SlideShare a Scribd company logo
Securing Apache
Cassandra
Strategies and tactics for cybersecurity for
building platforms around Apache Cassandra,
covering Network, Hardware, Data, and
Application level security.
Security : Dance between
Convenience & Protecting
Assets
It takes 20 years to build a
reputation and few
minutes of cyber-incident
to ruin it.
Stéphane Nappo, Global Chief Information
Security Officer at Société Générale
International Banking
What’s the big deal with Security?
Defending Valuable “Things”
● Prevent
● Detect
● React
… to Prevent Negative Consequences
● User truncates a table (Insider)
● System crashes, systems down (System)
● Data can be stolen, but you may not know it (??)
● The bad actor may be 12 time zones away (Outsider)
● Someone in your company could get disgruntled. (Insider)
● Someone working at the cloud company you trust could get
disgruntled. (Semi-Insider)
● Avoid litigation from governments and individuals (Legal)
Aspects of Security
Tenets of Information Security (CIA)
● Confidentiality - prevent
unauthorized access.
● Integrity - prevent
unsanctioned funging
● Availability - prevent
unauthorized withholding of
data.
● Non-repudiation - Integrity of the
origin and the data itself. Legit?
● Authentication - Who can access
this?
● Authorization - What should they
be able to access once in?
● Accountability - Can we find out
who did what?
What do I need to do now?
● Must
○ Legal requirements
○ Data Protection
○ HIPAA / PCI
○ Data Retention policies
○ Other company policies
● Should
○ Network
○ System
○ Data
○ Application
What else should I think about?
● Mission Critical Assets – This is the data you need to protect*
● Data Security – Data security controls protect the storage and transfer of
data.
● Application Security – Applications security controls protect access to an
application, an application’s access to your mission critical assets, and the
internal security of the application.
● Endpoint Security – Endpoint security controls protect the connection
between devices and the network.
● Network Security – Network security controls protect an organization’s
network and prevent unauthorized access of the network.
● Perimeter Security – Perimeter security controls include both the physical
and digital security methodologies that protect the business overall.
● The Human Layer – Humans are the weakest link in any cybersecurity
posture. Human security controls include phishing simulations and access
management controls that protect mission critical assets from a wide
variety of human threats, including cyber criminals, malicious insiders, and
negligent users.
Network
● Edge Security
● Cloud Security
● Virtual Private Cloud
Security
● Security Groups
● …
System Application
● System Firewall
● Operating System
● Disk Encryption
(Hard/Soft)
● OWASP
● End Points
● Variables
● Authorization
● Authentication
Platform Security
Data
● Encryption
● Backups
● Authorization
● Authenticatio
n
Network Security
● Physical network
● Application network
● Database network
● Access to application nodes
● Access between DB nodes
● Access to specific security
groups / subnets
● Regions/zones for redundancy
Easiest to secure.
Also forgotten by amateurs.
Data Disaster Security
● Backup / Restoration of
keyspace, tables, subsets of data.
● Protection of Backup data.
● Redundancies with zones /
datacenters?
If someone deletes your data, how
will you get it back?
Hardware / Disk Security
● Cloud Disks
○ AWS / Azure / etc Disks can be encrypted
○ Disks encrypted with CMK (Customer
managed keys)
○ Without the key you can steal the disk, data
but its no good.
● Data encryption at rest via software
○ E.g. Vormetric Transparent Encryption
works on any database
○ Datastax Transparent Data Encryption
Application Security
● Separating app auth from database
auth
● App security , segregation of
database access for app users
● General app security , users, roles,
etc.
● Do we need symmetric ,
asymmetric encryption on the app
itself.
Can someone hack your database
through your app without accessing the
system?
● Using central authentication e.g.
ldap, kerberos, OKTA, etc.
● Only select users should be able to
elevate their privilege to root or
service accounts.
● Only a specific service user should
be able to run cassandra, etc.
● Use two factor auth for system
access.
Can someone get access to the computer
that the database or app is on?
Operating System Security
Roles
● Access to Cluster
● Access to Objects
● Roles & Permissions
Node JMX
● System Operations
● Nodetool
● Metrics
● Protect via SSL
● Protect via U/P
● SSL/TLS
○ Node to
Node
○ DC to DC
○ ALL
● via Network
○ Security
Group
Cassandra Security
Client
● Use App
Users to
Authenticate
● Limited
Permissions
● SSL for Client
to Node
● Add your own roles / users
● Remove cassandra user
● Segment permissions by need
● Internal vs. external
(LDAP/Kerberos)
Cassandra Roles & Permissions
● Nodes must have certificates to
connect to cluster.
● Prevents other nodes from joining
● Levels: All, DC, Rack
● Keys are on disk, must be
protected.
● Doesn’t impact developers, but can
affect users because of
encryption/decryption speed.
Cassandra Node to Node Encryption
● Application and users must have
cert to connect to the cluster.
● Prevents ‘rando’ insiders from
getting data
● Prevents ‘noobs’ from running
‘select * from everything’ queries
on Production
● Doesn’t impact node to node access
but impacts app / developer /
admin access.
Cassandra Client to Node Encryption
Other Useful Cassandra Tips
● Auditing
○ Starting in C*4
○ Also was there before.
● Data Segmentation
○ Different Keyspaces in Different
Datacenters
○ Duplicate Data with Redacted
Information
● Application Encryption
○ Encrypt Columns
○ Using a salt / hash all data going
in, coming out
○ Unable to use filters / range
queries
Resources
● https://jumpcloud.com/blog/boss-it-security-quotes
● https://www.geeksforgeeks.org/granting-permissions-to-roles-in-cassandra/
● https://cassandra.apache.org/doc/latest/cassandra/operating/security.html
● https://docs.datastax.com/en/cassandra-
oss/3.0/cassandra/configuration/secureTOC.html
● https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/n-tier/n-
tier-cassandra
● https://gomindsight.com/insights/blog/what-are-the-7-layers-of-security/
● https://blogs.vmware.com/cloud/2021/12/02/configuring-cassandra-internode-
encryption-without-data-loss/
● https://thelastpickle.com/blog/2015/09/30/hardening-cassandra-step-by-step-part-1-
server-to-server.html
● https://blog.pythian.com/cassandra-3-9-security-feature-walk/

