26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.0 Secure Computations in Distributed Programming Frameworks (cont.)<br />

1.6 Prevent information leakage through output<br />

1.6.1 Why?<br />

To ensure security and privacy. Data leakage may occur in many ways, which needs to be prevented<br />

(i.e. improper use of encryption). Debugging messages, uncontrolled output streams, logging<br />

functions and detailed error pages help attackers learn about the system and formulate attack plans.<br />

1.6.2 How?<br />

• Use function sensitivity to prevent information leakage.<br />

• Shadow execution (i.e. communication towards external networks to obtain software<br />

version updates) is another aspect that needs to be taken into consideration.<br />

• Additionally, all data should be filtered on the network level (in-transit), in line with data<br />

loss prevention policies.<br />

• Sufficient de-identification of data also contributes to mitigation of the impact.<br />

1.7 Maintain worker nodes<br />

1.7.1 Why?<br />

To ensure proper functionality of worker nodes.<br />

1.7.2 How?<br />

Frequently check for malfunctioning worker nodes and repair them. Ensure they are configured correctly.<br />

1.8 Detect fake nodes<br />

1.8.1 Why?<br />

To avoid attacks in cloud and virtual environments.<br />

1.8.2 How?<br />

Build a framework to detect fake nodes introduced by creating snapshots of legitimate nodes.<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!