SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Denodo TechTalks
Product Deep-Dive Series
A product deep-dive, webinar series covering
the critical capabilities of Denodo’s modern
data virtualization
Securitizing data
using fine-grained
privileges in multi-
layered virtual
models
Javier Gayoso
Technical Consultant
Denodo
AGENDA
1. Fine-grained privileges in a multi-layer
architecture using roles
2. Caching strategies considering the view security
requirements
3. Smart query acceleration strategies considering
the view security requirements
3
Fine-grained privileges in
a multi-layer architecture
using roles
4
▪ Users acquire permission through roles
▪ Roles can be hierarchical
▪ The NIST RBAC model is based on positive
permissions
▪ A user can have several roles assigned and their
permissions are additive
Overview of the Role Based Access Control (RBAC) approach
Fine-grained privileges in a multi-layer architecture using roles
5
▪ Fine-grained privileges should be defined on the final
views
▪ Defining fine-grained privileges in intermediate levels
of the view hierarchies can lead to management
complexities
▪ Choose the highest level view with that information
available
▪ In multi-layered virtual models, defining restrictions
at intermediate layers may be unavoidable
General Best Practices with Fine-Grained Privileges
Fine-grained privileges in a multi-layer architecture using roles
6
▪ Virtual models in Denodo are usually designed following a layered architecture
▪ The chosen layers may vary but in order to illustrate the best practices we will use the
following layered structure
Multi-layered virtual model with several developer teams
Fine-grained privileges in a multi-layer architecture using roles
7
▪ core_db: This database contains the views from the semantic layer. Among others it contains the
view EMPLOYEE.
▪ hr_db: This database contains the views of the Human Resources development team. The
development team of the HR department is allowed to create their own derived views on top of the
‘core_db’ views, and they have built the view MANAGER_SALARIES, which is a derived view built on
top of the EMPLOYEE view.
Setting Limits to the Views in Higher Layers
Fine-grained privileges in a multi-layer architecture using roles
8
Amanda
Ron
▪ Giving execute access over a view to a user with privilege to create views and assign privileges, is
also indirectly transferring the ability to grant privileges to third users over that data.
▪ Fine-grained privileges allow us to set limits on this privilege, ensuring that certain security rules are
always applied.
Setting Limits to the Views in Higher Layers
Fine-grained privileges in a multi-layer architecture using roles
9
▪ More conservative best practice: use of the Global security policies (only available with Denodo Enterprise Plus) to
deny indirect visibility of the EMPLOYEE view to any role not included in a explicit list of exceptions.
Setting Limits to the Views in Higher Layers
Fine-grained privileges in a multi-layer architecture using roles
10
11
Restrictions in different
views in the same
hierarchy
▪ Now, the ‘core_db’ layer exposes to higher layers the EMPLOYEE view which includes among other things the
employees’ usernames, salaries and department ids; and the DEPARTMENT view, which contains information about
the company departments including their id, name and geographical location.
Setting up limits when restrictions are specified in different views in the same hierarchy
Fine-grained privileges in a multi-layer architecture using roles
12
▪ Deny indirect visibility using global policies
as described in the previous section.
▪ Creating a new view having all the columns
required to define the desired policies and
expose only that view to the higher layers.
Setting up limits when restrictions are specified in different views in the same hierarchy
Fine-grained privileges in a multi-layer architecture using roles
13
Sally
▪ Deny indirect visibility
Setting up limits when restrictions are specified in different views in the same hierarchy
Fine-grained privileges in a multi-layer architecture using roles
14
▪ Creating a new view having all the columns required
Setting up limits when restrictions are specified in different views in the same hierarchy
Fine-grained privileges in a multi-layer architecture using roles
15
Caching strategies
considering the view
security requirements
16
▪ If a user without any fine-grained restrictions loads the cache, a user with role
sales_manager executing that view will see all data as will access the cache directly
Fine-grained privilege limitations using cache
Caching strategies considering the view security requirements
17
▪ In the example, we could modify the permissions of sales_manager on SALARY_DETAILS to include the
same masking policy.
Define the restrictions on the cached view
Caching strategies considering the view security requirements
18
▪ In order to provide different versions of the cached data to different users you can create different
views in Virtual DataPort so each role has access to each copy of the view.
Create different views aimed at different roles and cache each one with the data for each role
Caching strategies considering the view security requirements
19
▪ It is not possible to define the same privilege at the top view level because the region column
is not available
Create different views aimed at different roles and cache each one with the data for each role
Caching strategies considering the view security requirements
20
Smart query acceleration
considering the view
security requirements
21
▪ Denodo 8.0 includes a new feature called Smart Query Acceleration, which dynamically
selects pre-stored data to avoid performing some of the same data combinations
Modeling summaries considering fine-grained privileges
Smart query acceleration considering the view security requirements
22
▪ SELECT deptno, max(salary) FROM SALARY_DETAILS GROUP BY 1
Create summaries using different versions of the dataset
Smart query acceleration considering the view security requirements
23
▪ On the other hand, if a user with role hr_emea executes the same queries, the query
optimizer will detect that it cannot use the summary as the query for that user requires an
extra condition that is not included in the pre-stored data (see image below).
Create summaries using different versions of the dataset
Smart query acceleration considering the view security requirements
24
▪ SELECT region, deptno, max(salary) FROM SALARY_DETAILS GROUP BY 1,2
Create a summary that includes the necessary fields to evaluate the restrictions.
Smart query acceleration considering the view security requirements
25
▪ Define fine-grained privileges on the final views that are exposed to data consumers. In
multi-layered virtual models with several development teams this may not be enough.
▪ A user that create new views and decide who can execute them, this user also gains the
ability to decide who can indirectly see the data of the original views.
▪ Since at runtime Denodo applies fine-grained privileges separately at each view, it’s
important to ensure that appropriate restrictions to all roles are defined for all views that
can be combined to create higher level views.
▪ Consider using global policies to deny all indirect visibility through higher views of the
data, and then defining specific policies for the desired exceptions.
▪ Caching has additional configuration capabilities and it does not depend on the
optimizer decisions.
▪ Summaries offer more advantages, as more queries will potentially benefit from them.
Closing remarks
26
▪ Best practices in designing fine-grained privileges in multi-layered virtual models
▪ Fine-grained privileges and caching best practices
▪ Fine-Grained Privileges at View Level
▪ Global Security Policies
References
27
Q&A
28
Thanks!
www.denodo.com info@denodo.co
m
© Copyright Denodo Technologies. All rights reserved
Unless otherwise specified, no part of this PDF file may be reproduced or utilized in any for or by any means, electronic or mechanical, including
photocopying and microfilm, without prior the written authorization from Denodo Technologies.

