Meet Ben & iRODS 4Posting - Paul Evans
Transcript of Meet Ben & iRODS 4Posting - Paul Evans
![Page 1: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/1.jpg)
BUILDING A DAM SECURE FILE SYSTEM WITH
Paul Evansprincipal architect
daystrom technology group
![Page 2: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/2.jpg)
BENLET’S MEET…
![Page 3: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/3.jpg)
BEN…
IT M
AN
AG
ER*D
AM
TH
INKE
R
O C C A S I O N A LS L E E P E R
* D I G I TA L A S S E T M A N AG E M E N T
![Page 4: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/4.jpg)
OPERATIONAL REALITY
BUSINESSEXPECTATIONS
WHY DOESN'T BEN SLEEP MUCH?
![Page 5: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/5.jpg)
‘DRIVERS’ OF THE CHAOS(DATA)
![Page 6: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/6.jpg)
indeed, we love data…
we’re good at generating more and more, but…
( we never seem to throw any of it out )
arrivingtoo
FAST
too manyVARIANTS
tooMUCHData
![Page 7: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/7.jpg)
BEN’S ‘DATA’ CONCERNS….
INVENTORY
PLACEMENT & PERFORMANCE
EFFICIENCY
SECURITY
![Page 8: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/8.jpg)
INVENTORY
➡ WHAT DO WE HAVE➡ WHERE IS IT➡ WHO TOUCHED IT➡ WHEN SHOULD IT LEAVE
098q0987qwer987ads;lk ap8dfpasuptvpqweunqev;tjqwetvoij
098q0987qwer987ads;lk ap8dfpasuptvpqweunqev;tjqwetvoij
098q0987qwer987ads;lk ap8dfpasuptvpqweunqev;tjqwetvoij
098q0987qwer987ads;lk ap8dfpasuptvpqweunqev;tjqwetvoij
098q0987qwer987ads;lk ap8dfpasuptvpqweunqev;tjqwetvoij
![Page 9: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/9.jpg)
PLACEMENT / PERFORMANCE
MULTI-SITE MANGEMENTDISTRIBUTED PROCESSINGLIMITED BANDWIDTH
PROCESSING > FAST STORAGEIDLE DATA > DURABLE STORAGE
![Page 10: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/10.jpg)
EFFICIENCY
COST TIME TOACCESS
CEOEASY INVISIBLE
![Page 11: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/11.jpg)
WHY THE SECURITY FOCUS?
“THE HACK OF THE
CENTURY”
![Page 12: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/12.jpg)
SECURITY
BOUNDARIES
TRUST
MACHINE ATTACKS
![Page 13: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/13.jpg)
TRUSTIDENTIFYING‘BAD ACTORS’
VIA MULTIFACTORAUTHENTICATION
ID / PASSWORDTOKEN INHERENCEGEO-LOCATION
![Page 14: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/14.jpg)
BOUNDARIES: POUROUS
![Page 15: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/15.jpg)
ADVANCED MACHINERYFA
STSC
ALAB
LEAT
TAC
KS
![Page 16: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/16.jpg)
WHAT SHOULD BEN DO?
![Page 17: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/17.jpg)
DAM SECURE !
iRODS iCATKEYMANAGER
THREATANALYTICS
SECURE FACILITY
DECRYPTIONGATEWAY
DECRYPTIONCLIENT
DECRYPTIONCLIENT
ENCRYPTEDDATA SERVER
ENCRYPTEDDATA SERVER
ENCRYPTEDDATA SERVER
SECURE FACILITY
TLS
MUTIFACTORAUTH
![Page 18: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/18.jpg)
DAM SECURE INVENTORY POLICY-BASED INGEST INGEST
PORTAL
C4 ID
COMPRESS / ENCRYPT
ENCRYPTEDPRODUCTION
STORAGE
ENCRYPTEDPRODUCTION
STORAGEKEY
MANAGER
iRODS iCATRELIABLE INVENTORY
SECURE PROVENANCE
(WHAT & WHERE)
CENTRAL METADATA
(WHO & WHEN)
![Page 19: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/19.jpg)
DAM SECURE PLACEMENT & PERFORMANCE
site
one
ENCRYPTEDPRODUCTIONSTORAGE
ENCRYPTEDARCHIVESTORAGE
PROCESSING
INGESTPORTAL
site
two
ENCRYPTEDPRODUCTIONSTORAGE
ENCRYPTEDARCHIVESTORAGE
PROCESSING
INGESTPORTAL
![Page 20: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/20.jpg)
SECURITY: SPOT BAD ACTORS
iRODS iCATKEYMANAGER
THREATANALYTICS
MUTIFACTORAUTH
![Page 21: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/21.jpg)
SECURITY: NO BOUNDARIES
SECURE FACILITY
DECRYPTIONGATEWAY
DECRYPTIONCLIENT
DECRYPTIONCLIENT
ENCRYPTEDDATA SERVER
ENCRYPTEDDATA SERVER
ENCRYPTEDDATA SERVER
SECURE FACILITY
TLS
SELF-DEFENDINGPORTABLE DATA
![Page 22: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/22.jpg)
SECURITY: VS MACHINES
iRODS iCATKEYMANAGER
THREATANALYTICS
MUTIFACTORAUTH
![Page 23: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/23.jpg)
DAM SECURE EFFICIENCY
site1 site2 site3
$$$ $$$$$
ENCRYPTEDPRODUCTION
STORAGE
ENCRYPTEDIDLE
STORAGE
ENCRYPTEDIDLE
STORAGEiRODS iCAT
ENCRYPTEDPRODUCTION
STORAGE
![Page 24: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/24.jpg)
BEN HAS NO (DATA) WORRIES!
INVENTORY
PLACEMENT & PERFORMANCE
EFFICIENCY
SECURITY
![Page 25: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/25.jpg)
BEN IS HAPPY THANKS TO:
technology grouptechnology group
![Page 26: Meet Ben & iRODS 4Posting - Paul Evans](https://reader035.fdocuments.us/reader035/viewer/2022070605/586684481a28aba5408b63a8/html5/thumbnails/26.jpg)
LINKS• iRODS Data Management: pixspan.com/medical_imaging.php
• Daystrom Integration: daystrom.com/technical-expertise/data-grids.html
• HGST Storage: hgst.com/company/resources/hgst-erasure-coding-and-self-protecting-technology
• C4 ID: etcentric.org/wp-content/uploads/2015/09/C4-ID-ETC-Whitepaper.pdf
• Pixspan Compression: pixspan.com/medical_imaging.php
• FireEye TAP: fireeye.com/products/threat-analytics-platform.html