SlideShare a Scribd company logo
Securing Cassandra
for Compliance (or Paranoia)
Hi, I'm Nate.
@zznate
https://www.linkedin.com/in/zznate
http://www.slideshare.net/zznate/
Co-Founder, CTO
The Last Pickle
Cassandra user since 2009 (v0.4)
Austin, Texas
Security presentations can be scary.
Here's a cat.
First, how did we get here and why is
securing Cassandra important?
"Target CEO Gregg Steinhafel Resigns In
Data Breach Fallout"
http://www.forbes.com/sites/clareoconnor/2014/05/05/target-ceo-gregg-steinhafel-resigns-in-wake-of-data-breach-fallout/
First, how did we get here and why is
securing Cassandra important?
I have
your
personal
information
Customers place a lot of trust
in technology companies
LOL! Me too!
Sometimes too much.
Ease of scalability comes with a price
HA! A bin-packed
message format with no source
verification!*
Ease of scalability comes with a price
* <currently reading o.a.c.net.MessageIn#read>
nmap -Pn -p7000 
-oG logs/cass.gnmap 54.88.0.0/14
I'm publicly
discussing your
technical
shortcomings
Then you end up in this situation.
Meanwhile, at the FCC...
We have to require two
factor, secure socket transport
encryption, something something...
ZZZzzzzzzzZZZzz
We did a regulation!
My staffers still print
out my email :)
Why
are we doing
this again?
Sssshhhh.
I'm AES'ing...
...even though the traffic
never leaves a backplane.
Some industries will require node to node SSL
1. Encrypting data at rest
2. Encrypting data on the wire
3. Authentication and authorization
4. Management and tooling
Focusing our Discussion: Architecture
1. Encryption at rest
No matter what:
understand the failure modes
bit rot, entropy, etc.
Horrible things can happen with on disk encryption.
Don't mind me, I'm just
your key server.
Haha! Later!
x
What's on this
disk again?
Shrug.
...but you may not have a choice.
Because we said "at rest"
dmcrypt, eCryptFS
Open source options:
Vormetric, Gazzang
Commercial options:
DSE Encryption
CREATETABLE users
...
WITH compression_parameters:sstable_compression = 'Encryptor'
and compression_parameters:cipher_algorithm = 'AES/ECB/
PKCS5Padding'
and compression_parameters:secret_key_strength = 128;
DSE Encryption
CREATETABLE users
...
WITH compression_parameters:sstable_compression = 'Encryptor'
and compression_parameters:cipher_algorithm = 'AES/ECB/
PKCS5Padding'
and compression_parameters:secret_key_strength = 128;
WARNING:
commitlog not included*
*eCryptFS would work fine for this
EBS Encryption
(a.k.a "not my problem")
(Looks like this)
EBS Encryption
(a.k.a "not my problem")
http://www.slideshare.net/AmazonWebServices/bdt323-amazon-ebs-cassandra-1-million-writes-per-second
See Crowdstrike's presentation on
Cassandra GP2 performance (with encryption):
Maybe Client Side?
The Java Driver now has custom codecs
which would make this easy to implement
https://github.com/datastax/java-driver/tree/3.0/manual/custom_codecs
Maybe Client Side?
The Java Driver now has custom codecs
which would make this easy to implement
https://github.com/datastax/java-driver/tree/3.0/manual/custom_codecs
Column-level encryption!
New in Cassandra 3.4
(DSE 5.1?):
Commitlog Encryption: CASSANDRA-6018
Hint File Encryption: CASSANDRA-11040
https://issues.apache.org/jira/browse/CASSANDRA-6018
https://issues.apache.org/jira/browse/CASSANDRA-11040
2. Encryption on the wire
Because:
It is really easy to attack
an un-protected cluster
It takes a single Message
to insert an admin account
into the system table
-Dcassandra.write_survey=true
How to steal writes in real time:
The fix is straight forward:
node to node encryption and SSL client certificate
authentication to cluster traffic
Awwwwww.
The fix is straight forward:
node to node encryption and SSL client certificate
authentication to cluster traffic
Awwwwww.
The fix is straight forward:
node to node encryption and SSL client certificate
authentication to cluster traffic
Bonus: can be done
with NO downtime!!!
Awwwwww.
The fix is straight forward:
node to node encryption and SSL client certificate
authentication to cluster traffic
Bonus: can be done
with NO downtime!!!
How-to guide:
http://thelastpickle.com/blog/2015/09/30/hardening-cassandra-step-by-step-part-1-server-to-
server.html
When you are done it should look like:
Things to note:
Use "dc" or "rack" to limit encryption to
connections between racks and data centers
Thanks for that!!
Huzzah!
(But AES on modern hardware
will not be a bottleneck)
Things to note:
Keystore and key password must match
(artifact of JDK X.509 Impl complexity)
Things to note:
256 bit means export restrictions
(requires JCE provider JAR)
http://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html
http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html#importlimits
Don't forget this part or else...
Things to note:
Hahaha!
Now I'm hacking you over SSL.
*Still* vulnerable AND you can't see what the
attacker is doing.
Client to Server SSL
Client to Server SSL
(see slides 30 to 35)
Client to Server SSL
