SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
1
© Worldpay 2016. All rights reserved.
Deploying Secure Clusters at Worldpay
David M Walker
Enterprise Data Platform Programme Director
27th October 2016
2 © Worldpay 2016. All rights reserved.2
Transactions Daily.
On average that’s per second.
merchants using >
payment methods & currencies
in countries and in the UK we
process % of all non-cash transactions
Worldpay In (Big) Numbers
In Store
Online
Mobile
3 © Worldpay 2016. All rights reserved.3
Who are our customers?
• You probably interact with Worldpay several times a day without realising it:
• But we also behind the payment provisions for over:
̶ 16,000 hairdressers - 24,000 restaurants - 9,000 pubs - etc.
• And after today you will probably notice everywhere
4 © Worldpay 2016. All rights reserved.4
Worldpay & Big Data
• In April 2015 we made the strategic decision to commit to a new enterprise
wide data platform to:
̶ Provide deep analytics and data driven decisions as well as traditional
reporting
̶ Source information from across all our platforms and bring it to one place
̶ Make this information available to our colleagues, our customers and our
partners
̶ Exploit disruptive open-source technologies
̶ Full commitment from CEO, CIO and Head of Data who initiated the project
• But with 13.1 billion transactions to a total value of £402bn from 2015 alone
and with a significant proportion of both your card and my card transaction
history in the system it had to be SECURE
5 © Worldpay 2016. All rights reserved.5
Any Loss Of Private Data Is A Financial & A Reputational Cost
• Card Data (PCI)
̶ Covered by the Payment Card Industry (PCI) Data Security Standard (DSS)
̶ Allows us to store PAN as long as it is encrypted, Cardholder Name, Expiry
Date but we must not store the CVV2 or the PIN
• Personally Identifiable Information (PII)
̶ Covered by Data Protection Acts – and there are many
̶ Any data that can be used to identify a living person
̶ Subject to laws of all countries whose cards we process
• Health Data (PHI)
̶ Any medical data – we don’t have any but we have a policy just in case!
• We define our policy as securing PxI – in other words if it contains Personal
Information regardless of type it needs securing
6 © Worldpay 2016. All rights reserved.6
Who are the Information Security Stakeholders?
Business
Security Legal
Needs appropriate access to
data at an appropriate level
to offer innovative data
services to our customers
and partnersHas to ensure that all data is
secure and protected from
sophisticated multi-level,
multi-faceted attack vectors
both externally and
internally
Ensure that the way in which
we use data is legal and
assesses the risks associated
with using information in
certain ways
Ultimately it is the potential for huge financial and reputational costs associated
with the loss or misuse of data that the organisation must protect itself from
7 © Worldpay 2016. All rights reserved.7
Platform CDE
End User Environment
Platform CDE
Enterprise Data Platform Card Data Environment (CDE)
Hadoop Infrastructure
What Does Worldpay’s Multi-Tenant Environment Look Like?
Data Lake
(Safe)
1:1 copies of
data in a
secure usable
format
Ingest Area
(Sensitive)
Tokenization
Lineage
Standardize
DQ
Monitoring
TDE
Protected
Enterprise Data Warehouse Tenant
Data Marts for Visualization & Reporting
Decision Services Tenant
Machine Learning & Data Science Modelling
Decision Services
Decision Engine
Shopper Insights Tenant
Analytics on Consumer Behavior
Many More Tenants To Come
Watch this space …
Third Party
Tokenization
Solution
End User
Interfaces
Corporate Infrastructure
Active Directory, Code Repository & Build Tools, Local Disk Encryption Tools, etc.
Operational
Payment Source
Infrastructure
Platform CDE
Operational
Payment Source
Infrastructure
Platform CDE
Operational
Payment Source
Infrastructure
LocalFileSystem(Sensitive)
Requiredforunpacksomefile
8 © Worldpay 2016. All rights reserved.8
Key Design Principles
• Security Designed In From Day 1
̶ Enabling security from the outset – this makes the initial build slower
but speeds up the ultimate delivery
• Hortonworks First
̶ If it was available, or likely to become available soon, within the platform
we would strive to make it work rather than buy a third party product
• Turn It All On
̶ If a security feature is available we would try and make use of it
• Staged Component Enablement
̶ Bring up, secure and test each Hadoop component before bringing users on. In our case Hive first, before we looked at
Oozie, etc.
• Third Party Product PoCs in our Production Environment
̶ Most vendors ‘can do a PoC quickly’ in the cloud – but most vendors have struggled to integrate into the secure
environment – some have eventually succeeded!
9 © Worldpay 2016. All rights reserved.9
The Outer Walls
• Firewalls & Network ACLs
̶ Put everything that forms part of the environment with
firewalls to minimise the attack surface
̶ Close all un-necessary ports – obvious but necessary
• Limit The Number Of Edge Nodes
̶ We have two – for load balancing and high availability
• Reverse Proxy For Connectivity
̶ Knox – integrated with Ranger in HortonWorks – to limit access
• Enforce Card Data Environment (CDE) Isolation
̶ Data Sources & Targets in a different CDE from the cluster
̶ Enforce highly restrictive data transfer routes
10 © Worldpay 2016. All rights reserved.10
Authentication Controls
• Kerberos
̶ Kerberise everything that you can
• Integrate with your Corporate AD/LDAP
̶ Ensure all authentication happens in one corporate system
̶ Watch out for “Please can you clone user X for user Y” that
causes privileges to leak
• Implement Role Based Access Controls (RBAC)
̶ The key to success is having smaller groups with regular audit rather than larger complex groups
• Store Keys & Certificates Securely
̶ Hadoop keys are all over the place – it is a significant exercise to manage them
̶ HortonWorks have developed Hardware Security Module (HSM) integration for us
̶ Certificate Management is a significant overhead
• Implement Attribute Based Access Controls (ABAC)
̶ Not fully there yet but a feature of Atlas/Ranger that will enable even tighter security
11 © Worldpay 2016. All rights reserved.11
Data In Motion
• Data Channels
̶ Use TLS 1.2 - anything less is not sufficient
• Terminal Session Connectivity Over SSH
̶ Todays norm but still needs mandating
̶ Requires access via JumpBox controlled via AD
• Web Interfaces for Management and Users all over https
̶ Many components default to unsecure http
• Do this for each and every Hadoop component
̶ It is not sufficient to do this at the start of the build.
̶ Each component needs to be checked when added and when updated
• Managing inside the cluster is only the start
̶ Integrating with legacy sources that may not support secure protocols is much harder
12 © Worldpay 2016. All rights reserved.12
Data At Rest – Local Disk
• Protect Local Disk
̶ We use a third party product to ensure that local disk is encrypted
wherever data could land
̶ Even ‘root’ can not read some file systems as authentication and
access happens outside the server itself
̶ Note that your local disk will contain critical sensitive information if
for example you use Map-Reduce the Reducers cache intermediate
results
̶ Watch out for poorly written Third Party Products – we evaluated one
encryption tool that wrote a log file that said ‘Encrypting 123 as XYZ’
13 © Worldpay 2016. All rights reserved.13
Data At Rest – HDFS
• Protect HDFS
̶ Enable Transparent Data Encryption (TDE) for areas with Sensitive
Data
̶ Understand the HDFS processes
̶ Deleted files end up in Trash (except TDE)
̶ Snapshots/ Replicas/Backups preserve copies of sensitive data
̶ Replication between clusters means managing keys between clusters
