10 Best Practices for Security, Compliance Monitoring
- 1 of
-
10 Best Practices for Security, Compliance Monitoring
Of the Cloud Security Alliance 100 best practices in big data security, we focus on 10 best practices for ensuring real-time security and compliance monitoring. -
Anomaly Detection
Apply big data analytics to detect anomalous connections to a cluster to ensure only authorized connections are allowed. -
Event Log Monitoring
Mine the events in log files to ensure that the big data infrastructure remains compliant with the risk-acceptance profile of the infrastructure. -
Front-End Deployment
Implement front-end systems, such as routers, application-level firewalls and database access firewalls. These systems parse requests and stop bad requests. -
Security in the Cloud
As big data deployments move to the cloud, security is top-of-mind. Consider cloud-level security to avoid becoming the weak spot in the big data infrastructure stack. -
Adding Controls
Use cluster-level security to ensure multiple-level security. Best security practices for the cluster include the use of Kerberos or SESAME in a Hadoop cluster for authentication and access control lists for access. -
Application Protection
Apply application-level security to protect applications in the infrastructure stack as attackers shift their focus from operating systems to databases and applications. -
Pay Attention to Privacy Rights
To avoid legal issues when collecting and managing data, follow laws and regulations that relate to privacy rights in each step of the data lifecycle: collection, storage, transmission, use and destruction of data. -
Ethical Concerns
Consider technical and ethical questions around data use, accounting for all applicable privacy and legal regulations at the very least. -
Minimize Evasion Attacks
Monitor evasion attacks to avoid potential system attacks and/or unauthorized access, and consider using different monitor algorithms to mine the data. -
Monitor Strange Behavior
Track data poisoning attacks to prevent monitoring systems from being misled, crashing, misbehaving or providing misinterpreted data. -
-
What Partners Need to Know About HP, Inc.
View Slideshow » -
MSPs Face Big Cybersecurity Talent Gap
View Slideshow » -
Why Tech Companies Are Eager to Invest in 5G
View Slideshow » -
The Problem With Partner Referral Programs
View Slideshow » -
Microsoft Taps Channel for Digital Business
View Slideshow » -
New Technologies Will Fuel Channel Opportunities
View Slideshow » -
Channel's Transition to the Cloud Requires More Time
View Slideshow » -
Microsoft's Cloud Channel Begins to Mature
View Slideshow » -
Defining MSPs' Goals, Challenges and Tools
View Slideshow » -
Why Metrics Matter to the Channel
View Slideshow »
-
The Cloud Security Alliance recently published a new handbook, "The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy," aimed at helping big data solution providers reduce security and privacy threats that are growing and evolving as big data is collected and consumed in the cloud. "As big data expands through streaming cloud technology, traditional security mechanisms tailored to secure small-scale, static data on firewalled and semi-isolated networks are inadequate," J.R. Santos, executive vice president of research for the CSA, said in a statement. One of biggest challenges big data providers face as they migrate to the cloud is ensuring real-time security, which includes putting measures in place that stop unauthorized access to data. Compliance monitoring also is a key issue for providers as they create guidelines to determine how they can use the data, while ensuring that privacy laws and regulations are met. From CSA's massive listing, we've gleaned 10 best practices for delivering real-time security and compliance monitoring.
What Partners Need to Know About HP, ...
In the channel, HP, Inc. is a storied vendor that has relationships...Watch Now