(see slides 30 to 35)
Now with NO downtime!!!
https://issues.apache.org/jira/browse/CASSANDRA-10559
Available in: 2.1.12, 2.2.4, 3.0.0
Need to Debug SSL?
-Djavax.net.debug=ssl
http://docs.oracle.com/javase/7/docs/technotes/guides/security/jsse/ReadDebug.html
Certs are hard :(
Netflix Lemur:
x.509 Certificate Orchestration Framework
http://techblog.netflix.com/2015/09/introducing-lemur.html
https://github.com/Netflix/lemur
Certs are hard :(
Hashicorp Vault
"secures, stores, and tightly controls access to
tokens, passwords, certificates, API keys, and
other secrets in modern computing. "
https://www.vaultproject.io/
2. Encryption on the wire
But wait! There's more!
The internode authentication API:
BYO identity verification
Looks like this:
3. Authentication and Authorization
Best practices should not be new to you.
user segmentation
schema access limitation
etc.
(Everything we did with an RDBMS)
Best practices should not be new to you.
user segmentation
schema access limitation
etc.
Best practices should not be new to you.
user segmentation
schema access limitation
etc.
(Everything we did with an RDBMS)
New in 2.2:
Role-based access control!
An Example
An Example
An Example
An Example
An Example
buzzword compliant!
An Example
An Example
Turning it all on
authenticator: PasswordAuthenticator
Tip: keep your read-only cqlsh credentials in
$HOME/.cassandra/cqlshrc
of the system's admin account
Turning it all on
authorizer: CassandraAuthorizer
Turning it all on
role_manager: CassandraRoleManager
Turning it all on
authorizer: CassandraAuthorizer
authenticator: PasswordAuthenticator
role_manager: CassandraRoleManager
WARNING:
potential downtime!
authorizer: CassandraAuthorizer
authenticator: PasswordAuthenticator
role_manager: CassandraRoleManager
Turning it all on
WARNING:
potential downtime!
WARNING:
stupid defaults
authorizer: CassandraAuthorizer
authenticator: PasswordAuthenticator
role_manager: CassandraRoleManager
Turning it all on
WARNING:
potential downtime!
WARNING:
stupid defaults
TIP: turn these WAY UP:
permissions_validity_in_ms
roles_validity_in_ms
Also: use permissions_update_interval_in_ms
for async refresh if needed
authorizer: CassandraAuthorizer
authenticator: PasswordAuthenticator
role_manager: CassandraRoleManager
Turning it all on
WARNING:
potential downtime!
WARNING:
stupid defaults
NEW in 3.4:credentials_validity_in_ms*
* https://issues.apache.org/jira/browse/CASSANDRA-7715
Turning it all on
authorizer: TransitionalAuthorizer
authenticator: TransitionalAuthenticator
DSE plugins to avoid downtime
Turning it all on
system.schema_keyspace
system.schema_columns
system.schema_columnfamilies
system.local
system.peers
These tables have default read permissions for every
authenticated user:
Turning it all on
IMPORTANT cassandra.yaml line note:
"Please increase system_auth keyspace
replication factor if you use this..."
Tip: replication factor for the system_auth
keyspace should be the same as the number
of nodes in the data center
Turning it all on
IMPORTANT cassandra.yaml line note:
"Please increase system_auth keyspace
replication factor if you use this..."
Tip: replication factor for the system_auth
keyspace should be the same as the number
of nodes in the data center
WARNING:
stupid defaults*
*https://issues.apache.org/jira/browse/CASSANDRA-11340
4. Management and tooling
4. Management and tooling
Securing JMX
nmap -Pn -p7199 
-oG logs/cass.gnmap 54.88.0.0/14
Always a few suckers that
TL,DR'ed
Why do I need to secure JMX?
Hardening cassandra q2_2016
Works as Advertised!
also
good for
some
LOLs
Securing JMX
SSL setup is like node to node and client to server
http://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html
Securing JMX
JMX Authentication is straightforward
and well documented
$JAVA_HOME/jre/lib/management/jmxremote.access
$JAVA_HOME/jre/lib/management/
jmxremote.password.template
http://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html
Securing JMX
$JAVA_HOME/jre/lib/management/jmxremote.access
$JAVA_HOME/jre/lib/management/
jmxremote.password.template
Now you can:
nodetool -u admin -pw secret compactionstats
http://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html
JMX Authentication is straightforward
and well documented
Securing JMX
$JAVA_HOME/jre/lib/management/jmxremote.access
$JAVA_HOME/jre/lib/management/
jmxremote.password.template
Now you can:
nodetool -u admin -pw secret compactionstats
Tip: -pwf option will read the password from a file
http://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html
JMX Authentication is straightforward
and well documented
Securing JMX
$JAVA_HOME/jre/lib/management/jmxremote.access
$JAVA_HOME/jre/lib/management/
jmxremote.password.template
Now you can:
nodetool -u admin -pw secret compactionstats
JMX Authentication is straightforward
and well documented
THIS JUST IN!!!
RBAC for JMX Authentication and Authorization
https://issues.apache.org/jira/browse/CASSANDRA-10091
Thanks!@zznate