̶ TDE comes with a performance overhead
• Pay the uplift for dead disk retention
̶ Destroy disks that have been on site and provide a ‘Certificate of Destruction’ rather than
let the vendor take them away for recycling
14 © Worldpay 2016. All rights reserved.14
Data At Rest – Tokenization
• Tokenise/Encrypt Data As Soon As Possible
̶ AES256 as a minimum for encryption
̶ Worldpay have used a Third Party Product for Tokenisation
̶ As with all crypto – DON’T ROLL YOUR OWN!
̶ Think about key rotation – you need to compare the tokenised data over
many years (Worldpay = 7 years) but must manage a 6 month key rotation?
• Universally Unique Obviously Tokenised PAN (Card) Data
̶ Our Third Party Tool allows us to create tokenised data
̶ Universally Unique – Every encrypted card number will always be the same regardless of key
rotation, and each card number maps to only one token
̶ Obviously Tokenised - a 16 digit card number (1234 5678 7890 1234) becomes a 16 digit upper case
string (ABCD EFGH IJKL MNOP) – this means that if a card number does bypass all the checks it is
immediately obvious to the user and can be reported
̶ We have an alternative token scheme for sharing data with customers and partners so that the core
tokens are for internal use only
15 © Worldpay 2016. All rights reserved.15
Hadoop Infrastructure
Our End To End Process for Data At Rest
Data Lake:
Safe Data
(Tokenized)
Secure Usable Data
With Higher Performance
Ingest Area:
Sensitive Data
(TDE Encrypted)
PxI Data Checks,
Tokenization &
Then Deleted
Local Disk on
Edge Nodes
(Encrypted)
De-compression
& HDFS Load
sftp, scp, etc.
Replication Tools, Spark Streaming, Sqoop, etc.
hdfs –dfs cp
16 © Worldpay 2016. All rights reserved.16
Environment Management – Core To Security
• Frequent Patch Cycle
̶ Take updates for Linux OS, Hadoop and Third Party Products as soon as is practical
̶ Linux and Third Party Tools tend to be stable and have a slower release but this is part of why we limit
the number of third party products
̶ Hadoop changes tend to be more frequent and the amount of change in a release is also significant so
keeping up to date and re-testing the security is a major undertaking
̶ Every platform change is tested and documented on PPE1 by one SysAdmin, a second SysAdmin uses
the docs to perform the upgrade on PPE2 – and improves the documentation. PRD2 is then done by
both SysAdmins and PRD1 is done last. Then a consistency check is run across all environments
̶ Every software change is deployed in DEVL, TEST and then PROD environments
̶ All code (internal & external) is also code scanned
• Penetration Testing
̶ Quarterly Pen Tests - The pace of change dictates that a planned regular full test is required
• PCI DSS 3.2 Compliance
̶ We are just doing the paperwork to get our certification however we believe that we have already
addressed the requirement
̶ We view the requirement as both necessary and also as a useful checklist – where possible we will
move beyond this as a minimum requirement
17 © Worldpay 2016. All rights reserved.17
People are key to delivery and security
• CEO, CIO and Head of Data Transformation fully engaged
̶ There is no question that from the very top of the organisation
as a business is fully committed to delivering our Enterprise Data Platform and that
information and data security are core to that delivery
• Our Project Stakeholders
̶ Security, Operational Acceptance Testing (OAT), Service Transition (ST), Infrastructure & Operations (I&O)
and the Project Management Office (PMO) are engaged at every step of the process
• But most of all - our Enterprise Data Platform Team
̶ A team with a mixture of youth and experience that has grown from 1 to 30 people in 18 months
̶ Predominately internal people with support from the vendors and big data consultancies and backfill
from contract resource
̶ We target 70% permanent, 20% contractor, 10% consultancy – but usually miss!
̶ We act as one team regardless of the company that employs the person
18 © Worldpay 2016. All rights reserved.18
The Enterprise Data Platform Team
Programme
Director
Data
Governance
Systems
Engineering
Systems
Analysis
Data
Engineering
Project
Management
• Security Policy
• Metadata
• Data Lifecycle
• Data Model Standards
• Data Quality
Management
• Development Lifecycle
• Hadoop
• Linux
• Third Party Products
• Platform Support
• Systems Security
Implementation
• Data Model Design
• Data Requirements
Analysis
• Source System Analysis
including Sensitive Data
Identification
• Source to Target Mapping
• Data Loading
(Batch & Stream)
• Code Management &
Deployment
• Testing
• Data Security
Implementation
• Stakeholder
Management:
PMO, OAT, ST, I&O,
Security
• PCI Audit
• Planning & Resources
19 © Worldpay 2016. All rights reserved.19
What have been the pain points?
• Translating Open Source into Enterprise Ready
̶ Each open source component (Hive, Hbase, Spark, etc.) does it’s own thing with security – and tends to think that is
sufficient – as a business we look across the platform – we want to secure the Enterprise Data Platform not Hive
̶ Standardising which database is used by each component for backing metadata store (we settled on Postgres in the end)
̶ Also remember that just because it is the vendor release does not mean it is GA – some items will be Incubator Status on
Apache
• Turning EVERYTHING ON - we wanted to do this but it does create pain
̶ It is clear that very few, if any, other organisations have enabled as many security features as we have and consequently
we have hit every pothole along the road and had to solve them
̶ Our work has contributed to the latest HortonWorks Security Guide (see http://docs.hortonworks.com)
• Vendor Specific Security Integration
̶ HortonWorks (Ambari/Ranger), Cloudera (Sentry) & MapR all have different interfaces for managing security.
̶ Knowledge on how to configure each specific distribution is difficult to resource
• Understanding
̶ It has been hard to persuade people (especially vendors) just how serious and competent the team is about building a
robust, secure environment and that it if we find a issue then it is they that are likely to have a problem. Vendors are
learning with us what it takes to build secure open source big data platforms
20 © Worldpay 2016. All rights reserved.20
Who are our technology partners?
Hardware &
Networking Supplier
Strategic
Core Hadoop Distribution
Strategic Architecture
Consulting
Systems & Data Engineers
Systems & Data EngineersTokenization
Local File System
EncryptionENTERPRISE DATA PLATFORM
21 © Worldpay 2016. All rights reserved.21
Some Stats About Our Environment
• Two Production Clusters (56 nodes) and Two PPE Clusters (16 nodes)
̶ All environments are built using the same templates and build instructions
̶ The average Data Node has 12x4Tb disk, 256Gb Memory and 20 cores
̶ Our clusters are on premise and we have the capability to burst to cloud infrastructure with secured
(tokenised) data
• We’ve upgraded from HDP 2.3 to HDP 2.4 to HDP 2.5 in 18 months
̶ And security and ease of management have improved with each release
• We’ve loaded 60+ Billion Card Transactions from two of Worldpay’s systems
̶ And we are busy at work to get all the other systems on board as both batch and real-time streams
• We’re in the process of delivering to Users and Systems
̶ Users have secure data access with a range of desktop and web tools to the Transaction History
̶ We are in the process of deploying Machine Learning Derived Algorithms back into payment platforms
22
© Worldpay 2016. All rights reserved.
Leaders in Modern Money
Innovating In Secure Modern Data Analytics
Thank You
David M Walker (david.walker@worldpay.com)
Enterprise Data Platform Programme Director