Weitere ähnliche Inhalte

Ähnlich wie Securitizing data using fine-grained privileges in multi-layered virtual models

Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesMark Skurla
 
Scaling Multi-Cloud Deployments with Denodo: Automated Infrastructure Management
Scaling Multi-Cloud Deployments with Denodo: Automated Infrastructure ManagementScaling Multi-Cloud Deployments with Denodo: Automated Infrastructure Management
Scaling Multi-Cloud Deployments with Denodo: Automated Infrastructure ManagementDenodo
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationDenodo
 
Surpassing Element by Element Access Control: Semantic-Based Security Policies
Surpassing Element by Element Access Control: Semantic-Based Security PoliciesSurpassing Element by Element Access Control: Semantic-Based Security Policies
Surpassing Element by Element Access Control: Semantic-Based Security PoliciesDenodo
 
Ensighten Manage 2.0 Tour - Agility2013
Ensighten Manage 2.0 Tour - Agility2013Ensighten Manage 2.0 Tour - Agility2013
Ensighten Manage 2.0 Tour - Agility2013Ensighten
 
Model-Based Systems Requirements
Model-Based Systems RequirementsModel-Based Systems Requirements
Model-Based Systems RequirementsJean-Michel Bruel
 
Dynamic Data Masking Mechanism on Cloud Platform
Dynamic Data Masking Mechanism on Cloud PlatformDynamic Data Masking Mechanism on Cloud Platform
Dynamic Data Masking Mechanism on Cloud PlatformIRJET Journal
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacyMd. Ahasan Hasib
 
