Thanks for putting the items together in a list. This allows people to see things with more context. Give people in the user community a little time to respond. A week, maybe. Hopefully some of the senior Cassandra committers will take a look as well.
Will the final assessment become a public document or is it strictly internal for your employer? I know there is a database of these assessments, but I don't know who controls what becomes public and when. -- Jack Krupansky On Thu, Feb 11, 2016 at 3:23 PM, oleg yusim <olegyu...@gmail.com> wrote: > Hi Dani, > > As promised, I sort of put all my questions under the "one roof". I would > really appreciate you opinion on them. > > https://drive.google.com/open?id=0B2L9nW4Cyj41YWd1UkI4ZXVPYmM > > Thanks, > > Oleg > > On Fri, Jan 29, 2016 at 3:28 PM, Dani Traphagen < > dani.trapha...@datastax.com> wrote: > >> Hi Oleg, >> >> Thanks that helped clear things up! This sounds like a daunting task. I >> wish you all the best with it. >> >> Cheers, >> Dani >> >> On Fri, Jan 29, 2016 at 10:03 AM, oleg yusim <olegyu...@gmail.com> wrote: >> >>> Dani, >>> >>> I really appreciate you response. Actually, session timeouts and >>> security labels are two different topics (first is about attack when >>> somebody opened, say, ssh window to DB, left his machine unattended and >>> somebody else stole his session, second - to enable DB to support what >>> called MAC access model - stays for mandatory access control. It is widely >>> used in the government and military, but not outside of it, we all are used >>> to DAC access control model). However, I think you are right and I should >>> move all my queries under the one big roof and call this thread "Security". >>> I will do this today. >>> >>> Now, about what you have said, I just answered the same to Jon, in >>> Session Timeout thread, but would quickly re-cap here. I understand that >>> Cassandra's architecture was aimed and tailored for completely different >>> type of scenario. However, unfortunately, that doesn't mean that Cassandra >>> is not vulnerable to the same very set of attacks relational database would >>> be vulnerable to. It just means Cassandra is not protected against those >>> attacks, because protection against them was not thought of, when database >>> was created. I already gave the AAA and session's timeout example in Jon's >>> thread, and those are just one of many. >>> >>> Now what I'm trying to do, I'm trying to create a STIG - security >>> federal compliance document, which will assess Cassandra against SRG >>> concepts (security federal compliance recommendations for databases >>> overall) and will highlight what is not met, and can't be in current design >>> (i.e. what system architects should keep in mind and what they need to >>> compensate for with other controls on different layers of system model) and >>> what can be met either with configuration or with little enhancement (and >>> how). >>> >>> That document would be of great help for Cassandra as a product because >>> it would allow it to be marketed as a product with existing security >>> assessment and guidelines, performed according to DoD standards. It would >>> also allow to move product in the general direction of improving its >>> security posture. Finally, the document would be posted on DISA site ( >>> http://iase.disa.mil/stigs/Pages/a-z.aspx) available for every security >>> architect to utilize, which would greatly reduce the risk for Cassandra >>> product to be hacked in a field. >>> >>> To clear things out - what I ask about are not my expectations. I really >>> do not expect developers of Cassandra to run and start implementing >>> security labels, just because I asked about it. :) My questions are to >>> build my internal knowledge of DB current design, so that I can build my >>> security assessment based of it, not more, not less. >>> >>> I guess, summarizing what I said on top, from what I'm doing Cassandra >>> as a product would end up benefiting quite a bit. That is why I think it >>> would make sense for Cassandra community to help me with my questions even >>> if they sound completely of the traditional "grid". >>> >>> Thanks again, I really appreciate your response and conversation overall. >>> >>> Oleg >>> >>> On Fri, Jan 29, 2016 at 11:20 AM, Dani Traphagen < >>> dani.trapha...@datastax.com> wrote: >>> >>>> Also -- it looks like you're really asking questions about session >>>> timeouts and security labels as they associate, would be more helpful to >>>> keep in one thread. :) >>>> >>>> >>>> On Friday, January 29, 2016, Dani Traphagen < >>>> dani.trapha...