26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.0 Security Best Practices for Non-Relational Data Stores (cont.)<br />

2.8 Control communication across cluster<br />

2.8.1 Why?<br />

To ensure a secure channel.<br />

2.8.2 How?<br />

Ensure each node validates the trust level of other participating nodes before establishing a<br />

trusted communication channel.<br />

2.9 Ensure data replication consistency<br />

2.9.1 Why?<br />

To handle node failures correctly.<br />

2.9.2 How?<br />

Use intelligent hashing algorithms and ensure that the replicated data is consistent across<br />

the nodes, even during node failure.<br />

2.10 Utilize middleware layer for security to encapsulate<br />

underlying NoSQL stratum<br />

2.10.1 Why?<br />

To have a virtual secure layer.<br />

2.10.2 How?<br />

By inducing object-level security at the collection, or column-level through the middleware,<br />

retaining its thin database layer.<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

16

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!