More Related Content

PPTX
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PDF
Protect data effectively with endpoint encryption & data leak prevention
PPTX
Practical SME Security on a Shoestring
PPTX
Cryptography and system security
PPTX
Intrusion detection and prevention system
PPTX
Securing Open Source Databases
PDF
Cyber tooth briefing
PPTX
Gazzang pci v1[1]
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
Protect data effectively with endpoint encryption & data leak prevention
Practical SME Security on a Shoestring
Cryptography and system security
Intrusion detection and prevention system
Securing Open Source Databases
Cyber tooth briefing
Gazzang pci v1[1]

What's hot (20)

PPT
Safeguard your enterprise against ransomware
PPTX
Essentials of PCI Assessment
PPTX
System security
PDF
Will your cloud be compliant
PDF
Eximbank security presentation
PPTX
Network_Intrusion_Detection_System_Team1
PDF
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
PPTX
SOC Cyber Security
PDF
Ccna sec 01
PPTX
Network Security
PPTX
Recover your files from Ransomware - Ransomware Incident Response by Tictac
PPTX
Intrusion detection system
PPTX
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
PDF
Network Security Tools
PPTX
Intrusion detection system
PDF
Application Security Verification Standard Project
PPT
Understanding the need for security measures
PPTX
Operational Security Intelligence
PPTX
Malicious Client Detection Using Machine Learning
PPT
Network Security Tools and applications
Safeguard your enterprise against ransomware
Essentials of PCI Assessment
System security
Will your cloud be compliant
Eximbank security presentation
Network_Intrusion_Detection_System_Team1
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
SOC Cyber Security
Ccna sec 01
Network Security
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Intrusion detection system
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Network Security Tools
Intrusion detection system
Application Security Verification Standard Project
Understanding the need for security measures
Operational Security Intelligence
Malicious Client Detection Using Machine Learning
Network Security Tools and applications
Ad