Más contenido relacionado

La actualidad más candente

Oracle BI06 From Volume To Value - Presentation
Oracle BI06   From Volume To Value - PresentationOracle BI06   From Volume To Value - Presentation
Oracle BI06 From Volume To Value - PresentationDavid Walker
 
How Real TIme Data Changes the Data Warehouse
How Real TIme Data Changes the Data WarehouseHow Real TIme Data Changes the Data Warehouse
How Real TIme Data Changes the Data Warehousemark madsen
 
Data Warehousing 2016
Data Warehousing 2016Data Warehousing 2016
Data Warehousing 2016Kent Graziano
 
Are You Killing the Benefits of Your Data Lake?
Are You Killing the Benefits of Your Data Lake?Are You Killing the Benefits of Your Data Lake?
Are You Killing the Benefits of Your Data Lake?Denodo
 
Microsoft SQL Azure - Scaling Out with SQL Azure Whitepaper
Microsoft SQL Azure - Scaling Out with SQL Azure WhitepaperMicrosoft SQL Azure - Scaling Out with SQL Azure Whitepaper
Microsoft SQL Azure - Scaling Out with SQL Azure WhitepaperMicrosoft Private Cloud
 
BigData & CDN - OOP2011 (Pavlo Baron)
BigData & CDN - OOP2011 (Pavlo Baron)BigData & CDN - OOP2011 (Pavlo Baron)
BigData & CDN - OOP2011 (Pavlo Baron)Pavlo Baron
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User InformationDenodo
 
Wallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation RoadmapWallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation RoadmapDavid Walker
 
Guru4Pro Data Vault Best Practices
Guru4Pro Data Vault Best PracticesGuru4Pro Data Vault Best Practices
Guru4Pro Data Vault Best PracticesCGI
 
Ten Pillars of World Class Data Virtualization
Ten Pillars of World Class Data VirtualizationTen Pillars of World Class Data Virtualization
Ten Pillars of World Class Data VirtualizationDenodo
 
Data Science Operationalization: The Journey of Enterprise AI
Data Science Operationalization: The Journey of Enterprise AIData Science Operationalization: The Journey of Enterprise AI
Data Science Operationalization: The Journey of Enterprise AIDenodo
 
