Created 03-22-2017 09:25 PM
How does NiFi support data protection and encryption for PCI compliance? We are looking to ingest credit card transactions data which contains sensitive and PII information.
Option 1: encrypt data at source before sending to NiFi - how does NiFi handle encrypted data for making attribute-based routing decisions?
Option 2: use NiFi to ingest raw transaction data from a secure source -> use NiFi EncryptContent processor to encrypt the content of the flow file. How does it get stored in the content and flow file repositories? Is the data encrypted when stored on disk?
Created 03-23-2017 06:51 PM
Currently, NiFi supports encrypting/decrypting data through the EncryptContent processor, but the pre/post state of the data would still be stored in plaintext in the content repository. In general, transparent disk encryption/OS-level data encryption is recommended in conjunction with strict OS-level/POSIX access controls.
There is a current effort to provide encrypted implementations of the flowfile (attribute), content, and provenance repositories.
As Dan mentioned, a combination of encrypted payload and plaintext metadata for routing can work very well if the payload does not need to be processed/transformed inside NiFi.
Created 03-23-2017 06:02 PM
Created 03-23-2017 06:51 PM
Currently, NiFi supports encrypting/decrypting data through the EncryptContent processor, but the pre/post state of the data would still be stored in plaintext in the content repository. In general, transparent disk encryption/OS-level data encryption is recommended in conjunction with strict OS-level/POSIX access controls.
There is a current effort to provide encrypted implementations of the flowfile (attribute), content, and provenance repositories.
As Dan mentioned, a combination of encrypted payload and plaintext metadata for routing can work very well if the payload does not need to be processed/transformed inside NiFi.