Embodiments for providing security to Big Data of an organization are described. In one example, security related inputs are received from a user and are converted into security requirement. Thereafter, a security policy template is identified from plurality of pre-defined security policy templates based on security reference architecture and the security requirement. The security policy template represents a plurality of security controls. Thereafter, one or more security controls are selected from the security controls based on the security requirement. Further, one or more existing security controls implemented in Big Data environment are identified. Thereafter, the selected security controls are compared with the existing security controls for determining a security control that is not implemented in the Big Data environment. Subsequently, the security control is implemented in the Big Data environment to provide security to the Big Data of the organization.
CLIAMS:1. An information security system (100) for securing Big Data of an organization, the information security system (100) comprising:
a processor (102);
an interaction module (112) coupled to the processor (102) to:
obtain one or more security related inputs from a user for a Big Data environment deployed in the organization;
convert the one or more security related inputs into at least one security requirement for the Big Data environment;
a security policy designer (114) coupled to the processor (102) to:
identify a security policy template from amongst a plurality of pre-defined security policy templates based on a security reference architecture and the at least one security requirement, wherein the security policy template represents a plurality of security controls, and wherein the security reference architecture is indicative of the plurality of security controls categorized in a plurality of security layers and security control selection rules;
select one or more security controls from amongst the plurality of security controls based on the at least one security requirement;
a determination module (118) coupled to the processor (102) to:
identify one or more existing security controls implemented in the Big Data environment based on at least one environment parameter;
compare the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment to determine a security control from amongst the selected one or more security controls that is not implemented in the Big Data environment; and
implement the security control in the Big Data environment to provide security to the Big Data of the organization.
2. The information security system (100) as claimed in claim 1, wherein the determination module (118) further is to determine changes to be made to the one or more existing security controls based on the comparison of the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment.
3. The information security system (100) as claimed in claim 1, wherein the security policy designer (114) further is to:
render the security policy template to the user for customization;
based on the customization, select the one or more security controls from amongst the plurality of security controls;
design one or more security policies based on the selected one or more security controls; and
implement the one or more security policies in the Big Data environment to provide security to the Big Data of the organization.
4. The information security system (100) as claimed in claim 3, wherein the security policy designer (114) further is to replicate the one or more security policies of another Big Data environment deployed in the organization.
5. The information security system (100) as claimed in claim 1, the security policy designer (114) further is to generate a visual model for the Big Data environment, wherein the visual model depicts at least one of the security policy template, one or more security policies, and information related to Big Data environment.
6. The information security system (100) as claimed in claim 1, wherein the determination module (118) further is to determine a security product corresponding to each of the one or more existing security controls, and wherein a security product implements a respective existing security control.
7. The information security system (100) as claimed in claim 1, further comprises a monitoring module (120) coupled to the processor (102) to:
periodically monitor the one or more existing security controls implemented in the Big Data environment to determine whether the one or more existing security controls deviate from a security policy; and
on determining the one or more existing security controls to be deviating from the security policy, initiate an action for the Big Data environment.
8. The information security system (100) as claimed in claim 7, wherein the monitoring module (120) is to:
receive a user request to monitor a subset of the Big Data environment against a security policy; and
in response to the user request, monitor the subset of the Big Data environment against the security policy.
9. The information security system (100) as claimed in claim 7, wherein the monitoring module (120) further is to provide a dashboard view of the Big Data environment to the user, wherein the dashboard view allows the user to view information related to the Big Data environment, and wherein the information includes security policies, and status of the Big Data environment.
10. The information security system (100) as claimed in claim 1, further comprises a performance simulator (116) to:
simulate the Big Data environment to ascertain performance of the Big Data environment; and
simulate an impact on a functionality of the Big Data based on changes in the security controls.
11. A method for providing security to Big Data of an organization, the method comprising:
obtaining one or more security related inputs from a user for a Big Data environment deployed in the organization;
converting the one or more security related inputs into at least one security requirement for the Big Data environment;
identifying a security policy template from amongst a plurality of pre-defined security policy templates based on a security reference architecture and the at least one security requirement, wherein the security policy template represents a plurality of security controls, and wherein the security reference architecture is indicative of the plurality of security controls categorized in a plurality of security layers and security control selection rules;
selecting one or more security controls from amongst the plurality of security controls based on the at least one security requirement;
identifying one or more existing security controls implemented in the Big Data environment based on at least one environment parameter;
comparing the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment to determine a security control from amongst the selected one or more security controls that is not implemented in the Big Data environment; and
implementing the security control in the Big Data environment to provide security to the Big Data of the organization.
12. The method as claimed in claim 11, wherein identifying the one or more security controls comprises:
rendering the security policy template to the user for customization;
based on the customization, selecting the one or more security controls from amongst the plurality of security controls;
creating one or more security policies based on the selected one or more security controls; and
implementing the one or more security policies in the Big Data environment to provide security to the Big Data of the organization.