How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)Denodo
 
Implementing Data Virtualization for Data Warehouses and Master Data Manageme...
Implementing Data Virtualization for Data Warehouses and Master Data Manageme...Implementing Data Virtualization for Data Warehouses and Master Data Manageme...
Implementing Data Virtualization for Data Warehouses and Master Data Manageme...Denodo
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureZaloni
 
Analyst View of Data Virtualization: Conversations with Boulder Business Inte...
Analyst View of Data Virtualization: Conversations with Boulder Business Inte...Analyst View of Data Virtualization: Conversations with Boulder Business Inte...
Analyst View of Data Virtualization: Conversations with Boulder Business Inte...Denodo
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaCaserta
 
A beginners guide to Cloudera Hadoop
A beginners guide to Cloudera HadoopA beginners guide to Cloudera Hadoop
A beginners guide to Cloudera HadoopDavid Yahalom
 
SAP Analytics Cloud: Haben Sie schon alle Datenquellen im Live-Zugriff?
SAP Analytics Cloud: Haben Sie schon alle Datenquellen im Live-Zugriff?SAP Analytics Cloud: Haben Sie schon alle Datenquellen im Live-Zugriff?
SAP Analytics Cloud: Haben Sie schon alle Datenquellen im Live-Zugriff?Denodo
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationDenodo
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Denodo
 

La actualidad más candente (20)

Oracle BI06 From Volume To Value - Presentation
Oracle BI06   From Volume To Value - PresentationOracle BI06   From Volume To Value - Presentation
Oracle BI06 From Volume To Value - Presentation
 
How Real TIme Data Changes the Data Warehouse
How Real TIme Data Changes the Data WarehouseHow Real TIme Data Changes the Data Warehouse
How Real TIme Data Changes the Data Warehouse
 
Data Warehousing 2016
Data Warehousing 2016Data Warehousing 2016
Data Warehousing 2016
 
Are You Killing the Benefits of Your Data Lake?
Are You Killing the Benefits of Your Data Lake?Are You Killing the Benefits of Your Data Lake?
Are You Killing the Benefits of Your Data Lake?
 
Microsoft SQL Azure - Scaling Out with SQL Azure Whitepaper
Microsoft SQL Azure - Scaling Out with SQL Azure WhitepaperMicrosoft SQL Azure - Scaling Out with SQL Azure Whitepaper
Microsoft SQL Azure - Scaling Out with SQL Azure Whitepaper
 
BigData & CDN - OOP2011 (Pavlo Baron)
BigData & CDN - OOP2011 (Pavlo Baron)BigData & CDN - OOP2011 (Pavlo Baron)
BigData & CDN - OOP2011 (Pavlo Baron)
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
Wallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation RoadmapWallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation Roadmap
 
Guru4Pro Data Vault Best Practices
Guru4Pro Data Vault Best PracticesGuru4Pro Data Vault Best Practices
Guru4Pro Data Vault Best Practices
 
Ten Pillars of World Class Data Virtualization
Ten Pillars of World Class Data VirtualizationTen Pillars of World Class Data Virtualization
Ten Pillars of World Class Data Virtualization
 
Data Science Operationalization: The Journey of Enterprise AI
Data Science Operationalization: The Journey of Enterprise AIData Science Operationalization: The Journey of Enterprise AI
Data Science Operationalization: The Journey of Enterprise AI
 
How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)
 
Implementing Data Virtualization for Data Warehouses and Master Data Manageme...
Implementing Data Virtualization for Data Warehouses and Master Data Manageme...Implementing Data Virtualization for Data Warehouses and Master Data Manageme...
Implementing Data Virtualization for Data Warehouses and Master Data Manageme...
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data Architecture
 
Analyst View of Data Virtualization: Conversations with Boulder Business Inte...
Analyst View of Data Virtualization: Conversations with Boulder Business Inte...Analyst View of Data Virtualization: Conversations with Boulder Business Inte...
Analyst View of Data Virtualization: Conversations with Boulder Business Inte...
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
 
A beginners guide to Cloudera Hadoop
A beginners guide to Cloudera HadoopA beginners guide to Cloudera Hadoop
A beginners guide to Cloudera Hadoop
 
SAP Analytics Cloud: Haben Sie schon alle Datenquellen im Live-Zugriff?
SAP Analytics Cloud: Haben Sie schon alle Datenquellen im Live-Zugriff?SAP Analytics Cloud: Haben Sie schon alle Datenquellen im Live-Zugriff?
SAP Analytics Cloud: Haben Sie schon alle Datenquellen im Live-Zugriff?
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
 

Similar a Big Data Week 2016 - Worldpay - Deploying Secure Clusters

Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...DataWorks Summit
 
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...DataWorks Summit/Hadoop Summit
 
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...DataStax
 
Will Your Cloud Be Compliant? OpenStack Security
Will Your Cloud Be Compliant?  OpenStack SecurityWill Your Cloud Be Compliant?  OpenStack Security
Will Your Cloud Be Compliant? OpenStack SecurityScott Carlson
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Application Architectures with Hadoop
Application Architectures with HadoopApplication Architectures with Hadoop
Application Architectures with Hadoophadooparchbook
 
Application Architectures with Hadoop | Data Day Texas 2015
Application Architectures with Hadoop | Data Day Texas 2015Application Architectures with Hadoop | Data Day Texas 2015
Application Architectures with Hadoop | Data Day Texas 2015Cloudera, Inc.
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesDataStax
 
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Cloudera, Inc.
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADERocket Software
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthStephanie Bies
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthStephanie Bies
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Cloudera, Inc.
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Application Architectures with Hadoop
Application Architectures with HadoopApplication Architectures with Hadoop
Application Architectures with Hadoophadooparchbook
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 

