SlideShare a Scribd company logo
PCI Compliance With Hadoop
Rommel Garcia
Currently Global Security SME @ Hortonworks
Was Tokenization Solutions Engineer @ Liaison Technologies
PCI Focus
Hadoop environment
This is what we will cover
Business process
Let’s leave this to business folks
PCI In A Nutshell
Level of Paranoia
PCI Extra Measures Cybersecurity
PCI Compliance Guideline
Transmission of identity must be encrypted
Two factor authentication
Key management
location
encryption
expiration of keys/tokens
Management of user access to resources
Services
Data
Geography
PCI Compliance Guideline
Strong encryption protocols at rest (AES-256, etc.) and in
motion (latest TLS/SSL)
No passwords in the clear
System audit information based on resource, time, client
info, userid and function
Prove “Chain of Custody”
No sensitive data stored in logs
PCI Scope
De-scope using Tokenization
100% in-scope using Encryption
De-Scoping Through
Tokenization
Reduce sensitive data footprint
What is tokenization?
Process of turning sensitive data into a value with no
meaning, called token i.e. 1234-567890-12345 =>
$^hAt_786Ab}+=-12345
If token is compromised, there’s zero risk
Recipient of token is out-of-scope for PCI compliance
De-scoping
Tokenization App
keys
tokens/
encrypted data
lookup token
Hadoop Environments
batch/realtime data sourcescreate token
Non-Hadoop Environments
tokens/non-sensitivedata
= in scope
Sample De-Scoping Architecture v1
Data
Sources
CDC Kafka NiFi HBase
HDFS
API
Tokenization
App
Sample De-Scoping Architecture v2
Data
Sources
CDC Kafka NiFi HBase
HDFS
API
Tokenization
App
Compliance Thru Encryption
100% In-Scope
Hadoop Security Quadrant
Encryption Scope
Network links
Data streams
Local storage
HDFS
In-Motion At-Rest
At-Rest Encryption
Data
Sources
CDC Kafka NiFi HBase
HDFS
API
1
1 32334
1
2
3
4
HDFS TDE
EncryptContent Processor or LUKS
LUKS
LUKS / Encryption Appliance / Native Encryption
In-Motion Encryption
Data
Sources
CDC Kafka NiFi HBase
HDFS
API
7
5 64321
1
2
3
4
FTPS / SFTP / HTTPS / JDBC, ODBC over SSL
SSL
SSL
TLS/SSL
5
6
7
SSL
TLS/SSL
RPC / DTP / SSL
Secure DR Link
DC DR
1 distcp (mapred over ssl)
2 vpn (guaranteed)
2 SSL
Separation Of Concerns
Admins
Operators
Developers
Analyst
Data Scientist
InfoSec
Infrastructure Engineer
What To Watch Out For
Kerberos is a MUST
If using Tokenization App, choose with NoSQL Backend (HBase,
Redis, etc.)
No RC4 or MD5
Use TLSv1.2 or newer
Use key length greater than 128 bits
All passwords must be encrypted
No super user - root & hdfs has access to encryption keys
What To Watch Out For
Do not delete encryption keys/rolled over keys
LDAPS is a MUST
If operators, not admins, has access to machines at OS level,
LUKS won’t work.
Lock down permissions to OS security config files
Use CA Certs if possible
Only open ports you will use
Guarantee “ordered” processing from a batch source
PCI Compliane With Hadoop

More Related Content

PDF
Identity based distributed provable data possession in multicloud storage
ieeepondy
 
DOCX
Identity based distributed provable data
jpstudcorner
 
PPTX
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
kieranjacobsen
 
DOCX
identity-based distributed provable data possession in multi-cloud storage
swathi78
 
PDF
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Priyanka Aash
 
DOC
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
DOCX
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
chennaijp
 
PPTX
Is Your Data Secure
Real-Time Innovations (RTI)
 
Identity based distributed provable data possession in multicloud storage
ieeepondy
 
