38
© Cloud Security Alliance, 2015 BDWG Overview Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

Embed Size (px)

Citation preview

Page 1: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

BDWG Overview

Wilco van Ginkel, Co-Chair BDWG

Page 2: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

Agenda

1. Big Data Level Set

2. Who are we?

3. What do we do?

4. What have we done so

far?

5. What are we working on?

6. Q&A

Page 3: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

Big Data Level Set

Page 4: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Page 5: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

• ‘Word on the street’• Sliding window• Dimensions don’t always expand in the same directions. Examples:

• Twitter feeds (small data, but very high velocity)• Hubble Telescope pictures (large pic, but low volume)

• Is Unstructured Data really unstructured?

Page 6: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

Value…Veracity (accuracy)

Page 7: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

What’s next in BD?• Fast data (e.g., IoT)• Climb up the BD stack• Visualization• Applying BD techniques to ‘Dark Data’ (e.g., Ayasdi)• And much more…

© Cloud Security Alliance, 2015.

Page 8: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

BD Security… Yeah, what about it?

Page 9: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Source: Verizon Big Data White Paper “How to thrive on the frontiers of data”

• Internal• External• Owned,

subscribed, bought

• Format• Governance• Data silos• Storage

infrastructure

• Data Scientists• Predictive• Prescriptive• Visualization• Think different• Not always why

• Plug information in business process

• Actionable

Big Data Life Cycle

Page 10: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Still need to balance

Risk ProfileSecurity

Requirements(CIAA)

BusinessRequirements

Page 11: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

And also ensure data qualities

Source: ISACA White Paper “Big Data – Impact & Benefits”, March 2013

Page 12: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Can’t we just use current security controls and standards?

Well, Yes and No…

Page 13: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

Change of playing field…•New Paradigm/Technology• The Big Data V’s Data Explosion• Cloud: cheap & easy access to compute & storage •Data on the go Mobility all the way•Data without borders•Difference in international legislation•…

© Cloud Security Alliance, 2015.

Page 14: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

So, there is work to do…

Page 15: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

Nice to meet you!

Page 16: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

Who are we?• Started April 2012• Focus on Big Data Privacy & Security•Different Initiatives/sub working groups •Works together with other orgs, like NIST• Leadership team:• Chair - Sree Rajan, Fujitsu• Co-Chair - Wilco van Ginkel, Verizon• Co-chair - Neel Sundaresan, Ebay

© Cloud Security Alliance, 2015.

Page 17: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Our Journey•Develop best practices for security and privacy in big data

• Support industry and government on adoption of best practices

• Establish liaisons with other organizations in order to coordinate the development of big data security and privacy standards

• Accelerate the adoption of novel research aimed to address security and privacy issues

Page 18: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Focus areas

Security Analytics

Cryptography and Privacy Technologies

Infrastructure Security

Privacy, Policy, Governance and Legal Issue

Framework and Taxonomy

Page 19: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

What have we done so far?

Page 20: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

The Top Ten

November 2012 April 2013

https://cloudsecurityalliance.org/download/top-ten-big-data-security-and-privacy-challenges/

Page 21: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2014.

Page 22: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Use Case(s)

Modeling

Analysis

Implementation

Page 23: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Big Data Analytics Report

September 2013https://cloudsecurityalliance.org/download/big-data-analytics-for-security-intelligence/

Page 24: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Examples

WINE Platform

BD Analytics for Security

Botnet monitoring

APT Detection

Page 25: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

The Top Ten Crypto Challenges

March 2014

https://cloudsecurityalliance.org/download/top-ten-challenges-in-cryptography-for-big-data/

Page 26: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Big Data Taxonomy

Taxonomy = “The science or practice of classification”

Page 27: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

Source: www.arthursclipart.org

Page 28: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Big Data Taxonomy

September 2014https://cloudsecurityalliance.org/download/big-data-taxonomy/

Page 29: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Page 30: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

Page 31: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

Other initiatives

Page 32: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

BDWG Other Initiatives•We provided input for the upcoming NIST Big Data Standard.•We provided comments to the White House Request for Comment on Big Data Privacy. Check out: https://cloudsecurityalliance.org/download/big-data-big-concerns-and-what-the-white-house-wants-to-do-about-it/

• Lots of media interviews. Particularly after we have published a deliverable

© Cloud Security Alliance, 2015.

Page 33: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015

What is next?

Page 34: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG
Page 35: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

10 Sections1. Secure Computations in Distributed Programming

Frameworks2. Security Best Practices for Non-Relational Data Stores3. Secure Data Storage and Transactions Logs4. End-point Input Validation/Filtering5. Real-Time Security/Compliance Monitoring6. Scalable and Composable Privacy-Preserving analytics7. Crypto-Enforced Access Control and Secure

Communication8. Granular Access Control9. Granular Audits10.Data Provenance

© Cloud Security Alliance, 2015.

Page 36: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

Help needed…1. Secure Computations in Distributed Programming

Frameworks2. Security Best Practices for Non-Relational Data Stores3. Secure Data Storage and Transactions Logs4. End-point Input Validation/Filtering5. Real-Time Security/Compliance Monitoring6. Scalable and Composable Privacy-Preserving analytics7. Crypto-Enforced Access Control and Secure

Communication8. Granular Access Control9. Granular Audits10.Data Provenance

© Cloud Security Alliance, 2015.

Page 37: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

© Cloud Security Alliance, 2015.

How to get involved?• CSA Big Data Working Group Site:https://cloudsecurityalliance.org/research/big-data/

• CSA, Big Data LinkedIn:http://www.linkedin.com/groups?home=&gid=4458215&trk=anet_ug_hm

• Basecamp Project Collaboration Site Request Formhttps://cloudsecurityalliance.org/research/basecamp/

• For any questions/remarks/feedback, please contact either:Who How

Sreeranga (Sree) Rajan (Fujitsu) [email protected]

Wilco van Ginkel (Verizon) [email protected]

Neel Sundaresan (eBay) [email protected]

Page 38: © Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

??? ?© Cloud Security Alliance, 2015