Similar a Big Data Week 2016 - Worldpay - Deploying Secure Clusters (20)

Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
 
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
 
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
 
Will Your Cloud Be Compliant? OpenStack Security
Will Your Cloud Be Compliant?  OpenStack SecurityWill Your Cloud Be Compliant?  OpenStack Security
Will Your Cloud Be Compliant? OpenStack Security
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Application Architectures with Hadoop
Application Architectures with HadoopApplication Architectures with Hadoop
Application Architectures with Hadoop
 
Application Architectures with Hadoop | Data Day Texas 2015
Application Architectures with Hadoop | Data Day Texas 2015Application Architectures with Hadoop | Data Day Texas 2015
Application Architectures with Hadoop | Data Day Texas 2015
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Application Architectures with Hadoop
Application Architectures with HadoopApplication Architectures with Hadoop
Application Architectures with Hadoop
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 

Más de David Walker

Moving To MicroServices
Moving To MicroServicesMoving To MicroServices
Moving To MicroServicesDavid Walker
 
Big Data Analytics 2017 - Worldpay - Empowering Payments
Big Data Analytics 2017  - Worldpay - Empowering PaymentsBig Data Analytics 2017  - Worldpay - Empowering Payments
Big Data Analytics 2017 - Worldpay - Empowering PaymentsDavid Walker
 
Data Driven Insurance Underwriting
Data Driven Insurance UnderwritingData Driven Insurance Underwriting
Data Driven Insurance UnderwritingDavid Walker
 
Data Driven Insurance Underwriting (Dutch Language Version)
Data Driven Insurance Underwriting (Dutch Language Version)Data Driven Insurance Underwriting (Dutch Language Version)
Data Driven Insurance Underwriting (Dutch Language Version)David Walker
 
An introduction to data virtualization in business intelligence
An introduction to data virtualization in business intelligenceAn introduction to data virtualization in business intelligence
An introduction to data virtualization in business intelligenceDavid Walker
 
BI SaaS & Cloud Strategies for Telcos
BI SaaS & Cloud Strategies for TelcosBI SaaS & Cloud Strategies for Telcos
BI SaaS & Cloud Strategies for TelcosDavid Walker
 
Building an analytical platform
Building an analytical platformBuilding an analytical platform
Building an analytical platformDavid Walker
 
Gathering Business Requirements for Data Warehouses
Gathering Business Requirements for Data WarehousesGathering Business Requirements for Data Warehouses
Gathering Business Requirements for Data WarehousesDavid Walker
 
Building a data warehouse of call data records
Building a data warehouse of call data recordsBuilding a data warehouse of call data records
Building a data warehouse of call data recordsDavid Walker
 
Struggling with data management
Struggling with data managementStruggling with data management
Struggling with data managementDavid Walker
 
A linux mac os x command line interface
A linux mac os x command line interfaceA linux mac os x command line interface
A linux mac os x command line interfaceDavid Walker
 
Connections a life in the day of - david walker
Connections   a life in the day of - david walkerConnections   a life in the day of - david walker
Connections a life in the day of - david walkerDavid Walker
 
Conspectus data warehousing appliances – fad or future
Conspectus   data warehousing appliances – fad or futureConspectus   data warehousing appliances – fad or future
Conspectus data warehousing appliances – fad or futureDavid Walker
 
An introduction to social network data
An introduction to social network dataAn introduction to social network data
An introduction to social network dataDavid Walker
 
Using the right data model in a data mart
Using the right data model in a data martUsing the right data model in a data mart
Using the right data model in a data martDavid Walker
 
Implementing Netezza Spatial
Implementing Netezza SpatialImplementing Netezza Spatial
Implementing Netezza SpatialDavid Walker
 
UKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
UKOUG06 - An Introduction To Process Neutral Data Modelling - PresentationUKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
UKOUG06 - An Introduction To Process Neutral Data Modelling - PresentationDavid Walker
 
IRM09 - What Can IT Really Deliver For BI and DW - Presentation
IRM09 - What Can IT Really Deliver For BI and DW - PresentationIRM09 - What Can IT Really Deliver For BI and DW - Presentation
IRM09 - What Can IT Really Deliver For BI and DW - PresentationDavid Walker
 
ETIS11 - Enterprise Metadata Management
ETIS11 -  Enterprise Metadata ManagementETIS11 -  Enterprise Metadata Management
ETIS11 - Enterprise Metadata ManagementDavid Walker
 
ETIS11 - Agile Business Intelligence - Presentation
ETIS11 -  Agile Business Intelligence - PresentationETIS11 -  Agile Business Intelligence - Presentation
ETIS11 - Agile Business Intelligence - PresentationDavid Walker
 

Más de David Walker (20)

Moving To MicroServices
Moving To MicroServicesMoving To MicroServices
Moving To MicroServices
 
Big Data Analytics 2017 - Worldpay - Empowering Payments
Big Data Analytics 2017  - Worldpay - Empowering PaymentsBig Data Analytics 2017  - Worldpay - Empowering Payments
Big Data Analytics 2017 - Worldpay - Empowering Payments
 
Data Driven Insurance Underwriting
Data Driven Insurance UnderwritingData Driven Insurance Underwriting
Data Driven Insurance Underwriting
 
Data Driven Insurance Underwriting (Dutch Language Version)
Data Driven Insurance Underwriting (Dutch Language Version)Data Driven Insurance Underwriting (Dutch Language Version)
Data Driven Insurance Underwriting (Dutch Language Version)
 
An introduction to data virtualization in business intelligence
An introduction to data virtualization in business intelligenceAn introduction to data virtualization in business intelligence
An introduction to data virtualization in business intelligence
 