Identity based distributed provable data
jpstudcorner
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
kieranjacobsen
 
identity-based distributed provable data possession in multi-cloud storage
swathi78
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Priyanka Aash
 
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
chennaijp
 
Is Your Data Secure
Real-Time Innovations (RTI)
 

What's hot (18)

PDF
Identity-Based Security and Privacy for the Internet of Things
Priyanka Aash
 
PPTX
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Frank Lesniak
 
PPTX
The Future of Data Management - the Enterprise Data Hub
DataWorks Summit
 
PDF
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
Priyanka Aash
 
PDF
F5 TLS & SSL Practices
Brian A. McHenry
 
PPTX
Encryption symmetric key
mdhar123
 
PPT
Sniffing SSL Traffic
dkaya
 
PDF
Application Programming Interface
Seculert
 
PDF
Alternatives and Enhancements to CAs for a Secure Web
CASCouncil
 
PDF
Putting the PRE into ATTACK
MITRE - ATT&CKcon
 
PPTX
Software Infrastructure for a National Research Platform
Ian Foster
 
PPTX
Identity Based Secure Distributed Storage Scheme
Venkatesh Devam ☁
 
PPTX
PaloAlto Ignite Conference 2015
Mike Spaulding
 
PDF
ATT&CKING Containers in The Cloud
MITRE ATT&CK
 
PPTX
Introduction to SSL and How to Exploit & Secure
Brian Ritchie
 
PPT
Nagios Conference 2012 - Jared Bird - Providing Value Throughout the Organiza...
Nagios
 
PDF
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
SecureAuth
 
PPTX
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
Laurentiu Meirosu
 
Identity-Based Security and Privacy for the Internet of Things
Priyanka Aash
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Frank Lesniak
 
The Future of Data Management - the Enterprise Data Hub
DataWorks Summit
 
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
Priyanka Aash
 
F5 TLS & SSL Practices
Brian A. McHenry
 
Encryption symmetric key
mdhar123
 
Sniffing SSL Traffic
dkaya
 
Application Programming Interface
Seculert
 
Alternatives and Enhancements to CAs for a Secure Web
CASCouncil
 
Putting the PRE into ATTACK
MITRE - ATT&CKcon
 
Software Infrastructure for a National Research Platform
Ian Foster
 
Identity Based Secure Distributed Storage Scheme
Venkatesh Devam ☁
 
PaloAlto Ignite Conference 2015
Mike Spaulding
 
ATT&CKING Containers in The Cloud
MITRE ATT&CK
 
Introduction to SSL and How to Exploit & Secure
Brian Ritchie
 
Nagios Conference 2012 - Jared Bird - Providing Value Throughout the Organiza...
Nagios
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
SecureAuth
 
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
Laurentiu Meirosu
 
Ad

Similar to PCI Compliane With Hadoop (20)

PPTX
Curb Your Insecurity - Tips for a Secure Cluster (with Spark too)!!
Pardeep Kumar Mishra (Big Data / Hadoop Consultant)
 
PPTX
Curb your insecurity with HDP
DataWorks Summit/Hadoop Summit
 
PPTX
Open Source Security Tools for Big Data
Great Wide Open
 
PPTX
Open Source Security Tools for Big Data
Rommel Garcia
 
PDF
Hortonworks Protegrity Webinar: Leverage Security in Hadoop Without Sacrifici...
Hortonworks
 
PDF
Hadoop Security and Compliance - StampedeCon 2016
StampedeCon
 
PPTX
Securing Data in Hadoop at Uber
DataWorks Summit
 
PPTX
Data protection on premises, and in public and private clouds
Ulf Mattsson
 
PDF
BigData Security - A Point of View
Karan Alang
 
PPTX
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Cloudera, Inc.
 
PDF
Curb your insecurity with HDP - Tips for a Secure Cluster
ahortonworks
 
PPTX
Implementing Security on a Large Multi-Tenant Cluster the Right Way
DataWorks Summit
 
PPTX
Hadoop security
Shivaji Dutta
 
PDF
Enterprise Data Protection - Understanding Your Options and Strategies
Ulf Mattsson
 
PPTX
Hadoop and Data Access Security
Cloudera, Inc.
 
