Security	And	Performance:	A	Tale	Of	Two	Cities
Rekha	Joshi
Principal	Engineer,	Intuit
@rekhajoshm
https://www.linkedin.com/in/rekhajoshm
#StrataData Strata Data Conference, London
An	Insight	Into	Intuit
Founded
7,900
Employees
42M
Customers
1993
IPO
$4.7B
Revenue
24
Locations
1983
#StrataData Strata Data Conference, London
Our	Mission:	Powering	Prosperity	Around	World
#StrataData Strata Data Conference, London
Is	Your	Application	Online	or	Data	Intensive?
Is	This	Talk	For	You?
#StrataData Strata Data Conference, London
The	Joshi	Hierarchy	Of	Application	Needs
Security
Performance
Utility
Operability
Adding
Value
Maslow hierarchy of needs Joshihierarchy of application needs
#StrataData Strata Data Conference, London
The	First	Step	In	Defense	Is	To	Know	Your	Weaknesses
#StrataData Strata Data Conference, London
Security	Layers	
Physical	Security:
Earthquake,	Flood,	Fire
Network	Security:
MIT	Kerberos,	TLS
Platform	Security:
Authentication,	Authorization,	Audit
Cloud	Security:
Regions,	VPN,	Subnet,	VPC,	
Security	Groups,	ACL
Data	Security:
Data	Governance,	Encryption,	
Key	Rotations
Application	Security:
Secure	Coding,	No	obscurity
#StrataData Strata Data Conference, London
Constant	Vigilance
Fix	Vulnerabilities Threat	Modeling Penetration	Testing
Spam	Emails
Virsues,	Trojans,	Worms
SQL	Injection
Cross	Site	Scripting
Distributed	Denial	of	Service	attacks
Spoofing
Deprecation
Social	Engineering
#StrataData Strata Data Conference, London
Constant	Vigilance
Threat	Modeling Penetration	Testing
http://www.cvedetails.com/vulnerabilities-by-types.php
Fix	Vulnerabilities
#StrataData Strata Data Conference, London
Constant	Vigilance
Threat	Modeling Penetration	Testing
https://security.googleblog.com/2017/05/oss-fuzz-five-months-later-and.html
Fix	Vulnerabilities
Open Source - Do Your Own Due Diligence
#StrataData Strata Data Conference, London
Constant	Vigilance
Fix	Vulnerabilities Penetration	TestingThreat	Modeling
DREAD: Damage Potential, Reproducibility, Exploitability, Affected users, Discoverability
#StrataData Strata Data Conference, London
Constant	Vigilance
Fix	Vulnerabilities Threat	Modeling Penetration	Testing
#StrataData Strata Data Conference, London
Secure	By	Design
#StrataData Strata Data Conference, London
Security	Facets
Authentication Authorization Auditing
EncryptionIsolation
Standby	ClusterKey	Rotation
Key	And	Secret	
Management
Data	Governance
https://www.owasp.org/index.php/Security_by_Design_Principles
#StrataData Strata Data Conference, London
Security	In	Practice
Deployment
• Regular	AMI	updates/patches
• Ensure	no	access	Leaks
• Secure	your	configurations
• Heed	internal	security	bulletin
Application
• Ensure	no	cross	site	scripting
• Ensure	no	memory	leaks,	buffer	overrun
• Ensure	thread	safety
• Implement	secure	patterns
Security	Is	Never	“Done”,	It	Is	a	Journey.