BI SaaS & Cloud Strategies for Telcos
BI SaaS & Cloud Strategies for TelcosBI SaaS & Cloud Strategies for Telcos
BI SaaS & Cloud Strategies for Telcos
 
Building an analytical platform
Building an analytical platformBuilding an analytical platform
Building an analytical platform
 
Gathering Business Requirements for Data Warehouses
Gathering Business Requirements for Data WarehousesGathering Business Requirements for Data Warehouses
Gathering Business Requirements for Data Warehouses
 
Building a data warehouse of call data records
Building a data warehouse of call data recordsBuilding a data warehouse of call data records
Building a data warehouse of call data records
 
Struggling with data management
Struggling with data managementStruggling with data management
Struggling with data management
 
A linux mac os x command line interface
A linux mac os x command line interfaceA linux mac os x command line interface
A linux mac os x command line interface
 
Connections a life in the day of - david walker
Connections   a life in the day of - david walkerConnections   a life in the day of - david walker
Connections a life in the day of - david walker
 
Conspectus data warehousing appliances – fad or future
Conspectus   data warehousing appliances – fad or futureConspectus   data warehousing appliances – fad or future
Conspectus data warehousing appliances – fad or future
 
An introduction to social network data
An introduction to social network dataAn introduction to social network data
An introduction to social network data
 
Using the right data model in a data mart
Using the right data model in a data martUsing the right data model in a data mart
Using the right data model in a data mart
 
Implementing Netezza Spatial
Implementing Netezza SpatialImplementing Netezza Spatial
Implementing Netezza Spatial
 
UKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
UKOUG06 - An Introduction To Process Neutral Data Modelling - PresentationUKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
UKOUG06 - An Introduction To Process Neutral Data Modelling - Presentation
 
IRM09 - What Can IT Really Deliver For BI and DW - Presentation
IRM09 - What Can IT Really Deliver For BI and DW - PresentationIRM09 - What Can IT Really Deliver For BI and DW - Presentation
IRM09 - What Can IT Really Deliver For BI and DW - Presentation
 
ETIS11 - Enterprise Metadata Management
ETIS11 -  Enterprise Metadata ManagementETIS11 -  Enterprise Metadata Management
ETIS11 - Enterprise Metadata Management
 
ETIS11 - Agile Business Intelligence - Presentation
ETIS11 -  Agile Business Intelligence - PresentationETIS11 -  Agile Business Intelligence - Presentation
ETIS11 - Agile Business Intelligence - Presentation
 

Último

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Big Data Week 2016 - Worldpay - Deploying Secure Clusters