Similar to Cassandra Lunch #90: Securing Apache Cassandra (20)

PDF
Cloud Security Introduction
PDF
Challenges with Cloud Security by Ken Y Chan
ODP
CISSP Week 14
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PPTX
Operations Security
PPTX
It security
PPTX
Introduction to Security (Hardware, Software, Data & Policies)
PDF
Remote security with Red Hat Enterprise Linux
PPTX
DG_Architecture_Training.pptx
PDF
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
PPTX
SCADA and HMI Security in InduSoft Web Studio
PDF
13.02 Network Security
PDF
Cloud Security with LibVMI
ODP
Unlock Security Insight from Machine Data
PPTX
Seucrity in a nutshell
PDF
iotsecurity-171108154118.pdf
PPTX
For Business's Sake, Let's focus on AppSec
PPTX
Data security
PDF
Linux Security best Practices with Fedora
Cloud Security Introduction
Challenges with Cloud Security by Ken Y Chan
CISSP Week 14
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Operations Security
It security
Introduction to Security (Hardware, Software, Data & Policies)
Remote security with Red Hat Enterprise Linux
DG_Architecture_Training.pptx
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
SCADA and HMI Security in InduSoft Web Studio
13.02 Network Security
Cloud Security with LibVMI
Unlock Security Insight from Machine Data
Seucrity in a nutshell
iotsecurity-171108154118.pdf
For Business's Sake, Let's focus on AppSec
Data security
Linux Security best Practices with Fedora
Ad

More from Anant Corporation (20)

PPTX
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
PPTX
QLoRA Fine-Tuning on Cassandra Link Data Set (1/2) Cassandra Lunch 137
PDF
Kono.IntelCraft.Weekly.AI.LLM.Landscape.2024.02.28.pdf
PDF
Data Engineer's Lunch 96: Intro to Real Time Analytics Using Apache Pinot
PDF
NoCode, Data & AI LLM Inside Bootcamp: Episode 6 - Design Patterns: Retrieval...
PDF
Automate your Job and Business with ChatGPT #3 - Fundamentals of LLM/GPT
PPTX
YugabyteDB Developer Tools
PPTX
Episode 2: The LLM / GPT / AI Prompt / Data Engineer Roadmap
PPTX
Machine Learning Orchestration with Airflow
PDF
Cassandra Lunch 130: Recap of Cassandra Forward Talks
PDF
Data Engineer's Lunch 90: Migrating SQL Data with Arcion
PDF
Data Engineer's Lunch 89: Machine Learning Orchestration with AirflowMachine ...
PDF
Cassandra Lunch 129: What’s New: Apache Cassandra 4.1+ Features & Future
PDF
Data Engineer's Lunch #86: Building Real-Time Applications at Scale: A Case S...
PDF
Data Engineer's Lunch #85: Designing a Modern Data Stack
PPTX
PDF
Data Engineer's Lunch #83: Strategies for Migration to Apache Iceberg
PDF
Apache Cassandra Lunch 120: Apache Cassandra Monitoring Made Easy with AxonOps
PPTX
Apache Cassandra Lunch 119: Desktop GUI Tools for Apache Cassandra
PPTX
Data Engineer's Lunch #82: Automating Apache Cassandra Operations with Apache...
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
QLoRA Fine-Tuning on Cassandra Link Data Set (1/2) Cassandra Lunch 137
Kono.IntelCraft.Weekly.AI.LLM.Landscape.2024.02.28.pdf
Data Engineer's Lunch 96: Intro to Real Time Analytics Using Apache Pinot
NoCode, Data & AI LLM Inside Bootcamp: Episode 6 - Design Patterns: Retrieval...
Automate your Job and Business with ChatGPT #3 - Fundamentals of LLM/GPT
YugabyteDB Developer Tools
Episode 2: The LLM / GPT / AI Prompt / Data Engineer Roadmap
Machine Learning Orchestration with Airflow
Cassandra Lunch 130: Recap of Cassandra Forward Talks
Data Engineer's Lunch 90: Migrating SQL Data with Arcion
Data Engineer's Lunch 89: Machine Learning Orchestration with AirflowMachine ...
Cassandra Lunch 129: What’s New: Apache Cassandra 4.1+ Features & Future
Data Engineer's Lunch #86: Building Real-Time Applications at Scale: A Case S...
Data Engineer's Lunch #85: Designing a Modern Data Stack
Data Engineer's Lunch #83: Strategies for Migration to Apache Iceberg
Apache Cassandra Lunch 120: Apache Cassandra Monitoring Made Easy with AxonOps
Apache Cassandra Lunch 119: Desktop GUI Tools for Apache Cassandra
Data Engineer's Lunch #82: Automating Apache Cassandra Operations with Apache...