13. The method as claimed in claim 11, further comprises:
generating a visual model for the Big Data environment, wherein the visual model depicts at least one of the security policy template, one or more security policies, and information related to Big Data environment.
14. The method as claimed in claim 11, further comprises:
determining changes to be made to the one or more existing security controls based on the comparison of the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment.
15. The method as claimed in claim 11, further comprises:
monitoring the one or more existing security controls implemented in the Big Data environment to determine whether the one or more existing security controls deviates from a security policy; and
on determining the one or more existing security controls to be deviating from the security policy, initiating an action for the Big Data environment.
16. The method as claimed in claim 11, further comprises providing a dashboard view of the Big Data environment to the user, wherein the dashboard view allows the user to view information related to the Big Data environment, and wherein the information includes security policies, and status of the Big Data environment.
17. The method as claimed in claim 11, further comprises determining a security product corresponding to each of the one or more existing security controls, wherein a security product implements a respective existing security control.
18. The method as claimed in claim 11, wherein the Big Data environment comprises Big Data technologies, NoSQL technologies, and a combination of the Big Data technologies and the NoSQL technologies..
19. A non-transitory computer-readable medium having embodied thereon a computer program for executing a method comprising:
obtaining one or more security related inputs from a user for a Big Data environment deployed in an organization;
converting the one or more security related inputs into at least one security requirement for the Big Data environment;
identifying a security policy template from amongst a plurality of pre-defined security policy templates based on a security reference architecture and the at least one security requirement, wherein the security policy template represents a plurality of security controls, and wherein the security reference architecture is indicative of the plurality of security controls categorized in a plurality of security layers and security control selection rules;
selecting one or more security controls from amongst the plurality of security controls based on the at least one security requirement;
identifying one or more existing security controls implemented in the Big Data environment based on at least one environment parameter;
comparing the selected one or more security controls with the one or more existing security controls implemented in the Big Data environment to determine a security control from amongst the selected one or more security controls that is not implemented in the Big Data environment; and
implementing the security control in the Big Data environment to provide security to the Big Data of the organization.
,TagSPECI:As Attached
| # | Name | Date |
|---|---|---|
| 1 | 739-MUM-2015-FORM-1-26-03-2015.pdf | 2015-03-26 |
| 2 | 739-MUM-2015-CORRESPONDENCE-26-03-2015.pdf | 2015-03-26 |
| 3 | 739-MUM-2015-FORM 26-(24-04-2015).pdf | 2015-04-24 |
| 4 | 739-MUM-2015-CORRESPONDENCE-(24-04-2015).pdf | 2015-04-24 |
| 5 | REQUEST FOR CERTIFIED COPY [30-12-2015(online)].pdf | 2015-12-30 |
| 7 | Request For Certified Copy-Online.pdf | 2018-08-11 |
| 8 | PD015297IN-SC - SPEC FOR FILING.pdf | 2018-08-11 |
| 9 | PD015297IN-SC - FORM 5.pdf | 2018-08-11 |
| 10 | PD015297IN-SC - FORM 3.pdf | 2018-08-11 |
| 11 | PD015297IN-SC - DRAWINGS FOR FILING.pdf | 2018-08-11 |
| 12 | 739-MUM-2015-Form 3-020516.pdf | 2018-08-11 |
| 13 | 739-MUM-2015-Correspondence-020516.pdf | 2018-08-11 |
| 14 | 739-MUM-2015-FER.pdf | 2019-11-19 |
| 15 | 739-MUM-2015-FORM 3 [17-04-2020(online)].pdf | 2020-04-17 |
| 16 | 739-MUM-2015-OTHERS [11-05-2020(online)].pdf | 2020-05-11 |
| 17 | 739-MUM-2015-FER_SER_REPLY [11-05-2020(online)].pdf | 2020-05-11 |
| 18 | 739-MUM-2015-COMPLETE SPECIFICATION [11-05-2020(online)].pdf | 2020-05-11 |
| 19 | 739-MUM-2015-CLAIMS [11-05-2020(online)].pdf | 2020-05-11 |
| 20 | 739-MUM-2015-PatentCertificate16-03-2021.pdf | 2021-03-16 |
| 21 | 739-MUM-2015-IntimationOfGrant16-03-2021.pdf | 2021-03-16 |
| 22 | 739-MUM-2015-RELEVANT DOCUMENTS [27-09-2022(online)].pdf | 2022-09-27 |
| 23 | 739-MUM-2015-RELEVANT DOCUMENTS [26-09-2023(online)].pdf | 2023-09-26 |
| 1 | SearchStrategyMatrix_19-11-2019.pdf |
| 2 | SearchStrategyMatrixAE_09-02-2021.pdf |
| 3 | 2019-11-1913-08-39_19-11-2019.pdf |