@datastax.com> wrote: >>>> >>>>> Hi Oleg, >>>>> >>>>> I understand your frustration but unfortunately, in the terms of your >>>>> security assessment, you have fallen into a mismatch for Cassandra's >>>>> utility. >>>>> >>>>> The eventuality of having multiple sockets open without the query >>>>> input for long durations of time isn't something that was >>>>> architected...because...Cassnadra was built to take massive quantities >>>>> of queries both in volume and velocity. >>>>> >>>>> Your expectation of the database isn't in line with how our why it was >>>>> designed. Generally, security solutions are architected >>>>> around Cassandra, baked into the data model, many solutions >>>>> are home-brewed, written into the application or provided by using another >>>>> security client. >>>>> >>>>> DSE has different security aspects rolling out in the next release >>>>> as addressed earlier by Jack, like commit log and hint encryptions, as >>>>> well >>>>> as, unified authentication...but secuirty labels aren't on anyone's radar >>>>> as a pressing "need." It's not something I've heard about as a >>>>> priority before anyway. >>>>> >>>>> Hope this helps! >>>>> >>>>> Cheers, >>>>> Dani >>>>> >>>>> On Friday, January 29, 2016, oleg yusim <olegyu...@gmail.com> wrote: >>>>> >>>>>> Jack, >>>>>> >>>>>> Thanks for your suggestion. I'm familiar with Cassandra >>>>>> documentation, and I'm aware of differences between DSE and Cassandra. >>>>>> >>>>>> Questions I ask here are those, I found no mention about in >>>>>> documentation. Let's take security labels for instance. Cassandra >>>>>> documentation is completely silent on this regard and so is Google. I >>>>>> assume, based on it, Cassandra doesn't support it. But I can't create >>>>>> federal compliance security document for Cassandra basing it of my >>>>>> assumptions and lack of information solely. That is where my questions >>>>>> stem >>>>>> from. >>>>>> >>>>>> Thanks, >>>>>> >>>>>> Oleg >>>>>> >>>>>> On Fri, Jan 29, 2016 at 10:17 AM, Jack Krupansky < >>>>>> jack.krupan...@gmail.com> wrote: >>>>>> >>>>>>> To answer any future questions along these same lines, I suggest >>>>>>> that you start by simply searching the doc and search the github repo >>>>>>> for >>>>>>> the source code for the relevant keywords. That will give you the >>>>>>> definitive answers quickly. If something is missing, feel free to >>>>>>> propose >>>>>>> that it be added (if you really need it). And feel free to confirm here >>>>>>> if >>>>>>> a quick search doesn't give you a solid answer. >>>>>>> >>>>>>> Here's the root page for security in the Cassandra doc: >>>>>>> >>>>>>> https://docs.datastax.com/en/cassandra/3.x/cassandra/configuration/secureTOC.html >>>>>>> >>>>>>> Also note that on questions of security, DataStax Enterprise may >>>>>>> have different answers than pure open source Cassandra. >>>>>>> >>>>>>> -- Jack Krupansky >>>>>>> >>>>>>> On Thu, Jan 28, 2016 at 8:37 PM, oleg yusim <olegyu...@gmail.com> >>>>>>> wrote: >>>>>>> >>>>>>>> Patrick, >>>>>>>> >>>>>>>> Absolutely. Security label is mechanism of access control, utilized >>>>>>>> by MAC (mandatory access control) model, and not utilized by DAC >>>>>>>> (discretionary access control) model, we all are used to. In database >>>>>>>> content it is illustrated for instance here: >>>>>>>> http://www.postgresql.org/docs/current/static/sql-security-label.html >>>>>>>> >>>>>>>> Now, as per my goals, I'm making a security assessment for >>>>>>>> Cassandra DB with a goal to produce STIG on this product. That is one >>>>>>>> of >>>>>>>> the parameters in database SRG I have to assess against. >>>>>>>> >>>>>>>> Thanks, >>>>>>>> >>>>>>>> Oleg >>>>>>>> >>>>>>>> >>>>>>>> On Thu, Jan 28, 2016 at 6:32 PM, Patrick McFadin < >>>>>>>> pmcfa...@gmail.com> wrote: >>>>>>>> >>>>>>>>> Cassandra has support for authentication security, but I'm not >>>>>>>>> familiar with a security label. Can you describe what you want to do? >>>>>>>>> >>>>>>>>> Patrick >>>>>>>>> >>>>>>>>> On Thu, Jan 28, 2016 at 2:26 PM, oleg yusim <olegyu...@gmail.com> >>>>>>>>> wrote: >>>>>>>>> >>>>>>>>>> Greetings, >>>>>>>>>> >>>>>>>>>> Does Cassandra support security label concept? If so, where can I >>>>>>>>>> read on how it should be applied? >>>>>>>>>> >>>>>>>>>> Thanks, >>>>>>>>>> >>>>>>>>>> Oleg >>>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>> >>>>>>> >>>>>> >>>>> >>>>> -- >>>>> Sent from mobile -- apologizes for brevity or errors. >>>>> >>>> >>>> >>>> -- >>>> Sent from mobile -- apologizes for brevity or errors. >>>> >>> >>> >> >> >> -- >> [image: datastax_logo.png] <http://www.datastax.com/> >> >> DANI TRAPHAGEN >> >> Technical Enablement Lead | dani.trapha...@datastax.com >> >> [image: twitter.png] <https://twitter.com/dtrapezoid> [image: >> linkedin.png] <https://www.linkedin.com/pub/dani-traphagen/31/93b/b85> >> <https://github.com/dtrapezoid> >> > >