SHARE
Facebook X Pinterest WhatsApp

10 Best Practices for Security, Compliance Monitoring

Data poisoning 10 Best Practices for Security, Compliance Monitoring Of the Cloud Security Alliance 100 best practices in big data security, we focus on 10 best practices for ensuring real-time security and compliance monitoring. Anomaly Detection Apply big data analytics to detect anomalous connections to a cluster to ensure only authorized connections are allowed. Event […]

Written By
thumbnail Gina Roos
Gina Roos
Aug 30, 2016
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Data poisoning

1 - 10 Best Practices for Security, Compliance Monitoring10 Best Practices for Security, Compliance Monitoring

Of the Cloud Security Alliance 100 best practices in big data security, we focus on 10 best practices for ensuring real-time security and compliance monitoring.

2 - Anomaly DetectionAnomaly Detection

Apply big data analytics to detect anomalous connections to a cluster to ensure only authorized connections are allowed.

3 - Event Log MonitoringEvent Log Monitoring

Mine the events in log files to ensure that the big data infrastructure remains compliant with the risk-acceptance profile of the infrastructure.

4 - Front-End DeploymentFront-End Deployment

Implement front-end systems, such as routers, application-level firewalls and database access firewalls. These systems parse requests and stop bad requests.

5 - Security in the CloudSecurity in the Cloud

As big data deployments move to the cloud, security is top-of-mind. Consider cloud-level security to avoid becoming the weak spot in the big data infrastructure stack.

6 - Adding ControlsAdding Controls

Use cluster-level security to ensure multiple-level security. Best security practices for the cluster include the use of Kerberos or SESAME in a Hadoop cluster for authentication and access control lists for access.

7 - Application ProtectionApplication Protection

Apply application-level security to protect applications in the infrastructure stack as attackers shift their focus from operating systems to databases and applications.

8 - Pay Attention to Privacy RightsPay Attention to Privacy Rights

To avoid legal issues when collecting and managing data, follow laws and regulations that relate to privacy rights in each step of the data lifecycle: collection, storage, transmission, use and destruction of data.

9 - Ethical ConcernsEthical Concerns

Consider technical and ethical questions around data use, accounting for all applicable privacy and legal regulations at the very least.

10 - Minimize Evasion AttacksMinimize Evasion Attacks

Monitor evasion attacks to avoid potential system attacks and/or unauthorized access, and consider using different monitor algorithms to mine the data.

11 - Monitor Strange BehaviorMonitor Strange Behavior

Track data poisoning attacks to prevent monitoring systems from being misled, crashing, misbehaving or providing misinterpreted data.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA
Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.