More Related Content

What's hot (17)

PDF
Dynamic Database Credentials: Security Contingency Planning
Sean Chittenden
 
PDF
Production Readiness Strategies in an Automated World
Sean Chittenden
 
PDF
Training Slides: 302 - Securing Your Cluster With SSL
Continuent
 
PDF
2020-02-20 - HashiTalks 2020 - HashiCorp Vault configuration as code via Hash...
Andrey Devyatkin
 
PDF
HashiCorp Vault Workshop:幫 Credentials 找個窩
smalltown
 
PPTX
Bridging the Gap
Will Schroeder
 
PDF
The Unintended Risks of Trusting Active Directory
Will Schroeder
 
PDF
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
Jeff Horwitz
 
PPTX
Vault - Secret and Key Management
Anthony Ikeda
 
PDF
HashiCorp Vault configuration as code via HashiCorp Terraform- stories from t...
Andrey Devyatkin
 
ODP
50 tips50minutes
Bhakti Mehta
 
PDF
HashiCorp's Vault - The Examples
Michał Czeraszkiewicz
 
PPTX
So you want to be a security expert
Royce Davis
 
PDF
Things YouShould Be Doing When Using Cassandra Drivers
Rebecca Mills
 
PDF
In the Wake of Kerberoast
ken_kitahara
 
PDF
A Case Study in Attacking KeePass
Will Schroeder
 
PDF
Keybase Vault Auto-Unseal HashiTalks2020
Bas Meijer
 
Dynamic Database Credentials: Security Contingency Planning
Sean Chittenden
 
Production Readiness Strategies in an Automated World
Sean Chittenden
 
Training Slides: 302 - Securing Your Cluster With SSL
Continuent
 
2020-02-20 - HashiTalks 2020 - HashiCorp Vault configuration as code via Hash...
Andrey Devyatkin
 
HashiCorp Vault Workshop:幫 Credentials 找個窩
smalltown
 
Bridging the Gap
Will Schroeder
 
The Unintended Risks of Trusting Active Directory
Will Schroeder
 
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
Jeff Horwitz
 
Vault - Secret and Key Management
Anthony Ikeda
 
HashiCorp Vault configuration as code via HashiCorp Terraform- stories from t...
Andrey Devyatkin
 
