{"id":7352,"date":"2013-05-10T15:00:35","date_gmt":"2013-05-10T15:00:35","guid":{"rendered":"http:\/\/cloudnewsdaily.com\/?p=14552"},"modified":"2013-05-10T15:00:35","modified_gmt":"2013-05-10T15:00:35","slug":"big-data-without-security-big-risk","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/big-data-without-security-big-risk\/","title":{"rendered":"Big Data Without Security = Big Risk"},"content":{"rendered":"<\/p>\n<p><strong>Guest Post by C.J. Radford, VP of Cloud for <a href=\"http:\/\/www.vormetric.com\">Vormetric<\/a><\/strong><\/p>\n<p>Big Data initiatives are heating up. From financial services and government to healthcare, retail and manufacturing, organizations across most verticals are investing in Big Data to improve the quality and speed of decision making as well as enable better planning, forecasting, marketing and customer service. It\u2019s clear to virtually everyone that Big Data represents a tremendous opportunity for organizations to increase both their productivity and financial performance.<\/p>\n<p>According to WiPro, the leading regions taking on Big Data implementations are North America, Europe and Asia. To date, organizations in North America have amassed over 3,500 petabytes (PBs) of Big Data, organizations in Europe over 2,000 PBs, and organizations in Asia over 800 PBs.\u00a0And we are still in the early days of Big Data \u2013 last year was all about investigation and this year is about execution; given this, it\u2019s widely expected that the global stockpile of data used for Big Data will continue to grow exponentially.<\/p>\n<p>Despite all the goodness that can stem from Big Data, one has to consider the risks as well. Big Data confers enormous competitive advantage to organizations able to quickly analyze vast data sets and turn it into business value, yet it can also put sensitive data at risk of a breach or violating privacy and compliance requirements. Big Data security is fast becoming a front-burner issue for organizations of all sizes. Why? Because Big Data without security = Big Risk.<\/p>\n<p>The fact is, today\u2019s cyber attacks are getting more sophisticated and attackers are changing their tactics in real time to get access to sensitive data in organizations around the globe. The barbarians have already breached your perimeter defenses and are inside the gates. For these advanced threat actors, Big Data represents an opportunity to steal an organization\u2019s most sensitive business data, intellectual property and trade secrets for significant economic gain.<\/p>\n<p>One approach used by these malicious actors to steal valuable data is by way of an Advanced Persistent Threat (APT).\u00a0APTs are network attacks in which an unauthorized actor gains access to information by slipping in \u201cunder the radar\u201d somehow. (Yes, legacy approaches like perimeter security are failing.) These attackers typically reside inside the firewall undetected for long periods of time (an average of 243 days, according to Mandiant\u2019s most recent Threat Landscape Report), slowly gaining access to and stealing sensitive data.<\/p>\n<p>Given that advanced attackers are already using APTs to target the most sensitive data within organizations, it\u2019s only a matter of time before attackers will start targeting Big Data implementations. Since data is the new currency, it just makes sense for attackers to go after Big Data implementations because that\u2019s where big value is.<br \/>\nSo, what does all this mean for today\u2019s business and security professionals?\u00a0It means that when implementing Big Data, they need to take a holistic approach and ensure the organization can benefit from the results of Big Data in a manner that doesn\u2019t negatively affect the risk posture of the organization.<br \/>\nThe best way to mitigate risk of a Big Data breach is by reducing the attack surface, and taking a data-centric approach to securing Big Data implementations. These are the key steps:<\/p>\n<p><strong>Lock down sensitive data no matter the location.<\/strong><\/p>\n<p>The concept is simple; ensure your data is locked down regardless of whether it\u2019s in your own data center or hosted in the cloud. This means you should use advanced file-level encryption for structured and unstructured data with integrated key management.\u00a0If you\u2019re relying upon a cloud service provider (CSP) and consuming Big Data as a service, it\u2019s critical to ensure that your CSP is taking the necessary precautions to lock down sensitive data.\u00a0If your cloud provider doesn\u2019t have the capabilities in place or feels data security is your responsibility, ensure your encryption and key management solution is architecturally flexible in order to accommodate protecting data both on-premise and in the cloud.<\/p>\n<p style=\"text-align: left;\"><strong>Manage access through strong polices.<\/strong><\/p>\n<p style=\"text-align: left;\">Access to Big Data should only be granted to those authorized end users and business processes that absolutely need to view it.\u00a0If the data is particularly sensitive, it is a business imperative to have strong polices in place to tightly govern access.\u00a0Fine-grained access control is essential, including things like the ability to block access by even IT system administrators (they may have the need to do things like back up the data, but they don\u2019t need full access to that data as part of their jobs). Blocking access to data by IT system administrators becomes even more crucial when the data is located in the cloud and is not under an organization\u2019s direct control.<\/p>\n<p><strong>Ensure ongoing visibility into user access to the data and IT processes.<\/strong><\/p>\n<p>Security Intelligence is a \u201cmust have\u201d when defending against APTs and other security threats.\u00a0The intelligence gained can support what actions to take in order to safeguard and protect what matters &#8211; an organization\u2019s sensitive data.\u00a0End-user and IT processes that access Big Data should be logged and reported to the organization on a regular basis.\u00a0And this level of visibility must occur whether your Big Data implementation is within your own infrastructure or in the cloud.<\/p>\n<p>To effectively manage that risk, the bottom line is that you need to lock down your sensitive data, manage access to it through policy, and ensure ongoing visibility into both user and IT processes that access your sensitive data. Big Data is a tremendous opportunity for organizations like yours to reap big benefits, as long as you proactively manage the business risks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-14560\" alt=\"CJRadford\" src=\"http:\/\/cloudnewsdaily.com\/wp-content\/uploads\/2013\/05\/CJRadford.jpeg\" width=\"153\" height=\"153\" \/><\/p>\n<p style=\"text-align: center;\">You can follow C.J. Radford on Twitter <a href=\"https:\/\/twitter.com\/cjrad\">@CJRad<\/a>.<\/p>\n<div class=\"zemanta-pixie\" style=\"margin-top: 10px; height: 15px;\"><img decoding=\"async\" class=\"zemanta-pixie-img\" style=\"border: none; float: right;\" alt=\"\" src=\"http:\/\/img.zemanta.com\/pixy.gif?x-id=79a06879-b1ba-4460-8331-4bc14da2e906\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/CloudNewsDaily\/~4\/7mBbJCnkk1M\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guest Post by C.J. Radford, VP of Cloud for Vormetric Big Data initiatives are heating up. From financial services and government to healthcare, retail and manufacturing, organizations across most verticals are investing in Big Data to improve the quality and speed of decision making as well as enable better planning, forecasting, marketing and customer service. [&#8230;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[156,1402,1596,78],"tags":[118],"class_list":["post-7352","post","type-post","status-publish","format-standard","hentry","category-big-data","category-data-security","category-data-warehousing","category-guest-post","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/7352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=7352"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/7352\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=7352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=7352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=7352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}