질검증을위한mdm 시스템의기능과역할[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이  데이터정제와품질검증을위한mdm 시스템의기능과역할
[2016 데이터 그랜드 컨퍼런스] 5 2(보안,품질). 투비웨이 데이터정제와품질검증을위한mdm 시스템의기능과역할
 
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다
[2016 데이터 그랜드 컨퍼런스] 4 5(인공지능). 머니브레인 앱의 시대는 가고 인공지능 봇의 시대가 온다
 
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...
[2016 데이터 그랜드 컨퍼런스] 4 4(인공지능).마인즈랩 인공지능과 virtual assisstant-2016_datagrandcon...
 
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남
[2016 데이터 그랜드 컨퍼런스] 3 5(io t). 스마트박스-iot와 생활 속 사물함의 만남
 
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상
[2016 데이터 그랜드 컨퍼런스] 2 4(빅데이터). 오픈메이트 공간정보로 풀어보는 빅데이터 세상
 
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현
[2016 데이터 그랜드 컨퍼런스] 2 3(빅데이터). 엑셈 빅데이터 적용 사례 및 플랫폼 구현
 
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data
[2016 데이터 그랜드 컨퍼런스] 2 2(빅데이터). skt beyond big data
 
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략
[2016 데이터 그랜드 컨퍼런스] 2 1(빅데이터). 티맥스 빅데이터시대,더욱중요해진dw를위한어플라이언스전략
 
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아
[2016 데이터 그랜드 컨퍼런스] 1 3. bk3(엔코아)데이터그랜드컨퍼런스 4차산업혁명의 핵심-데이터경제-엔코아
 
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final
[2016 데이터 그랜드 컨퍼런스] 1 1. bk1(위세아이텍) 2016데이터그랜드컨퍼런스-머신러닝동향과 산업별 활용_김종현-final
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

[2016 데이터 그랜드 컨퍼런스] 5 1(보안,품질). 웨어밸리 data security challenges and its solutions in cloud environment

