26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.0 Security Best Practices for Non-Relational Data Stores (cont.)<br />

2.3 Use transport layer security (TLS) to establish<br />

connections and communication<br />

2.3.1 Why?<br />

To maintain confidentiality while in transit; to establish trusted connections between the<br />

user and server; and to securely establish communication across participating cluster nodes.<br />

2.3.2 How?<br />

Implement TLS/SSL (secure sockets layer) encapsulated connections. Ideally, each node<br />

is equipped with a unique public/private key pair and digital certificate so that client<br />

authentication is enabled.<br />

2.4 Provide support for pluggable<br />

authentication modules<br />

2.4.1 Why?<br />

To certify users are able to program to pluggable authentication module (PAM) interface by<br />

using PAM library API for authentication-related services.<br />

2.4.2 How?<br />

Implement support for PAM. Hardening with benchmarks established by the Center for Internet<br />

Security and hardening at the operating system (OS) level (e.g., SELinux) can be considered.<br />

2.5 Implement appropriate logging mechanisms<br />

2.5.1 Why?<br />

To expose possible attacks.<br />

2.5.2 How?<br />

• Implement logging mechanisms according to industry standards, such as the NIST Log<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!