OER Unit 4 Virtual Private Database
OER Unit 4 Virtual Private DatabaseOER Unit 4 Virtual Private Database
OER Unit 4 Virtual Private DatabaseGirija Muscut
 
Protect Sensitive Data: Implementing Fine-Grained Access Control in Oracle
Protect Sensitive Data: Implementing Fine-Grained Access Control in OracleProtect Sensitive Data: Implementing Fine-Grained Access Control in Oracle
Protect Sensitive Data: Implementing Fine-Grained Access Control in OracleNelson Calero
 
OTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least PrivilegeOTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least PrivilegeBiju Thomas
 
Design Pattern - MVC, MVP and MVVM
Design Pattern - MVC, MVP and MVVMDesign Pattern - MVC, MVP and MVVM
Design Pattern - MVC, MVP and MVVMMudasir Qazi
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloadsRuncy Oommen
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
 
SDL Web DXA: A Vision for Modules
SDL Web DXA: A Vision for ModulesSDL Web DXA: A Vision for Modules
SDL Web DXA: A Vision for ModulesAlvin Reyes
 

Ähnlich wie Securitizing data using fine-grained privileges in multi-layered virtual models (20)

Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
 
Scaling Multi-Cloud Deployments with Denodo: Automated Infrastructure Management
Scaling Multi-Cloud Deployments with Denodo: Automated Infrastructure ManagementScaling Multi-Cloud Deployments with Denodo: Automated Infrastructure Management
Scaling Multi-Cloud Deployments with Denodo: Automated Infrastructure Management
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
 
Pyramid patterns
Pyramid patternsPyramid patterns
Pyramid patterns
 
Surpassing Element by Element Access Control: Semantic-Based Security Policies
Surpassing Element by Element Access Control: Semantic-Based Security PoliciesSurpassing Element by Element Access Control: Semantic-Based Security Policies
Surpassing Element by Element Access Control: Semantic-Based Security Policies
 
Ensighten Manage 2.0 Tour - Agility2013
Ensighten Manage 2.0 Tour - Agility2013Ensighten Manage 2.0 Tour - Agility2013
Ensighten Manage 2.0 Tour - Agility2013
 
Model-Based Systems Requirements
Model-Based Systems RequirementsModel-Based Systems Requirements
Model-Based Systems Requirements
 
Dynamic Data Masking Mechanism on Cloud Platform
Dynamic Data Masking Mechanism on Cloud PlatformDynamic Data Masking Mechanism on Cloud Platform
Dynamic Data Masking Mechanism on Cloud Platform
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacy
 
OER Unit 4 Virtual Private Database
OER Unit 4 Virtual Private DatabaseOER Unit 4 Virtual Private Database
OER Unit 4 Virtual Private Database
 
Protect Sensitive Data: Implementing Fine-Grained Access Control in Oracle
Protect Sensitive Data: Implementing Fine-Grained Access Control in OracleProtect Sensitive Data: Implementing Fine-Grained Access Control in Oracle
Protect Sensitive Data: Implementing Fine-Grained Access Control in Oracle
 
OTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least PrivilegeOTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least Privilege
 
ADBMS 19MCA8125.pdf
ADBMS 19MCA8125.pdfADBMS 19MCA8125.pdf
ADBMS 19MCA8125.pdf
 
Design Pattern - MVC, MVP and MVVM
Design Pattern - MVC, MVP and MVVMDesign Pattern - MVC, MVP and MVVM
Design Pattern - MVC, MVP and MVVM
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
SDL Web DXA: A Vision for Modules
SDL Web DXA: A Vision for ModulesSDL Web DXA: A Vision for Modules
SDL Web DXA: A Vision for Modules
 

Mehr von Denodo

Enterprise Monitoring and Auditing in Denodo
Enterprise Monitoring and Auditing in DenodoEnterprise Monitoring and Auditing in Denodo
Enterprise Monitoring and Auditing in DenodoDenodo
 
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps ApproachLunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps ApproachDenodo
 
Achieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services LayerAchieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services LayerDenodo
 
What you need to know about Generative AI and Data Management?
What you need to know about Generative AI and Data Management?What you need to know about Generative AI and Data Management?
What you need to know about Generative AI and Data Management?Denodo
 
Mastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business LandscapeMastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business LandscapeDenodo
 
Denodo Partner Connect: Business Value Demo with Denodo Demo Lite
Denodo Partner Connect: Business Value Demo with Denodo Demo LiteDenodo Partner Connect: Business Value Demo with Denodo Demo Lite
Denodo Partner Connect: Business Value Demo with Denodo Demo LiteDenodo
 
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...Denodo
 
Drive Data Privacy Regulatory Compliance
Drive Data Privacy Regulatory ComplianceDrive Data Privacy Regulatory Compliance
Drive Data Privacy Regulatory ComplianceDenodo
 
Знакомство с виртуализацией данных для профессионалов в области данных
Знакомство с виртуализацией данных для профессионалов в области данныхЗнакомство с виртуализацией данных для профессионалов в области данных
Знакомство с виртуализацией данных для профессионалов в области данныхDenodo
 
Data Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
Data Democratization: A Secret Sauce to Say Goodbye to Data FragmentationData Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
Data Democratization: A Secret Sauce to Say Goodbye to Data FragmentationDenodo
 
Denodo Partner Connect - Technical Webinar - Ask Me Anything
Denodo Partner Connect - Technical Webinar - Ask Me AnythingDenodo Partner Connect - Technical Webinar - Ask Me Anything
Denodo Partner Connect - Technical Webinar - Ask Me AnythingDenodo
 
Lunch and Learn ANZ: Key Takeaways for 2023!
Lunch and Learn ANZ: Key Takeaways for 2023!Lunch and Learn ANZ: Key Takeaways for 2023!
Lunch and Learn ANZ: Key Takeaways for 2023!Denodo
 
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way ForwardIt’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way ForwardDenodo
 
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...Denodo
 
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...Denodo
 
How to Build Your Data Marketplace with Data Virtualization?
How to Build Your Data Marketplace with Data Virtualization?How to Build Your Data Marketplace with Data Virtualization?
How to Build Your Data Marketplace with Data Virtualization?Denodo
 
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsWebinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsDenodo
 
Enabling Data Catalog users with advanced usability
Enabling Data Catalog users with advanced usabilityEnabling Data Catalog users with advanced usability
Enabling Data Catalog users with advanced usabilityDenodo
 
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...Denodo
 
GenAI y el futuro de la gestión de datos: mitos y realidades
GenAI y el futuro de la gestión de datos: mitos y realidadesGenAI y el futuro de la gestión de datos: mitos y realidades
GenAI y el futuro de la gestión de datos: mitos y realidadesDenodo
 

Mehr von Denodo (20)

Enterprise Monitoring and Auditing in Denodo
Enterprise Monitoring and Auditing in DenodoEnterprise Monitoring and Auditing in Denodo
Enterprise Monitoring and Auditing in Denodo
 
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps ApproachLunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
 
Achieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services LayerAchieving Self-Service Analytics with a Governed Data Services Layer
Achieving Self-Service Analytics with a Governed Data Services Layer
 
What you need to know about Generative AI and Data Management?
What you need to know about Generative AI and Data Management?What you need to know about Generative AI and Data Management?
What you need to know about Generative AI and Data Management?
 
Mastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business LandscapeMastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business Landscape
 
Denodo Partner Connect: Business Value Demo with Denodo Demo Lite
Denodo Partner Connect: Business Value Demo with Denodo Demo LiteDenodo Partner Connect: Business Value Demo with Denodo Demo Lite
Denodo Partner Connect: Business Value Demo with Denodo Demo Lite
 
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
 
Drive Data Privacy Regulatory Compliance
Drive Data Privacy Regulatory ComplianceDrive Data Privacy Regulatory Compliance
Drive Data Privacy Regulatory Compliance
 
Знакомство с виртуализацией данных для профессионалов в области данных
Знакомство с виртуализацией данных для профессионалов в области данныхЗнакомство с виртуализацией данных для профессионалов в области данных
Знакомство с виртуализацией данных для профессионалов в области данных
 
Data Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
Data Democratization: A Secret Sauce to Say Goodbye to Data FragmentationData Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
Data Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
 
Denodo Partner Connect - Technical Webinar - Ask Me Anything
Denodo Partner Connect - Technical Webinar - Ask Me AnythingDenodo Partner Connect - Technical Webinar - Ask Me Anything
Denodo Partner Connect - Technical Webinar - Ask Me Anything
 
Lunch and Learn ANZ: Key Takeaways for 2023!
Lunch and Learn ANZ: Key Takeaways for 2023!Lunch and Learn ANZ: Key Takeaways for 2023!
Lunch and Learn ANZ: Key Takeaways for 2023!
 
