© cloud security alliance, 2015 wilco van ginkel, co-chair bdwg

Post on 21-Jan-2016

217 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© Cloud Security Alliance, 2015

BDWG Overview

Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

Agenda

1. Big Data Level Set

2. Who are we?

3. What do we do?

4. What have we done so

far?

5. What are we working on?

6. Q&A

© Cloud Security Alliance, 2015

Big Data Level Set

© Cloud Security Alliance, 2015.

© Cloud Security Alliance, 2015.

• ‘Word on the street’• Sliding window• Dimensions don’t always expand in the same directions. Examples:

• Twitter feeds (small data, but very high velocity)• Hubble Telescope pictures (large pic, but low volume)

• Is Unstructured Data really unstructured?

Value…Veracity (accuracy)

What’s next in BD?• Fast data (e.g., IoT)• Climb up the BD stack• Visualization• Applying BD techniques to ‘Dark Data’ (e.g., Ayasdi)• And much more…

© Cloud Security Alliance, 2015.

© Cloud Security Alliance, 2015

BD Security… Yeah, what about it?

© Cloud Security Alliance, 2015.

Source: Verizon Big Data White Paper “How to thrive on the frontiers of data”

• Internal• External• Owned,

subscribed, bought

• Format• Governance• Data silos• Storage

infrastructure

• Data Scientists• Predictive• Prescriptive• Visualization• Think different• Not always why

• Plug information in business process

• Actionable

Big Data Life Cycle

© Cloud Security Alliance, 2015.

Still need to balance

Risk ProfileSecurity

Requirements(CIAA)

BusinessRequirements

© Cloud Security Alliance, 2015.

And also ensure data qualities

Source: ISACA White Paper “Big Data – Impact & Benefits”, March 2013

© Cloud Security Alliance, 2015.

Can’t we just use current security controls and standards?

Well, Yes and No…

Change of playing field…•New Paradigm/Technology• The Big Data V’s Data Explosion• Cloud: cheap & easy access to compute & storage •Data on the go Mobility all the way•Data without borders•Difference in international legislation•…

© Cloud Security Alliance, 2015.

© Cloud Security Alliance, 2015

So, there is work to do…

© Cloud Security Alliance, 2015

Nice to meet you!

Who are we?• Started April 2012• Focus on Big Data Privacy & Security•Different Initiatives/sub working groups •Works together with other orgs, like NIST• Leadership team:• Chair - Sree Rajan, Fujitsu• Co-Chair - Wilco van Ginkel, Verizon• Co-chair - Neel Sundaresan, Ebay

© Cloud Security Alliance, 2015.

© Cloud Security Alliance, 2015.

Our Journey•Develop best practices for security and privacy in big data

• Support industry and government on adoption of best practices

• Establish liaisons with other organizations in order to coordinate the development of big data security and privacy standards

• Accelerate the adoption of novel research aimed to address security and privacy issues

© Cloud Security Alliance, 2015.

Focus areas

Security Analytics

Cryptography and Privacy Technologies

Infrastructure Security

Privacy, Policy, Governance and Legal Issue

Framework and Taxonomy

© Cloud Security Alliance, 2015

What have we done so far?

© Cloud Security Alliance, 2015.

The Top Ten

November 2012 April 2013

https://cloudsecurityalliance.org/download/top-ten-big-data-security-and-privacy-challenges/

© Cloud Security Alliance, 2014.

© Cloud Security Alliance, 2015.

Use Case(s)

Modeling

Analysis

Implementation

© Cloud Security Alliance, 2015.

Big Data Analytics Report

September 2013https://cloudsecurityalliance.org/download/big-data-analytics-for-security-intelligence/

© Cloud Security Alliance, 2015.

Examples

WINE Platform

BD Analytics for Security

Botnet monitoring

APT Detection

© Cloud Security Alliance, 2015.

The Top Ten Crypto Challenges

March 2014

https://cloudsecurityalliance.org/download/top-ten-challenges-in-cryptography-for-big-data/

© Cloud Security Alliance, 2015.

Big Data Taxonomy

Taxonomy = “The science or practice of classification”

Source: www.arthursclipart.org

© Cloud Security Alliance, 2015.

Big Data Taxonomy

September 2014https://cloudsecurityalliance.org/download/big-data-taxonomy/

© Cloud Security Alliance, 2015.

© Cloud Security Alliance, 2015.

© Cloud Security Alliance, 2015

Other initiatives

BDWG Other Initiatives•We provided input for the upcoming NIST Big Data Standard.•We provided comments to the White House Request for Comment on Big Data Privacy. Check out: https://cloudsecurityalliance.org/download/big-data-big-concerns-and-what-the-white-house-wants-to-do-about-it/

• Lots of media interviews. Particularly after we have published a deliverable

© Cloud Security Alliance, 2015.

© Cloud Security Alliance, 2015

What is next?

10 Sections1. Secure Computations in Distributed Programming

Frameworks2. Security Best Practices for Non-Relational Data Stores3. Secure Data Storage and Transactions Logs4. End-point Input Validation/Filtering5. Real-Time Security/Compliance Monitoring6. Scalable and Composable Privacy-Preserving analytics7. Crypto-Enforced Access Control and Secure

Communication8. Granular Access Control9. Granular Audits10.Data Provenance

© Cloud Security Alliance, 2015.

Help needed…1. Secure Computations in Distributed Programming

Frameworks2. Security Best Practices for Non-Relational Data Stores3. Secure Data Storage and Transactions Logs4. End-point Input Validation/Filtering5. Real-Time Security/Compliance Monitoring6. Scalable and Composable Privacy-Preserving analytics7. Crypto-Enforced Access Control and Secure

Communication8. Granular Access Control9. Granular Audits10.Data Provenance

© Cloud Security Alliance, 2015.

© Cloud Security Alliance, 2015.

How to get involved?• CSA Big Data Working Group Site:https://cloudsecurityalliance.org/research/big-data/

• CSA, Big Data LinkedIn:http://www.linkedin.com/groups?home=&gid=4458215&trk=anet_ug_hm

• Basecamp Project Collaboration Site Request Formhttps://cloudsecurityalliance.org/research/basecamp/

• For any questions/remarks/feedback, please contact either:Who How

Sreeranga (Sree) Rajan (Fujitsu) sree@us.fujitsu.com

Wilco van Ginkel (Verizon) wilco.vanginkel@verizon.com

Neel Sundaresan (eBay) nsundaresan@ebay.com

??? ?© Cloud Security Alliance, 2015

top related