#StrataData Strata Data Conference, London
Is	Your	Tech	Stack	Secure?
For	a	service	to	be	business	viable,	it	needs	to	be	secure!
Example	Tech	Stack
Linux
Hadoop	2.x	
AWS	Services
Spark
Kafka
Cassandra
Kerberos	Security
Encryption	(TLS,	TDE)
Shared	
Responsibility	Model
Principle	Of	Least	Privilege
Data	Governance
Key	Rotation
#StrataData Strata Data Conference, London
But	Secure	Does	Not	Have	To	Mean	Slow..
#StrataData Strata Data Conference, London
Performance	Tuning
Understanding	 workload
Leaner	deployment	patterns	
Scalable	components	
Data	structures,	algorithms	
Caching
Limit	strings,	objects	created
Tune	garbage	collector
Use	asynchronous	processing
Code	quality
Memory	optimizationApplication	Optimizations:
Code	Quality,	Language,	Caching,	
Using	Asynchronous	API
Platform	Optimizations:
Provider,	Auto	scaling,	Tuning
Database	Optimizations:
Indexes,	tables,	partitioning
OS	Optimizations:
CPU,	Network,	IO
#StrataData Strata Data Conference, London
Performance	Tuning
Hardware	Optimizations:
Processor,	cores,	SSD,	disks,	file	system
#StrataData Strata Data Conference, London
Don’t	Settle	For	A	Single	Test	Run	
Performance	Tests:
Simulated	Representative	Load,	Concurrent	Users,	Varying	Variables,	Environment,	Key	Vault	Performance
#StrataData Strata Data Conference, London
But	Start	With	The	End	In	Mind..
Targeted	
Load	
(TPS)
Resource	
Stack
Server	Side	
Latency
3,000 12	Web
12	App	
06	Cassandra
<	10ms
6,000 24	Web	
24	App	
12	Cassandra
<	10ms
Intuit	Open	source	AB	Testing:	https://github.com/intuit/wasabi
#StrataData Strata Data Conference, London
Be	Proactive	In	Measuring	Performance
AWS resource
alarms
Custom App MetricsJVM and App
Metrics
Custom process
alerts
Logging and
alert
Prometheus.io
ElasticSearch
Kibana
LogStash
Slack
Grafana
#StrataData Strata Data Conference, London
So	What	Should	You	Do	Now?
#StrataData Strata Data Conference, London
- AMI,	OS,	Software	patches
Patch,	Patch,	Patch
Be	Secure
Adopt	Principle	Of	Least	Privilege
- Access	Controls
- Authentication,	Authorization
Know	And	Manage	Your	Data
- Data	Governance
- Legal	And	Compliance
Embrace	Secure	Coding	Practices
- Secure	Configuration
- Input	Validation
- No	Memory	Leak
- Internal	Security	hack-a-thons	
- External	Security	blogs
Publish	Internal	Security	Bulletins
#StrataData Strata Data Conference, London
Be	Fast
Have	Automated	Fast	Lean	Stateless	Deployment
Embrace	High	Performance	Coding	Practices
- Fewer	Object	Creation	
- Garbage	Collection	Tuning
- Secure	Configuration
Have	Performing	Infrastructure
- Processor	chips,	cores
- Type	Of	Instance
- Auto	Scaling
#StrataData Strata Data Conference, London
Takeaways
Security	Is	
Vital
Performance	Is	
Critical
You	Can	Have	
Them	Both
It’s	a	Journey
#StrataData Strata Data Conference, London
@rekhajoshm https://www.linkedin.com/in/rekhajoshm

