Big data is generated by a variety of different gadgets and sensors, including security devices. The new report from the Cloud Security Alliance — “100 Best Practices in Big Data Security and Privacy” — looks at the best practices that should be implemented for real-time security/compliance monitoring.
1.Apply big data analytics to detect anomalous connections to cluster.
Why? To ensure only authorized connections are allowed on a cluster, as this makes up part of the trusted big data environment.