Protecting PII/PHI Data in Data Lake via Column Level Encryption
Data breach is a concern for any data collection company including Northwestern mutual. Every measure is taken to avoid the identity theft and fraud for our customers; however they are still not sufficient if the security around it is not updated periodically. A multiple layer of encryption is the most common approach utilized to avoid breaches however unauthorized internal access to this sensitive data still poses a threat
This presentation will walk you following steps:
- Design to build encryption at column level
- How to protect PII data that is used as key for joins
- Ability for authorized users to decrypt data at run time
- Ability to rotate the encryption keys if needed
At Northwestern Mutual, a combination of Fernet, AES encryption libraries, user-defined functions (UDFs), and Databricks secrets, were utilized to develop a process to encrypt PII information. Access was only provided to those with a business need to decrypt it, this helps avoids the internal threat. This is also done without data duplication or metadata (view/tables) duplication.
Our goal is to help you understand on how you can build a secure data lake for your organization which can eliminate threats of data breach internally and externally.
Associated blog: https://databricks.com/blog/2020/11/20/enforcing-column-level-encryption-and-avoiding-data-duplication-with-pii.html
Connect with us:
Website: https://databricks.com
Facebook: https://www.facebook.com/databricksinc
Twitter: https://twitter.com/databricks
LinkedIn: https://www.linkedin.com/company/data...
Instagram: https://www.instagram.com/databricksinc/
Видео Protecting PII/PHI Data in Data Lake via Column Level Encryption канала Databricks
This presentation will walk you following steps:
- Design to build encryption at column level
- How to protect PII data that is used as key for joins
- Ability for authorized users to decrypt data at run time
- Ability to rotate the encryption keys if needed
At Northwestern Mutual, a combination of Fernet, AES encryption libraries, user-defined functions (UDFs), and Databricks secrets, were utilized to develop a process to encrypt PII information. Access was only provided to those with a business need to decrypt it, this helps avoids the internal threat. This is also done without data duplication or metadata (view/tables) duplication.
Our goal is to help you understand on how you can build a secure data lake for your organization which can eliminate threats of data breach internally and externally.
Associated blog: https://databricks.com/blog/2020/11/20/enforcing-column-level-encryption-and-avoiding-data-duplication-with-pii.html
Connect with us:
Website: https://databricks.com
Facebook: https://www.facebook.com/databricksinc
Twitter: https://twitter.com/databricks
LinkedIn: https://www.linkedin.com/company/data...
Instagram: https://www.instagram.com/databricksinc/
Видео Protecting PII/PHI Data in Data Lake via Column Level Encryption канала Databricks
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Comcast makes home entertainment accessible to everyone with voice, data and AI](https://i.ytimg.com/vi/1UZi-EJQaFQ/default.jpg)
![NBA Analytics | Data Brew | Season 4 Episode 2](https://i.ytimg.com/vi/-rQi9_gNvUk/default.jpg)
![Data+AI Summit 2022 Highlights](https://i.ytimg.com/vi/9xt8GuywrBo/default.jpg)
![Media and Entertainment Experience at Data + AI Summit 2022](https://i.ytimg.com/vi/Hmr9rE3I6uI/default.jpg)
![Demo Video: Connect to Power BI Desktop from Databricks](https://i.ytimg.com/vi/EcKqQV0rCnQ/default.jpg)
![Recap of Announcements at Data + AI Summit 2024 with Ali Ghodsi, Co-Founder and CEO, Databricks](https://i.ytimg.com/vi/FOuU9asaXE4/default.jpg)
![LLM Module 3 - Multi-stage Reasoning | 3.7.1 Notebook Demo Part 1](https://i.ytimg.com/vi/PJcGkI1m9jQ/default.jpg)
![Power to the (SQL) People: Python UDFs in DBSQL](https://i.ytimg.com/vi/lotaSmKE8r0/default.jpg)
![Grab leverages data + AI to create economic opportunities in Southeast Asia](https://i.ytimg.com/vi/CrH5Bb4kjLQ/default.jpg)
![Wehkamp excites shoppers with a better online experience with ML](https://i.ytimg.com/vi/tl4vgOyDFcA/default.jpg)
![Spline: Central Data-Lineage Tracking, Not Only For Spark](https://i.ytimg.com/vi/Bz_Ml6pNH2E/default.jpg)
![How To Make Apache Spark on Kubernetes Run Reliably on Spot Instances](https://i.ytimg.com/vi/te9PaxKIabA/default.jpg)
![Apache Arrow Flight SQL: High Performance, Simplicity, and Interoperability for Data Transfers](https://i.ytimg.com/vi/OLsXlKb_XRQ/default.jpg)
![Lakehouse ML on Databricks Demo](https://i.ytimg.com/vi/1TPu-uOLglI/default.jpg)
![Exploring Lakehouse for Retail](https://i.ytimg.com/vi/_G6Oh5MtkR0/default.jpg)
![Evolving Data Governance With Unity Catalog Presented by Matei Zaharia at Data + AI Summit 2024](https://i.ytimg.com/vi/lZbmBAxa3O4/default.jpg)
![Introducing Databricks on Google Cloud](https://i.ytimg.com/vi/uBOkJbO_WSk/default.jpg)
![Applied Predictive Maintenance in Aviation: Without Sensor Data](https://i.ytimg.com/vi/82KiWQqmKWU/default.jpg)
![LLM Module 0 - Introduction | 0.3 Primer](https://i.ytimg.com/vi/HYhUno0xc70/default.jpg)
![Delta Sharing - A New Paradigm for Secure Data Sharing and Data Collaboration on Lakehouse](https://i.ytimg.com/vi/uDRjyOaEW1c/default.jpg)