More Related Content

PPTX
2015 Data Security Solutions @SFK - Working and living in digital work of future
PDF
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
PPTX
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
PPTX
Practical analytics hands-on to cloud & IoT cyber threats
PPTX
Cross domain autonomous cooperation cross-domain autonomous cooperation
PDF
neXt Curve IoT Evolution Expo 2018 Event Review
PPTX
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
PPT
Smart Gateways, Blockchain and the Internet of Things (Charalampos Doukas-Cre...
2015 Data Security Solutions @SFK - Working and living in digital work of future
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
Practical analytics hands-on to cloud & IoT cyber threats
Cross domain autonomous cooperation cross-domain autonomous cooperation
neXt Curve IoT Evolution Expo 2018 Event Review
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Smart Gateways, Blockchain and the Internet of Things (Charalampos Doukas-Cre...

What's hot (20)

PDF
Bat38 aouini bogosalvarado_zk-snark_blockchain
PPT
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
PDF
Fog computing security and privacy issues, open challenges, and blockchain so...
PDF
(SACON) Srinivas posarala - Challenges & Approach
PDF
IoT security reference architecture
PDF
Vodafone Internet of Things
PDF
Rapid Prototyping for IoT
PDF
How blockchain will defend iot
PDF
#Blockchain - ISG Digital Business Summit 2017 - AP Manders
PDF
Blockchain DeFi Platform Design & Development Webinar Agenda & References
PPTX
Ditas Poster v1.1
PDF
Blockchain — The Ledger Of Every Thing
PDF
ブロックチェーンの実用化に向けたネットワーク・スケーリング
PPT
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
PPTX
Internet of Things (IoT) two-factor authentication using blockchain
PDF
Oracle Blockchain Cloud Service
PPTX
Banking Technology Future 2018 - Consensus between School of Thoughts
PDF
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
PDF
Verifiable Credentials in Self-Sovereign Identity (SSI)
PPTX
IoT, Fog Computing and the Blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchain
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
Fog computing security and privacy issues, open challenges, and blockchain so...
(SACON) Srinivas posarala - Challenges & Approach
IoT security reference architecture
Vodafone Internet of Things
Rapid Prototyping for IoT
How blockchain will defend iot
#Blockchain - ISG Digital Business Summit 2017 - AP Manders
Blockchain DeFi Platform Design & Development Webinar Agenda & References
Ditas Poster v1.1
Blockchain — The Ledger Of Every Thing
ブロックチェーンの実用化に向けたネットワーク・スケーリング
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
Internet of Things (IoT) two-factor authentication using blockchain
Oracle Blockchain Cloud Service
Banking Technology Future 2018 - Consensus between School of Thoughts
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Verifiable Credentials in Self-Sovereign Identity (SSI)
IoT, Fog Computing and the Blockchain
Ad

Similar to Security And Performance: A Tale Of Two Cities (20)

PDF
Concurrency Security Summit presentation
PDF
Concurrency Security Summit presentation
PPTX
Fortinet Corporate Overview Deck 11.pptx
PDF
Blockhain Ecosystem Development
PPTX
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
PDF
Charleston R!OT IoT Applications for Defense Workshop
PPTX
Emerging application and data protection for multi cloud
PDF
Internet of Things IoT Anytime Anywhere Anything Connectivity
PPTX
Datensicherheit bei Microsoft Azure und Office 365
PDF
Deep Learning and Big Data technologies for IoT Security
PPTX
Mobility Security - A Business-Centric Approach
PPTX
IoT World Forum Press Conference - 10.14.2014
PPTX
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
PDF
How to secure and manage modern IT - Ondrej Vysek
PDF
Y20151003 IoT 資訊安全_趨勢科技分享
PPTX
Microsoft Azure Security - Customer Deck.pptx
PDF
Tracxn - Enterprise Security Startup Landscape
PPTX
Cloud & Big Data - Digital Transformation in Banking
PPTX
"Azure is the new black”
PPTX
Cms - Big Data y Cloud
Concurrency Security Summit presentation
Concurrency Security Summit presentation
Fortinet Corporate Overview Deck 11.pptx
Blockhain Ecosystem Development
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Charleston R!OT IoT Applications for Defense Workshop
Emerging application and data protection for multi cloud
Internet of Things IoT Anytime Anywhere Anything Connectivity
Datensicherheit bei Microsoft Azure und Office 365
Deep Learning and Big Data technologies for IoT Security
Mobility Security - A Business-Centric Approach
IoT World Forum Press Conference - 10.14.2014
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
How to secure and manage modern IT - Ondrej Vysek
Y20151003 IoT 資訊安全_趨勢科技分享
Microsoft Azure Security - Customer Deck.pptx
Tracxn - Enterprise Security Startup Landscape
Cloud & Big Data - Digital Transformation in Banking
"Azure is the new black”
Cms - Big Data y Cloud
Ad