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way ForwardIt’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
 
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
 
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
 
How to Build Your Data Marketplace with Data Virtualization?
How to Build Your Data Marketplace with Data Virtualization?How to Build Your Data Marketplace with Data Virtualization?
How to Build Your Data Marketplace with Data Virtualization?
 
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsWebinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
 
Enabling Data Catalog users with advanced usability
Enabling Data Catalog users with advanced usabilityEnabling Data Catalog users with advanced usability
Enabling Data Catalog users with advanced usability
 
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
 
GenAI y el futuro de la gestión de datos: mitos y realidades
GenAI y el futuro de la gestión de datos: mitos y realidadesGenAI y el futuro de la gestión de datos: mitos y realidades
GenAI y el futuro de la gestión de datos: mitos y realidades
 

Kürzlich hochgeladen

Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 

Kürzlich hochgeladen (20)

Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 

Securitizing data using fine-grained privileges in multi-layered virtual models

  • 1. Denodo TechTalks Product Deep-Dive Series A product deep-dive, webinar series covering the critical capabilities of Denodo’s modern data virtualization
  • 2. Securitizing data using fine-grained privileges in multi- layered virtual models Javier Gayoso Technical Consultant Denodo
  • 3. AGENDA 1. Fine-grained privileges in a multi-layer architecture using roles 2. Caching strategies considering the view security requirements 3. Smart query acceleration strategies considering the view security requirements 3
  • 4. Fine-grained privileges in a multi-layer architecture using roles 4
  • 5. ▪ Users acquire permission through roles ▪ Roles can be hierarchical ▪ The NIST RBAC model is based on positive permissions ▪ A user can have several roles assigned and their permissions are additive Overview of the Role Based Access Control (RBAC) approach Fine-grained privileges in a multi-layer architecture using roles 5
  • 6. ▪ Fine-grained privileges should be defined on the final views ▪ Defining fine-grained privileges in intermediate levels of the view hierarchies can lead to management complexities ▪ Choose the highest level view with that information available ▪ In multi-layered virtual models, defining restrictions at intermediate layers may be unavoidable General Best Practices with Fine-Grained Privileges Fine-grained privileges in a multi-layer architecture using roles 6
  • 7. ▪ Virtual models in Denodo are usually designed following a layered architecture ▪ The chosen layers may vary but in order to illustrate the best practices we will use the following layered structure Multi-layered virtual model with several developer teams Fine-grained privileges in a multi-layer architecture using roles 7
  • 8. ▪ core_db: This database contains the views from the semantic layer. Among others it contains the view EMPLOYEE. ▪ hr_db: This database contains the views of the Human Resources development team. The development team of the HR department is allowed to create their own derived views on top of the ‘core_db’ views, and they have built the view MANAGER_SALARIES, which is a derived view built on top of the EMPLOYEE view. Setting Limits to the Views in Higher Layers Fine-grained privileges in a multi-layer architecture using roles 8 Amanda Ron
  • 9. ▪ Giving execute access over a view to a user with privilege to create views and assign privileges, is also indirectly transferring the ability to grant privileges to third users over that data. ▪ Fine-grained privileges allow us to set limits on this privilege, ensuring that certain security rules are always applied. Setting Limits to the Views in Higher Layers Fine-grained privileges in a multi-layer architecture using roles 9
  • 10. ▪ More conservative best practice: use of the Global security policies (only available with Denodo Enterprise Plus) to deny indirect visibility of the EMPLOYEE view to any role not included in a explicit list of exceptions. Setting Limits to the Views in Higher Layers Fine-grained privileges in a multi-layer architecture using roles 10
  • 11. 11 Restrictions in different views in the same hierarchy
  • 12. ▪ Now, the ‘core_db’ layer exposes to higher layers the EMPLOYEE view which includes among other things the employees’ usernames, salaries and department ids; and the DEPARTMENT view, which contains information about the company departments including their id, name and geographical location. Setting up limits when restrictions are specified in different views in the same hierarchy Fine-grained privileges in a multi-layer architecture using roles 12