  • 1. 1 © Worldpay 2016. All rights reserved. Deploying Secure Clusters at Worldpay David M Walker Enterprise Data Platform Programme Director 27th October 2016
  • 2. 2 © Worldpay 2016. All rights reserved.2 Transactions Daily. On average that’s per second. merchants using > payment methods & currencies in countries and in the UK we process % of all non-cash transactions Worldpay In (Big) Numbers In Store Online Mobile
  • 3. 3 © Worldpay 2016. All rights reserved.3 Who are our customers? • You probably interact with Worldpay several times a day without realising it: • But we also behind the payment provisions for over: ̶ 16,000 hairdressers - 24,000 restaurants - 9,000 pubs - etc. • And after today you will probably notice everywhere
  • 4. 4 © Worldpay 2016. All rights reserved.4 Worldpay & Big Data • In April 2015 we made the strategic decision to commit to a new enterprise wide data platform to: ̶ Provide deep analytics and data driven decisions as well as traditional reporting ̶ Source information from across all our platforms and bring it to one place ̶ Make this information available to our colleagues, our customers and our partners ̶ Exploit disruptive open-source technologies ̶ Full commitment from CEO, CIO and Head of Data who initiated the project • But with 13.1 billion transactions to a total value of £402bn from 2015 alone and with a significant proportion of both your card and my card transaction history in the system it had to be SECURE
  • 5. 5 © Worldpay 2016. All rights reserved.5 Any Loss Of Private Data Is A Financial & A Reputational Cost • Card Data (PCI) ̶ Covered by the Payment Card Industry (PCI) Data Security Standard (DSS) ̶ Allows us to store PAN as long as it is encrypted, Cardholder Name, Expiry Date but we must not store the CVV2 or the PIN • Personally Identifiable Information (PII) ̶ Covered by Data Protection Acts – and there are many ̶ Any data that can be used to identify a living person ̶ Subject to laws of all countries whose cards we process • Health Data (PHI) ̶ Any medical data – we don’t have any but we have a policy just in case! • We define our policy as securing PxI – in other words if it contains Personal Information regardless of type it needs securing
  • 6. 6 © Worldpay 2016. All rights reserved.6 Who are the Information Security Stakeholders? Business Security Legal Needs appropriate access to data at an appropriate level to offer innovative data services to our customers and partnersHas to ensure that all data is secure and protected from sophisticated multi-level, multi-faceted attack vectors both externally and internally Ensure that the way in which we use data is legal and assesses the risks associated with using information in certain ways Ultimately it is the potential for huge financial and reputational costs associated with the loss or misuse of data that the organisation must protect itself from
  • 7. 7 © Worldpay 2016. All rights reserved.7 Platform CDE End User Environment Platform CDE Enterprise Data Platform Card Data Environment (CDE) Hadoop Infrastructure What Does Worldpay’s Multi-Tenant Environment Look Like? Data Lake (Safe) 1:1 copies of data in a secure usable format Ingest Area (Sensitive) Tokenization Lineage Standardize DQ Monitoring TDE Protected Enterprise Data Warehouse Tenant Data Marts for Visualization & Reporting Decision Services Tenant Machine Learning & Data Science Modelling Decision Services Decision Engine Shopper Insights Tenant Analytics on Consumer Behavior Many More Tenants To Come Watch this space … Third Party Tokenization Solution End User Interfaces Corporate Infrastructure Active Directory, Code Repository & Build Tools, Local Disk Encryption Tools, etc. Operational Payment Source Infrastructure Platform CDE Operational Payment Source Infrastructure Platform CDE Operational Payment Source Infrastructure LocalFileSystem(Sensitive) Requiredforunpacksomefile
  • 8. 8 © Worldpay 2016. All rights reserved.8 Key Design Principles • Security Designed In From Day 1 ̶ Enabling security from the outset – this makes the initial build slower but speeds up the ultimate delivery • Hortonworks First ̶ If it was available, or likely to become available soon, within the platform we would strive to make it work rather than buy a third party product • Turn It All On ̶ If a security feature is available we would try and make use of it • Staged Component Enablement ̶ Bring up, secure and test each Hadoop component before bringing users on. In our case Hive first, before we looked at Oozie, etc. • Third Party Product PoCs in our Production Environment ̶ Most vendors ‘can do a PoC quickly’ in the cloud – but most vendors have struggled to integrate into the secure environment – some have eventually succeeded!
  • 9. 9 © Worldpay 2016. All rights reserved.9 The Outer Walls • Firewalls & Network ACLs ̶ Put everything that forms part of the environment with firewalls to minimise the attack surface ̶ Close all un-necessary ports – obvious but necessary • Limit The Number Of Edge Nodes ̶ We have two – for load balancing and high availability • Reverse Proxy For Connectivity ̶ Knox – integrated with Ranger in HortonWorks – to limit access • Enforce Card Data Environment (CDE) Isolation ̶ Data Sources & Targets in a different CDE from the cluster ̶ Enforce highly restrictive data transfer routes
  • 10. 10 © Worldpay 2016. All rights reserved.10 Authentication Controls • Kerberos ̶ Kerberise everything that you can • Integrate with your Corporate AD/LDAP ̶ Ensure all authentication happens in one corporate system ̶ Watch out for “Please can you clone user X for user Y” that causes privileges to leak • Implement Role Based Access Controls (RBAC) ̶ The key to success is having smaller groups with regular audit rather than larger complex groups • Store Keys & Certificates Securely ̶ Hadoop keys are all over the place – it is a significant exercise to manage them ̶ HortonWorks have developed Hardware Security Module (HSM) integration for us ̶ Certificate Management is a significant overhead • Implement Attribute Based Access Controls (ABAC) ̶ Not fully there yet but a feature of Atlas/Ranger that will enable even tighter security
  • 11. 11 © Worldpay 2016. All rights reserved.11 Data In Motion • Data Channels ̶ Use TLS 1.2 - anything less is not sufficient • Terminal Session Connectivity Over SSH ̶ Todays norm but still needs mandating ̶ Requires access via JumpBox controlled via AD • Web Interfaces for Management and Users all over https ̶ Many components default to unsecure http • Do this for each and every Hadoop component ̶ It is not sufficient to do this at the start of the build. ̶ Each component needs to be checked when added and when updated • Managing inside the cluster is only the start ̶ Integrating with legacy sources that may not support secure protocols is much harder
  • 12. 12 © Worldpay 2016. All rights reserved.12 Data At Rest – Local Disk • Protect Local Disk ̶ We use a third party product to ensure that local disk is encrypted wherever data could land ̶ Even ‘root’ can not read some file systems as authentication and access happens outside the server itself ̶ Note that your local disk will contain critical sensitive information if for example you use Map-Reduce the Reducers cache intermediate results ̶ Watch out for poorly written Third Party Products – we evaluated one encryption tool that wrote a log file that said ‘Encrypting 123 as XYZ’
  • 13. 13 © Worldpay 2016. All rights reserved.13 Data At Rest – HDFS • Protect HDFS ̶ Enable Transparent Data Encryption (TDE) for areas with Sensitive Data ̶ Understand the HDFS processes ̶ Deleted files end up in Trash (except TDE) ̶ Snapshots/ Replicas/Backups preserve copies of sensitive data ̶ Replication between clusters means managing keys between clusters ̶ TDE comes with a performance overhead • Pay the uplift for dead disk retention ̶ Destroy disks that have been on site and provide a ‘Certificate of Destruction’ rather than let the vendor take them away for recycling