More from Rekha Joshi (8)

PPTX
Berlin buzzwords 2018
PPTX
Innersource Summit 2018
PDF
Hadoop Summit 2016 - Evolution of Big Data Pipelines At Intuit
PDF
O'Reilly Velocity Europe
PDF
ApacheCon - Seven habits of highly effective big data programmers
PPTX
Lean Experiments To Successful Productization!
PPT
CassandraSummit'2015:Reporting From Trenches: Using Cassandra Effectively!
PPT
HadoopSummit'2015:Self Evolving Models for Dynamic System Accuracy
Berlin buzzwords 2018
Innersource Summit 2018
Hadoop Summit 2016 - Evolution of Big Data Pipelines At Intuit
O'Reilly Velocity Europe
ApacheCon - Seven habits of highly effective big data programmers
Lean Experiments To Successful Productization!
CassandraSummit'2015:Reporting From Trenches: Using Cassandra Effectively!
HadoopSummit'2015:Self Evolving Models for Dynamic System Accuracy

Recently uploaded (20)

PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Modernising the Digital Integration Hub
PDF
Five Habits of High-Impact Board Members
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
The various Industrial Revolutions .pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Architecture types and enterprise applications.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Convolutional neural network based encoder-decoder for efficient real-time ob...
Flame analysis and combustion estimation using large language and vision assi...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Zenith AI: Advanced Artificial Intelligence
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Modernising the Digital Integration Hub
Five Habits of High-Impact Board Members
Custom Battery Pack Design Considerations for Performance and Safety
Comparative analysis of machine learning models for fake news detection in so...
The various Industrial Revolutions .pptx
sbt 2.0: go big (Scala Days 2025 edition)
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
A review of recent deep learning applications in wood surface defect identifi...
Architecture types and enterprise applications.pdf
Basics of Cloud Computing - Cloud Ecosystem
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
NewMind AI Weekly Chronicles – August ’25 Week III