Recently uploaded (20)

PPTX
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
PPTX
Pilar Kemerdekaan dan Identi Bangsa.pptx
DOCX
Factor Analysis Word Document Presentation
PPTX
Topic 5 Presentation 5 Lesson 5 Corporate Fin
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PDF
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
PPTX
SAP 2 completion done . PRESENTATION.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PDF
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PDF
How to run a consulting project- client discovery
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
CYBER SECURITY the Next Warefare Tactics
PDF
Transcultural that can help you someday.
PPTX
Leprosy and NLEP programme community medicine
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
PDF
Global Data and Analytics Market Outlook Report
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
Pilar Kemerdekaan dan Identi Bangsa.pptx
Factor Analysis Word Document Presentation
Topic 5 Presentation 5 Lesson 5 Corporate Fin
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
SAP 2 completion done . PRESENTATION.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
How to run a consulting project- client discovery
Optimise Shopper Experiences with a Strong Data Estate.pdf
CYBER SECURITY the Next Warefare Tactics
Transcultural that can help you someday.
Leprosy and NLEP programme community medicine
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
Global Data and Analytics Market Outlook Report

Cassandra Lunch #90: Securing Apache Cassandra

  • 1. Securing Apache Cassandra Strategies and tactics for cybersecurity for building platforms around Apache Cassandra, covering Network, Hardware, Data, and Application level security.
  • 2. Security : Dance between Convenience & Protecting Assets
  • 3. It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it. Stéphane Nappo, Global Chief Information Security Officer at Société Générale International Banking
  • 4. What’s the big deal with Security? Defending Valuable “Things” ● Prevent ● Detect ● React … to Prevent Negative Consequences ● User truncates a table (Insider) ● System crashes, systems down (System) ● Data can be stolen, but you may not know it (??) ● The bad actor may be 12 time zones away (Outsider) ● Someone in your company could get disgruntled. (Insider) ● Someone working at the cloud company you trust could get disgruntled. (Semi-Insider) ● Avoid litigation from governments and individuals (Legal)
  • 5. Aspects of Security Tenets of Information Security (CIA) ● Confidentiality - prevent unauthorized access. ● Integrity - prevent unsanctioned funging ● Availability - prevent unauthorized withholding of data. ● Non-repudiation - Integrity of the origin and the data itself. Legit? ● Authentication - Who can access this? ● Authorization - What should they be able to access once in? ● Accountability - Can we find out who did what?
  • 6. What do I need to do now? ● Must ○ Legal requirements ○ Data Protection ○ HIPAA / PCI ○ Data Retention policies ○ Other company policies ● Should ○ Network ○ System ○ Data ○ Application
  • 7. What else should I think about? ● Mission Critical Assets – This is the data you need to protect* ● Data Security – Data security controls protect the storage and transfer of data. ● Application Security – Applications security controls protect access to an application, an application’s access to your mission critical assets, and the internal security of the application. ● Endpoint Security – Endpoint security controls protect the connection between devices and the network. ● Network Security – Network security controls protect an organization’s network and prevent unauthorized access of the network. ● Perimeter Security – Perimeter security controls include both the physical and digital security methodologies that protect the business overall. ● The Human Layer – Humans are the weakest link in any cybersecurity posture. Human security controls include phishing simulations and access management controls that protect mission critical assets from a wide variety of human threats, including cyber criminals, malicious insiders, and negligent users.