50 tips50minutes
Bhakti Mehta
 
HashiCorp's Vault - The Examples
Michał Czeraszkiewicz
 
So you want to be a security expert
Royce Davis
 
Things YouShould Be Doing When Using Cassandra Drivers
Rebecca Mills
 
In the Wake of Kerberoast
ken_kitahara
 
A Case Study in Attacking KeePass
Will Schroeder
 
Keybase Vault Auto-Unseal HashiTalks2020
Bas Meijer
 

Viewers also liked (20)

PDF
Advanced Apache Cassandra Operations with JMX
zznate
 
PDF
Open Source Monitoring for Java with JMX and Graphite (GeeCON 2013)
Cyrille Le Clerc
 
PDF
Cassandra Summit 2014: CQL Under the Hood
DataStax Academy
 
PDF
Hadoop 2.0 - The Next Level
Sascha Dittmann
 
PDF
Cassandra presentation at NoSQL
Evan Weaver
 
PDF
Wayne State University & DataStax: World's best data modeling tool for Apache...
DataStax Academy
 
PDF
DataStax: A deep look at the CQL WHERE clause
DataStax Academy
 
PDF
Become a super modeler
Patrick McFadin
 
PDF
Camunda and Apache Cassandra
camunda services GmbH
 
PDF
The data model is dead, long live the data model
Patrick McFadin
 
PDF
Leveraging the Power of Solr with Spark
QAware GmbH
 
PDF
Cassandra by example - the path of read and write requests
grro
 
PPTX
Learning Cassandra
Dave Gardner
 
PDF
Migrating Netflix from Datacenter Oracle to Global Cassandra
Adrian Cockcroft
 
KEY
Cassandra+Hadoop
Jeremy Hanna
 
PDF
Architektur Insights - Big Data, NoSQL
Claudio Altamura
 
PDF
Wide-column Stores für Architekten (HBase, Cassandra)
Andreas Buckenhofer
 
PDF
Cassandra for Sysadmins
Nathan Milford
 
PDF
Automotive Information Research driven by Apache Solr
Mario-Leander Reimer
 
Advanced Apache Cassandra Operations with JMX
zznate
 
Open Source Monitoring for Java with JMX and Graphite (GeeCON 2013)
Cyrille Le Clerc
 
Cassandra Summit 2014: CQL Under the Hood
DataStax Academy
 
Hadoop 2.0 - The Next Level
Sascha Dittmann
 
Cassandra presentation at NoSQL
Evan Weaver
 
Wayne State University & DataStax: World's best data modeling tool for Apache...
DataStax Academy
 
DataStax: A deep look at the CQL WHERE clause
DataStax Academy
 
Become a super modeler
Patrick McFadin
 
Camunda and Apache Cassandra
camunda services GmbH
 
The data model is dead, long live the data model
Patrick McFadin
 
Leveraging the Power of Solr with Spark
QAware GmbH
 
Cassandra by example - the path of read and write requests
grro
 
Learning Cassandra
Dave Gardner
 
Migrating Netflix from Datacenter Oracle to Global Cassandra
Adrian Cockcroft
 
Cassandra+Hadoop
Jeremy Hanna
 
Architektur Insights - Big Data, NoSQL
Claudio Altamura
 
Wide-column Stores für Architekten (HBase, Cassandra)
Andreas Buckenhofer
 
Cassandra for Sysadmins
Nathan Milford
 
Automotive Information Research driven by Apache Solr
Mario-Leander Reimer
 
Ad

Similar to Hardening cassandra q2_2016 (20)

PDF
Securing Cassandra
Instaclustr
 
PDF
Instaclustr: Securing Cassandra
DataStax Academy
 
PDF
The Promise and Perils of Encrypting Cassandra Data (Ameesh Divatia, Baffle, ...
DataStax
 