Security And Performance: A Tale Of Two Cities

  • 2. #StrataData Strata Data Conference, London An Insight Into Intuit Founded 7,900 Employees 42M Customers 1993 IPO $4.7B Revenue 24 Locations 1983
  • 3. #StrataData Strata Data Conference, London Our Mission: Powering Prosperity Around World
  • 4. #StrataData Strata Data Conference, London Is Your Application Online or Data Intensive? Is This Talk For You?
  • 5. #StrataData Strata Data Conference, London The Joshi Hierarchy Of Application Needs Security Performance Utility Operability Adding Value Maslow hierarchy of needs Joshihierarchy of application needs
  • 6. #StrataData Strata Data Conference, London The First Step In Defense Is To Know Your Weaknesses
  • 7. #StrataData Strata Data Conference, London Security Layers Physical Security: Earthquake, Flood, Fire Network Security: MIT Kerberos, TLS Platform Security: Authentication, Authorization, Audit Cloud Security: Regions, VPN, Subnet, VPC, Security Groups, ACL Data Security: Data Governance, Encryption, Key Rotations Application Security: Secure Coding, No obscurity
  • 8. #StrataData Strata Data Conference, London Constant Vigilance Fix Vulnerabilities Threat Modeling Penetration Testing Spam Emails Virsues, Trojans, Worms SQL Injection Cross Site Scripting Distributed Denial of Service attacks Spoofing Deprecation Social Engineering
  • 9. #StrataData Strata Data Conference, London Constant Vigilance Threat Modeling Penetration Testing http://www.cvedetails.com/vulnerabilities-by-types.php Fix Vulnerabilities
  • 10. #StrataData Strata Data Conference, London Constant Vigilance Threat Modeling Penetration Testing https://security.googleblog.com/2017/05/oss-fuzz-five-months-later-and.html Fix Vulnerabilities Open Source - Do Your Own Due Diligence
  • 11. #StrataData Strata Data Conference, London Constant Vigilance Fix Vulnerabilities Penetration TestingThreat Modeling DREAD: Damage Potential, Reproducibility, Exploitability, Affected users, Discoverability
  • 12. #StrataData Strata Data Conference, London Constant Vigilance Fix Vulnerabilities Threat Modeling Penetration Testing
  • 13. #StrataData Strata Data Conference, London Secure By Design
  • 14. #StrataData Strata Data Conference, London Security Facets Authentication Authorization Auditing EncryptionIsolation Standby ClusterKey Rotation Key And Secret Management Data Governance https://www.owasp.org/index.php/Security_by_Design_Principles
  • 15. #StrataData Strata Data Conference, London Security In Practice Deployment • Regular AMI updates/patches • Ensure no access Leaks • Secure your configurations • Heed internal security bulletin Application • Ensure no cross site scripting • Ensure no memory leaks, buffer overrun • Ensure thread safety • Implement secure patterns Security Is Never “Done”, It Is a Journey.
  • 16. #StrataData Strata Data Conference, London Is Your Tech Stack Secure? For a service to be business viable, it needs to be secure! Example Tech Stack Linux Hadoop 2.x AWS Services Spark Kafka Cassandra Kerberos Security Encryption (TLS, TDE) Shared Responsibility Model Principle Of Least Privilege Data Governance Key Rotation
  • 17. #StrataData Strata Data Conference, London But Secure Does Not Have To Mean Slow..
  • 18. #StrataData Strata Data Conference, London Performance Tuning Understanding workload Leaner deployment patterns Scalable components Data structures, algorithms Caching Limit strings, objects created Tune garbage collector Use asynchronous processing Code quality Memory optimizationApplication Optimizations: Code Quality, Language, Caching, Using Asynchronous API Platform Optimizations: Provider, Auto scaling, Tuning Database Optimizations: Indexes, tables, partitioning OS Optimizations: CPU, Network, IO
  • 19. #StrataData Strata Data Conference, London Performance Tuning Hardware Optimizations: Processor, cores, SSD, disks, file system
  • 20. #StrataData Strata Data Conference, London Don’t Settle For A Single Test Run Performance Tests: Simulated Representative Load, Concurrent Users, Varying Variables, Environment, Key Vault Performance
  • 21. #StrataData Strata Data Conference, London But Start With The End In Mind.. Targeted Load (TPS) Resource Stack Server Side Latency 3,000 12 Web 12 App 06 Cassandra < 10ms 6,000 24 Web 24 App 12 Cassandra < 10ms Intuit Open source AB Testing: https://github.com/intuit/wasabi
  • 22. #StrataData Strata Data Conference, London Be Proactive In Measuring Performance AWS resource alarms Custom App MetricsJVM and App Metrics Custom process alerts Logging and alert Prometheus.io ElasticSearch Kibana LogStash Slack Grafana
  • 23. #StrataData Strata Data Conference, London So What Should You Do Now?
  • 24. #StrataData Strata Data Conference, London - AMI, OS, Software patches Patch, Patch, Patch Be Secure Adopt Principle Of Least Privilege - Access Controls - Authentication, Authorization Know And Manage Your Data - Data Governance - Legal And Compliance Embrace Secure Coding Practices - Secure Configuration - Input Validation - No Memory Leak - Internal Security hack-a-thons - External Security blogs Publish Internal Security Bulletins
  • 25. #StrataData Strata Data Conference, London Be Fast Have Automated Fast Lean Stateless Deployment Embrace High Performance Coding Practices - Fewer Object Creation - Garbage Collection Tuning - Secure Configuration Have Performing Infrastructure - Processor chips, cores - Type Of Instance - Auto Scaling
  • 26. #StrataData Strata Data Conference, London Takeaways Security Is Vital Performance Is Critical You Can Have Them Both It’s a Journey
  • 27. #StrataData Strata Data Conference, London @rekhajoshm https://www.linkedin.com/in/rekhajoshm