  • 8. Network ● Edge Security ● Cloud Security ● Virtual Private Cloud Security ● Security Groups ● … System Application ● System Firewall ● Operating System ● Disk Encryption (Hard/Soft) ● OWASP ● End Points ● Variables ● Authorization ● Authentication Platform Security Data ● Encryption ● Backups ● Authorization ● Authenticatio n
  • 9. Network Security ● Physical network ● Application network ● Database network ● Access to application nodes ● Access between DB nodes ● Access to specific security groups / subnets ● Regions/zones for redundancy Easiest to secure. Also forgotten by amateurs.
  • 10. Data Disaster Security ● Backup / Restoration of keyspace, tables, subsets of data. ● Protection of Backup data. ● Redundancies with zones / datacenters? If someone deletes your data, how will you get it back?
  • 11. Hardware / Disk Security ● Cloud Disks ○ AWS / Azure / etc Disks can be encrypted ○ Disks encrypted with CMK (Customer managed keys) ○ Without the key you can steal the disk, data but its no good. ● Data encryption at rest via software ○ E.g. Vormetric Transparent Encryption works on any database ○ Datastax Transparent Data Encryption
  • 12. Application Security ● Separating app auth from database auth ● App security , segregation of database access for app users ● General app security , users, roles, etc. ● Do we need symmetric , asymmetric encryption on the app itself. Can someone hack your database through your app without accessing the system?
  • 13. ● Using central authentication e.g. ldap, kerberos, OKTA, etc. ● Only select users should be able to elevate their privilege to root or service accounts. ● Only a specific service user should be able to run cassandra, etc. ● Use two factor auth for system access. Can someone get access to the computer that the database or app is on? Operating System Security
  • 14. Roles ● Access to Cluster ● Access to Objects ● Roles & Permissions Node JMX ● System Operations ● Nodetool ● Metrics ● Protect via SSL ● Protect via U/P ● SSL/TLS ○ Node to Node ○ DC to DC ○ ALL ● via Network ○ Security Group Cassandra Security Client ● Use App Users to Authenticate ● Limited Permissions ● SSL for Client to Node
  • 15. ● Add your own roles / users ● Remove cassandra user ● Segment permissions by need ● Internal vs. external (LDAP/Kerberos) Cassandra Roles & Permissions
  • 16. ● Nodes must have certificates to connect to cluster. ● Prevents other nodes from joining ● Levels: All, DC, Rack ● Keys are on disk, must be protected. ● Doesn’t impact developers, but can affect users because of encryption/decryption speed. Cassandra Node to Node Encryption
  • 17. ● Application and users must have cert to connect to the cluster. ● Prevents ‘rando’ insiders from getting data ● Prevents ‘noobs’ from running ‘select * from everything’ queries on Production ● Doesn’t impact node to node access but impacts app / developer / admin access. Cassandra Client to Node Encryption
  • 18. Other Useful Cassandra Tips ● Auditing ○ Starting in C*4 ○ Also was there before. ● Data Segmentation ○ Different Keyspaces in Different Datacenters ○ Duplicate Data with Redacted Information ● Application Encryption ○ Encrypt Columns ○ Using a salt / hash all data going in, coming out ○ Unable to use filters / range queries
  • 19. Resources ● https://jumpcloud.com/blog/boss-it-security-quotes ● https://www.geeksforgeeks.org/granting-permissions-to-roles-in-cassandra/ ● https://cassandra.apache.org/doc/latest/cassandra/operating/security.html ● https://docs.datastax.com/en/cassandra- oss/3.0/cassandra/configuration/secureTOC.html ● https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/n-tier/n- tier-cassandra ● https://gomindsight.com/insights/blog/what-are-the-7-layers-of-security/ ● https://blogs.vmware.com/cloud/2021/12/02/configuring-cassandra-internode- encryption-without-data-loss/ ● https://thelastpickle.com/blog/2015/09/30/hardening-cassandra-step-by-step-part-1- server-to-server.html ● https://blog.pythian.com/cassandra-3-9-security-feature-walk/