PPTX
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Ulf Mattsson
 
PPTX
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
TokenEx
 
PPTX
Hadoop and Big Data Security
Chicago Hadoop Users Group
 
PDF
Solving the Really Big Tech Problems with IoT
Eric Kavanagh
 
PPTX
Building Highly Sophisticated Environments for Security and Compliance on AWS
Boyan Dimitrov
 
Curb Your Insecurity - Tips for a Secure Cluster (with Spark too)!!
Pardeep Kumar Mishra (Big Data / Hadoop Consultant)
 
Curb your insecurity with HDP
DataWorks Summit/Hadoop Summit
 
Open Source Security Tools for Big Data
Great Wide Open
 
Open Source Security Tools for Big Data
Rommel Garcia
 
Hortonworks Protegrity Webinar: Leverage Security in Hadoop Without Sacrifici...
Hortonworks
 
Hadoop Security and Compliance - StampedeCon 2016
StampedeCon
 
Securing Data in Hadoop at Uber
DataWorks Summit
 
Data protection on premises, and in public and private clouds
Ulf Mattsson
 
BigData Security - A Point of View
Karan Alang
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Cloudera, Inc.
 
Curb your insecurity with HDP - Tips for a Secure Cluster
ahortonworks
 
Implementing Security on a Large Multi-Tenant Cluster the Right Way
DataWorks Summit
 
Hadoop security
Shivaji Dutta
 
Enterprise Data Protection - Understanding Your Options and Strategies
Ulf Mattsson
 
Hadoop and Data Access Security
Cloudera, Inc.
 
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Ulf Mattsson
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
TokenEx
 
Hadoop and Big Data Security
Chicago Hadoop Users Group
 
Solving the Really Big Tech Problems with IoT
Eric Kavanagh
 
Building Highly Sophisticated Environments for Security and Compliance on AWS
Boyan Dimitrov
 
Ad

More from Rommel Garcia (11)

PPTX
The of Operational Analytics Data Store
Rommel Garcia
 
PDF
Apache Druid: The Foundation of Fortune 500 “Analytical Decision-Making"
Rommel Garcia
 
PDF
What does Netflix, NTT and Rubicon Project have in common? Apache Druid.
Rommel Garcia
 
PPTX
GPU 101: The Beast In Data Centers
Rommel Garcia
 
PDF
Virtualizing Hadoop
Rommel Garcia
 
PPTX
Apache Ranger
Rommel Garcia
 
PPTX
Hadoop Meets Scrum
Rommel Garcia
 
PPTX
Realtime analytics + hadoop 2.0
Rommel Garcia
 
PPTX
Interactive query in hadoop
Rommel Garcia
 
PPTX
YARN - Presented At Dallas Hadoop User Group
Rommel Garcia
 
PPT
Hadoop 1.x vs 2
Rommel Garcia
 
The of Operational Analytics Data Store
Rommel Garcia
 
Apache Druid: The Foundation of Fortune 500 “Analytical Decision-Making"
Rommel Garcia
 
What does Netflix, NTT and Rubicon Project have in common? Apache Druid.
Rommel Garcia
 
GPU 101: The Beast In Data Centers
Rommel Garcia
 
Virtualizing Hadoop
Rommel Garcia
 
Apache Ranger
Rommel Garcia
 
Hadoop Meets Scrum
Rommel Garcia
 
Realtime analytics + hadoop 2.0
Rommel Garcia
 
Interactive query in hadoop
Rommel Garcia
 
YARN - Presented At Dallas Hadoop User Group
Rommel Garcia
 
Hadoop 1.x vs 2
Rommel Garcia
 

Recently uploaded (20)

PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
The Future of Artificial Intelligence (AI)
Mukul
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Doc9.....................................
SofiaCollazos
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 

PCI Compliane With Hadoop