  • 13. ▪ Deny indirect visibility using global policies as described in the previous section. ▪ Creating a new view having all the columns required to define the desired policies and expose only that view to the higher layers. Setting up limits when restrictions are specified in different views in the same hierarchy Fine-grained privileges in a multi-layer architecture using roles 13 Sally
  • 14. ▪ Deny indirect visibility Setting up limits when restrictions are specified in different views in the same hierarchy Fine-grained privileges in a multi-layer architecture using roles 14
  • 15. ▪ Creating a new view having all the columns required Setting up limits when restrictions are specified in different views in the same hierarchy Fine-grained privileges in a multi-layer architecture using roles 15
  • 16. Caching strategies considering the view security requirements 16
  • 17. ▪ If a user without any fine-grained restrictions loads the cache, a user with role sales_manager executing that view will see all data as will access the cache directly Fine-grained privilege limitations using cache Caching strategies considering the view security requirements 17
  • 18. ▪ In the example, we could modify the permissions of sales_manager on SALARY_DETAILS to include the same masking policy. Define the restrictions on the cached view Caching strategies considering the view security requirements 18
  • 19. ▪ In order to provide different versions of the cached data to different users you can create different views in Virtual DataPort so each role has access to each copy of the view. Create different views aimed at different roles and cache each one with the data for each role Caching strategies considering the view security requirements 19
  • 20. ▪ It is not possible to define the same privilege at the top view level because the region column is not available Create different views aimed at different roles and cache each one with the data for each role Caching strategies considering the view security requirements 20
  • 21. Smart query acceleration considering the view security requirements 21
  • 22. ▪ Denodo 8.0 includes a new feature called Smart Query Acceleration, which dynamically selects pre-stored data to avoid performing some of the same data combinations Modeling summaries considering fine-grained privileges Smart query acceleration considering the view security requirements 22
  • 23. ▪ SELECT deptno, max(salary) FROM SALARY_DETAILS GROUP BY 1 Create summaries using different versions of the dataset Smart query acceleration considering the view security requirements 23
  • 24. ▪ On the other hand, if a user with role hr_emea executes the same queries, the query optimizer will detect that it cannot use the summary as the query for that user requires an extra condition that is not included in the pre-stored data (see image below). Create summaries using different versions of the dataset Smart query acceleration considering the view security requirements 24
  • 25. ▪ SELECT region, deptno, max(salary) FROM SALARY_DETAILS GROUP BY 1,2 Create a summary that includes the necessary fields to evaluate the restrictions. Smart query acceleration considering the view security requirements 25
  • 26. ▪ Define fine-grained privileges on the final views that are exposed to data consumers. In multi-layered virtual models with several development teams this may not be enough. ▪ A user that create new views and decide who can execute them, this user also gains the ability to decide who can indirectly see the data of the original views. ▪ Since at runtime Denodo applies fine-grained privileges separately at each view, it’s important to ensure that appropriate restrictions to all roles are defined for all views that can be combined to create higher level views. ▪ Consider using global policies to deny all indirect visibility through higher views of the data, and then defining specific policies for the desired exceptions. ▪ Caching has additional configuration capabilities and it does not depend on the optimizer decisions. ▪ Summaries offer more advantages, as more queries will potentially benefit from them. Closing remarks 26
  • 27. ▪ Best practices in designing fine-grained privileges in multi-layered virtual models ▪ Fine-grained privileges and caching best practices ▪ Fine-Grained Privileges at View Level ▪ Global Security Policies References 27
  • 29. Thanks! www.denodo.com info@denodo.co m © Copyright Denodo Technologies. All rights reserved Unless otherwise specified, no part of this PDF file may be reproduced or utilized in any for or by any means, electronic or mechanical, including photocopying and microfilm, without prior the written authorization from Denodo Technologies.