  • 1. Data Security Challenges and Its Solutions in Cloud Environment Threats, Security Responsibilities, Compliances, Solutions WAREVALLEY http://www.warevalley.com
  • 2. www.warevalley.com 1. Excessive and Unused Privileges 2. Privileges Abuse 3. Input Injection (Formerly SQL Injection) 4. Malware 5. Weak Audit Trail 6. Storage Media Exposure 7. Exploitation of Vulnerable, Misconfigured Databases 8. Unmanaged Sensitive Data 9. Denial of Service 10. Limited Security Expertise and Education Top Ten Database Security Threat Source : 2014 Verizon Data Breach Report Traditional databases, Big Data / On-Premise or Cloud
  • 3. www.warevalley.com 1. Default, Blank & Weak Username/Password 2. SQL Injections in the DBMS 3. Excessive User & Group Privilege 4. Unnecessary Enabled Database Features 5. Broken Configuration Management 6. Buffer Overflows 7. Privilege Escalation 8. Denial of Service Attack DoS 9. Unpatched Databases 10. Unencrypted Sensitive data – at rest and in motion Top Ten Database Vulnerabilities and Misconfigurations Source : Team SHATTER
  • 4. www.warevalley.com Database Security on Cloud 1. What data are you moving ? • Sensitive Data Discovery • IT Compliances after you move data to cloud • Security Hole in data migration 2. Who is accessing the database? • Administrators, Developers and Applications • DAP, Masking, Encryption, Approval Process 3. To where are you moving the data? • Physical and Network Security infrastructures • Who has administration access to the database ? • Different geographic locations = Different regulations, laws and standards Source : Security Week
  • 5. www.warevalley.com Responsibility Challenge on Cloud 1. Protecting the data as it moves to the cloud • Data-in-motion encryption : SSL or VPN 2. Hardening instances • With IaaS, the customer is responsible for securing the operating system. This includes hardening processes, patches, security software installation and following the database vendor’s security guidelines. 3. Protect management console access • Role-based access to dashboard • Data recovery plan to an external location 4. Prepare plan for availability, backups, DR and Business Continuity • Using IaaS provider’s tools for backup and DR • Customer is responsible for deploying others Source : Security Week
  • 6. www.warevalley.com Shared Responsibility Model for Abstracted Services Customer Responsible for Security ‘IN’ the Cloud AWS Responsible for Security ‘OF’ the Cloud
  • 9. www.warevalley.com Compliance Challenge on Cloud 1. Understanding where the data • Regulated data should be mapped to exact locations. 2. Separation of duties • Between production and test environment data • Between non-regulated and regulated applications • Between the different roles involved with handling the data 3. Identity Management 4. Access controls should be in place • All sensitive data should be governed, monitored and approved. Source : Security Week
  • 10. www.warevalley.com Compliance Challenge on Cloud 5. Encryption and encryption alternatives • Data encryption, tokenization, data masking 6. Detecting, Preventing and mitigating attacks • Detect and prevent attacks on the database (e.g., SQL injection attacks) • Adequate controls and audit infrastructure 7. Operational Security • Govern asset management, • Change management, production access, • Periodic vulnerability scanning, • Adequate remediation procedures, • User access audit, management operation • Event response procedures Source : Security Week
  • 11. www.warevalley.com Considering database security on cloud  Database Access Management  Database Firewall  Sensitive Data Discovery  Database Encryption  Dynamic Data Masking  Database Authentication  SQL Injection Attacks  Database Compliance Reports
  • 12. www.warevalley.com Amazon RDS Security Features • Run your DB instance in an Amazon Virtual Private Cloud (VPC) – Network Access Control • Use AWS Identity and Access Management (IAM) - assign permissions that determine who is allowed to manage RDS resources • Use security groups - control what IP addresses or EC2 instances can connect to your databases on a DB instance • Use Secure Socket Layer (SSL) connections with DB instances • Use RDS encryption - AES-256 encryption algorithm to encrypt your data • Use network encryption and transparent data encryption with Oracle DB instances • Use the security features of your DB engine Source : AWS
  • 13. www.warevalley.com Azure Database Security Features • Firewall - IP addresses, can access a logical Azure SQL Server or a specific database • Secure Connection - Secure communication from clients based on the TDS protocol over TLS (Transport Layer Security) • Auditing - auditing events include insert, update, and delete events on tables /Audit logs in Azure table storage and build reports on top of them • Data masking - SQL users excluded from masking, Masking rules & functions • Row-level Security - Aimed at multi-tenant applications that share data in a single table within the same database. Source : blogs.msdn.microsoft.com
  • 14. www.warevalley.com DCAP Capabilities offered by Vendors Source : Gartner (Nov. 2014) Data-Centric Audit and Protection
  • 15. www.warevalley.com Chakra MAX V2 • Database(System) Audit and Protection • Database(System) Activity Monitoring • Database(System) Work Approval Process • Dynamic Data Masking • Sensitive Data Discovery • Compliance Reports Systems Windows HP-UX AIX Solaris Linux Mainframe Databases Oracle / Time-Stan /Exadata Microsoft SQL Server IBM DB2 (Mainframe, UDB) SAP Sybase IQ/ASE SAP HANA Mysql / MariaDB IBM Netezza TeraData PostgreSQL / Greenplum Altibase / Tibero / Cubrid / Kairos / SunDB Amazon RedShift / Aurora Dameng DM7 Fujitsu Symfoware PetaSQL Chakra MAX(Database Audit and Protection) on Cloud
  • 16. www.warevalley.com Chakra MAX(Database Audit and Protection) on Cloud DB service STAP Chakra MAX for AWS RDS(DB as a service) • Sniffing is Impossible - Port Mirror (X), TAP(X), STAP(X) • Gateway(Proxy Sever) is OK Chakra MAX for EC2 (Infrastructure as a service) • Sniffing is Possible – STAP • Gateway(Proxy Server) is OK DB service STAP RDS EC2 Gateway Only Gateway + Sniffing
  • 17. www.warevalley.com Chakra MAX(Database Audit and Protection) on Cloud Client A AWS Client B WAS (EC2) DB (RDS) Chakra Max SAGENT Chakra Max (EC2) SAGENT analyze end user’s information and notify it to Chakra MAX Client A Client B WEB Users Internet DB Users ① ① ① ② Internet ② DB users connect to DB through Chakra MAX server as gateway(Proxy) mode. Blocking backdoor connection User Access Control DNS Mapping DNS to real IP Address Sniffing Mode (Database Activity Monitoring) Gateway Mode (Database Audit and Protection)
  • 18. www.warevalley.com Systems DatabasesWeb Cyclone V3 • Auto Service Discovery • Sensitive Data Discovery in System/DB • Database Audit / Change Management • DB Vulnerability Assessment • Compliance Reports Cyclone(Database Security Assessment) on Cloud
  • 19. www.warevalley.com Cyclone(Database Security Assessment) on Cloud Sensitive Data, Security Holes, Vulnerabilities on your Database !
  • 20. www.warevalley.com Plugin Authorized User (Plain Text) Unauthorized User (Cipher Text or Masked) Sensitive Data (Columns) has been Encrypted End User (Plain Text) Galea(Database Encryption-Column Level) on Cloud API Authorized Applications
  • 21. www.warevalley.com Galea(Database Encryption-Column Level) on Cloud Column-Level Encryption Plan (Algorithm, Keys ..) Authorization Policies to Decrypt (Client IP, DB User, Application, Time & Date) Return Masked Data Return Encrypted Data Return Decrypted Data Unauthorized Users Authorized Users No need to modify customer’s application !
  • 22. www.warevalley.com WAREVALLEY : Database Security and Management DB Encryption (Plugin) DB Encryption (API) DB (System) Audit and Protection Dynamic Data Masking Work Flow Process DB Administration, Performance Monitoring Data Quality Assessment Sensitive Data Discovery DB Security Assessment DB Vulnerability Assessment Big Data Analysis Datawarehouse