5 Recommendations to Secure a Big Data Environment

In terms of cyber security best practice tips, other than the basic hygiene (of having strong passwords in place, as well as basic perimeter protection like firewalls), Scott Gnau  – offers five recommendations to follow to secure a big data environment.

1. Set up a robust process to verify data quality and compliance: Take the time necessary to handle a robust audit of the data. This will help manage the regulatory compliance needs of a business better and to control the environment proactively.

2. Manage security centrally: Set up strong security policies, especially in terms of Identity and Access Management, by offering a unique and centralized security administration interface for all components with appropriate rights / permissions. Also, centralise governance, operation and security services.

3. Implement data access control and logging: Set up data filtering depending on the specific business needs, and ensure the solution embeds security functionalities dedicated to authentication, such as Kerberos or Apache Knox. Pay particular attention to privileged accounts and ensure the implication of those privileges are fully understood.

4. Log events: Prepare to dig into event logs and to find the origin of the issue if a data loss, a data theft or any other security breach occurs.

5. Ensure encryption of frequently accessed and randomly accessed data: Encryption provides an added layer of security by protecting data both when it is transferred and when it is stored (at rest), while masking capabilities enable security administrators to desensitise data for display or temporary storage.