PDF
201504 securing cassandraanddse
Johnny Miller
 
PDF
How to Bulletproof Your Scylla Deployment
ScyllaDB
 
PDF
Cassandra Security Configuration
Braja Krishna Das
 
PPTX
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
Sandeep Patil
 
PPTX
Open Source Security Tools for Big Data
Great Wide Open
 
PPTX
Open Source Security Tools for Big Data
Rommel Garcia
 
PPTX
Cassandra Lunch #90: Securing Apache Cassandra
Anant Corporation
 
PPTX
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax
 
PPTX
Cassandra
rezabehzadi3
 
PDF
Building a fence around your Hadoop cluster
larsfrancke
 
PPTX
Securing Open Source Databases
Gazzang
 
PPTX
Encryption in the enterprise
Bozhidar Bozhanov
 
PDF
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl
 
PDF
The Last Pickle: Hardening Apache Cassandra for Compliance (or Paranoia).
DataStax Academy
 
PDF
Pythian: My First 100 days with a Cassandra Cluster
DataStax Academy
 
PPTX
Cassandra Lunch #92: Securing Apache Cassandra - Managing Roles and Permissions
Anant Corporation
 
PPTX
SSL Securing Oracle DB
Harris Baskaran
 
Securing Cassandra
Instaclustr
 
Instaclustr: Securing Cassandra
DataStax Academy
 
The Promise and Perils of Encrypting Cassandra Data (Ameesh Divatia, Baffle, ...
DataStax
 
201504 securing cassandraanddse
Johnny Miller
 
How to Bulletproof Your Scylla Deployment
ScyllaDB
 
Cassandra Security Configuration
Braja Krishna Das
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
Sandeep Patil
 
Open Source Security Tools for Big Data
Great Wide Open
 
Open Source Security Tools for Big Data
Rommel Garcia
 
Cassandra Lunch #90: Securing Apache Cassandra
Anant Corporation
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax
 
Cassandra
rezabehzadi3
 
Building a fence around your Hadoop cluster
larsfrancke
 
Securing Open Source Databases
Gazzang
 
Encryption in the enterprise
Bozhidar Bozhanov
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl
 
The Last Pickle: Hardening Apache Cassandra for Compliance (or Paranoia).
DataStax Academy
 
Pythian: My First 100 days with a Cassandra Cluster
DataStax Academy
 
Cassandra Lunch #92: Securing Apache Cassandra - Managing Roles and Permissions
Anant Corporation
 
SSL Securing Oracle DB
Harris Baskaran
 
Ad

More from zznate (12)

PDF
Successful Software Development with Apache Cassandra
zznate
 
PDF
An Introduction to the Vert.x framework
zznate
 
PDF
Intravert atx meetup_condensed
zznate
 
PDF
Apachecon cassandra transport
zznate
 
KEY
Oscon 2012 tdd_cassandra
zznate
 
PPTX
Strata west 2012_java_cassandra
zznate
 
ODP
Nyc summit intro_to_cassandra
zznate
 
ODP
Meetup cassandra sfo_jdbc
zznate
 
ODP
Introduciton to Apache Cassandra for Java Developers (JavaOne)
zznate
 
ODP
Introduction to apache_cassandra_for_developers-lhg
zznate
 
PPT
Introduction to apache_cassandra_for_develope
zznate
 
PPT
Hector v2: The Second Version of the Popular High-Level Java Client for Apach...
zznate
 
Successful Software Development with Apache Cassandra
zznate
 
An Introduction to the Vert.x framework
zznate
 
Intravert atx meetup_condensed
zznate
 
Apachecon cassandra transport
zznate
 
Oscon 2012 tdd_cassandra
zznate
 
Strata west 2012_java_cassandra
zznate
 
Nyc summit intro_to_cassandra
zznate
 
Meetup cassandra sfo_jdbc
zznate
 
Introduciton to Apache Cassandra for Java Developers (JavaOne)
zznate
 
Introduction to apache_cassandra_for_developers-lhg
zznate
 
Introduction to apache_cassandra_for_develope
zznate
 
Hector v2: The Second Version of the Popular High-Level Java Client for Apach...
zznate
 

Recently uploaded (20)

PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
PDF
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
The Future of Artificial Intelligence (AI)
Mukul
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 

Hardening cassandra q2_2016