New handbook outlines big data security best practice » Charity Digital News

New handbook outlines big data security best practice

IT analytics

The Cloud Security Alliance (CSA) has published a new handbook from the CSA Big Data Working Group, outlining the 100 best practices in big data security.

The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy, strives to detail the best practices that should be followed by any big data service provider to fortify their infrastructure. The handbook presents ten compelling considerations for each of the top ten challenges in big data security and privacy, which the group previously outlined in the Top Ten Big Data Security and Privacy Challenges white paper.

The amount of data generated is expected to double every two years; from 2500 exabytes in 2012 to 40,000 exabytes in 2020. Large-scale cloud infrastructures, diversity of data sources and formats, the streaming nature of data acquisition and high-volume, inter-cloud migration all play a role in the creation of unique security vulnerabilities.


Useful pointers

As well as providing information that organisations can use to secure their own data security, the book also provides some useful pointers for charities when selecting cloud-based data storage providers.

“This is an important initiative for the cloud community as new security challenges have arisen from the coupling of big data with public cloud environments. As big data expands through streaming cloud technology, traditional security mechanisms tailored to secure small-scale, static data on firewalled and semi-isolated networks are inadequate,” said JR Santos, executive vice president of research for the CSA. “Security and privacy issues are magnified by this volume, variety and velocity of big data. This handbook serves as a comprehensive list of best practices for companies to use when securing big data.”

The handbook provides a roster of 100 best practices, ranging from typical cybersecurity measures, such as authentication and access control, to state-of-the-art cryptographic technologies. It addresses why these security measures are needed as well as how they can be implemented.

The best practice handbook can be downloaded here.

Related reading

opt in
IT analytics