Protecting PII/PHI Data in Data Lake via Column Level Encryption

  Рет қаралды 4,451

Databricks

Databricks

Күн бұрын

Data breach is a concern for any data collection company including Northwestern mutual. Every measure is taken to avoid the identity theft and fraud for our customers; however they are still not sufficient if the security around it is not updated periodically. A multiple layer of encryption is the most common approach utilized to avoid breaches however unauthorized internal access to this sensitive data still poses a threat
This presentation will walk you following steps:
- Design to build encryption at column level
- How to protect PII data that is used as key for joins
- Ability for authorized users to decrypt data at run time
- Ability to rotate the encryption keys if needed
At Northwestern Mutual, a combination of Fernet, AES encryption libraries, user-defined functions (UDFs), and Databricks secrets, were utilized to develop a process to encrypt PII information. Access was only provided to those with a business need to decrypt it, this helps avoids the internal threat. This is also done without data duplication or metadata (view/tables) duplication.
Our goal is to help you understand on how you can build a secure data lake for your organization which can eliminate threats of data breach internally and externally.
Associated blog: databricks.com/blog/2020/11/2...
Connect with us:
Website: databricks.com
Facebook: / databricksinc
Twitter: / databricks
LinkedIn: / data. .
Instagram: / databricksinc

Пікірлер
PII Detection at Scale on the Lakehouse
24:34
Databricks
Рет қаралды 2,7 М.
Automating Sensitive Data (PII/PHI) Detection
31:35
Databricks
Рет қаралды 2 М.
WORLD'S SHORTEST WOMAN
00:58
Stokes Twins
Рет қаралды 126 МЛН
1,000 Diamonds! (Funny Minecraft Animation) #shorts #cartoon
00:31
toonz CRAFT
Рет қаралды 40 МЛН
Application-Layer Encryption Basics for Developers
38:54
InfoQ
Рет қаралды 3,8 М.
97. Databricks | Pyspark | Data Security: Enforcing Column Level Encryption
11:48
Raja's Data Engineering
Рет қаралды 8 М.
Delta Live Tables A to Z: Best Practices for Modern Data Pipelines
1:27:52
Learn how to manage PII Data in you Data Warehouse in 30 mins
24:16
Mastering Snowflake
Рет қаралды 3,7 М.
Diving into Delta Lake 2.0
29:37
Databricks
Рет қаралды 4,4 М.
What Is Tokenization?
8:08
Brendan Owens
Рет қаралды 224 М.
A Technical Deep Dive into Unity Catalog's Practitioner Playbook
1:17:17
تجربة أغرب توصيلة شحن ضد القطع تماما
0:56
صدام العزي
Рет қаралды 64 МЛН
ноутбуки от 7.900 в тг laptopshoptop
0:14
Ноутбуковая лавка
Рет қаралды 3,5 МЛН
Ba Travel Smart Phone Charger
0:42
Tech Official
Рет қаралды 1,2 МЛН