  • 14. 14 © Worldpay 2016. All rights reserved.14 Data At Rest – Tokenization • Tokenise/Encrypt Data As Soon As Possible ̶ AES256 as a minimum for encryption ̶ Worldpay have used a Third Party Product for Tokenisation ̶ As with all crypto – DON’T ROLL YOUR OWN! ̶ Think about key rotation – you need to compare the tokenised data over many years (Worldpay = 7 years) but must manage a 6 month key rotation? • Universally Unique Obviously Tokenised PAN (Card) Data ̶ Our Third Party Tool allows us to create tokenised data ̶ Universally Unique – Every encrypted card number will always be the same regardless of key rotation, and each card number maps to only one token ̶ Obviously Tokenised - a 16 digit card number (1234 5678 7890 1234) becomes a 16 digit upper case string (ABCD EFGH IJKL MNOP) – this means that if a card number does bypass all the checks it is immediately obvious to the user and can be reported ̶ We have an alternative token scheme for sharing data with customers and partners so that the core tokens are for internal use only
  • 15. 15 © Worldpay 2016. All rights reserved.15 Hadoop Infrastructure Our End To End Process for Data At Rest Data Lake: Safe Data (Tokenized) Secure Usable Data With Higher Performance Ingest Area: Sensitive Data (TDE Encrypted) PxI Data Checks, Tokenization & Then Deleted Local Disk on Edge Nodes (Encrypted) De-compression & HDFS Load sftp, scp, etc. Replication Tools, Spark Streaming, Sqoop, etc. hdfs –dfs cp
  • 16. 16 © Worldpay 2016. All rights reserved.16 Environment Management – Core To Security • Frequent Patch Cycle ̶ Take updates for Linux OS, Hadoop and Third Party Products as soon as is practical ̶ Linux and Third Party Tools tend to be stable and have a slower release but this is part of why we limit the number of third party products ̶ Hadoop changes tend to be more frequent and the amount of change in a release is also significant so keeping up to date and re-testing the security is a major undertaking ̶ Every platform change is tested and documented on PPE1 by one SysAdmin, a second SysAdmin uses the docs to perform the upgrade on PPE2 – and improves the documentation. PRD2 is then done by both SysAdmins and PRD1 is done last. Then a consistency check is run across all environments ̶ Every software change is deployed in DEVL, TEST and then PROD environments ̶ All code (internal & external) is also code scanned • Penetration Testing ̶ Quarterly Pen Tests - The pace of change dictates that a planned regular full test is required • PCI DSS 3.2 Compliance ̶ We are just doing the paperwork to get our certification however we believe that we have already addressed the requirement ̶ We view the requirement as both necessary and also as a useful checklist – where possible we will move beyond this as a minimum requirement
  • 17. 17 © Worldpay 2016. All rights reserved.17 People are key to delivery and security • CEO, CIO and Head of Data Transformation fully engaged ̶ There is no question that from the very top of the organisation as a business is fully committed to delivering our Enterprise Data Platform and that information and data security are core to that delivery • Our Project Stakeholders ̶ Security, Operational Acceptance Testing (OAT), Service Transition (ST), Infrastructure & Operations (I&O) and the Project Management Office (PMO) are engaged at every step of the process • But most of all - our Enterprise Data Platform Team ̶ A team with a mixture of youth and experience that has grown from 1 to 30 people in 18 months ̶ Predominately internal people with support from the vendors and big data consultancies and backfill from contract resource ̶ We target 70% permanent, 20% contractor, 10% consultancy – but usually miss! ̶ We act as one team regardless of the company that employs the person
  • 18. 18 © Worldpay 2016. All rights reserved.18 The Enterprise Data Platform Team Programme Director Data Governance Systems Engineering Systems Analysis Data Engineering Project Management • Security Policy • Metadata • Data Lifecycle • Data Model Standards • Data Quality Management • Development Lifecycle • Hadoop • Linux • Third Party Products • Platform Support • Systems Security Implementation • Data Model Design • Data Requirements Analysis • Source System Analysis including Sensitive Data Identification • Source to Target Mapping • Data Loading (Batch & Stream) • Code Management & Deployment • Testing • Data Security Implementation • Stakeholder Management: PMO, OAT, ST, I&O, Security • PCI Audit • Planning & Resources
  • 19. 19 © Worldpay 2016. All rights reserved.19 What have been the pain points? • Translating Open Source into Enterprise Ready ̶ Each open source component (Hive, Hbase, Spark, etc.) does it’s own thing with security – and tends to think that is sufficient – as a business we look across the platform – we want to secure the Enterprise Data Platform not Hive ̶ Standardising which database is used by each component for backing metadata store (we settled on Postgres in the end) ̶ Also remember that just because it is the vendor release does not mean it is GA – some items will be Incubator Status on Apache • Turning EVERYTHING ON - we wanted to do this but it does create pain ̶ It is clear that very few, if any, other organisations have enabled as many security features as we have and consequently we have hit every pothole along the road and had to solve them ̶ Our work has contributed to the latest HortonWorks Security Guide (see http://docs.hortonworks.com) • Vendor Specific Security Integration ̶ HortonWorks (Ambari/Ranger), Cloudera (Sentry) & MapR all have different interfaces for managing security. ̶ Knowledge on how to configure each specific distribution is difficult to resource • Understanding ̶ It has been hard to persuade people (especially vendors) just how serious and competent the team is about building a robust, secure environment and that it if we find a issue then it is they that are likely to have a problem. Vendors are learning with us what it takes to build secure open source big data platforms
  • 20. 20 © Worldpay 2016. All rights reserved.20 Who are our technology partners? Hardware & Networking Supplier Strategic Core Hadoop Distribution Strategic Architecture Consulting Systems & Data Engineers Systems & Data EngineersTokenization Local File System EncryptionENTERPRISE DATA PLATFORM
  • 21. 21 © Worldpay 2016. All rights reserved.21 Some Stats About Our Environment • Two Production Clusters (56 nodes) and Two PPE Clusters (16 nodes) ̶ All environments are built using the same templates and build instructions ̶ The average Data Node has 12x4Tb disk, 256Gb Memory and 20 cores ̶ Our clusters are on premise and we have the capability to burst to cloud infrastructure with secured (tokenised) data • We’ve upgraded from HDP 2.3 to HDP 2.4 to HDP 2.5 in 18 months ̶ And security and ease of management have improved with each release • We’ve loaded 60+ Billion Card Transactions from two of Worldpay’s systems ̶ And we are busy at work to get all the other systems on board as both batch and real-time streams • We’re in the process of delivering to Users and Systems ̶ Users have secure data access with a range of desktop and web tools to the Transaction History ̶ We are in the process of deploying Machine Learning Derived Algorithms back into payment platforms
  • 22. 22 © Worldpay 2016. All rights reserved. Leaders in Modern Money Innovating In Secure Modern Data Analytics Thank You David M Walker (david.walker@worldpay.com) Enterprise Data Platform Programme Director