Securing Hadoop
上QQ阅读APP看书,第一时间看更新

What this book covers

Chapter 1, Hadoop Security Overview, highlights the key challenges and requirements that should be considered for securing any Hadoop-based Big Data platform. We then provide an enterprise view of Big Data security and detail the Big Data security reference architecture.

Chapter 2, Hadoop Security Design, details the internals of the Hadoop security design and explains the key concepts required for understanding and implementing Kerberos security. The focus of this chapter is to arrive at a common understanding of various terminologies and concepts required for remainder of this book.

Chapter 3, Setting Up a Secured Hadoop Cluster, provides a step-by-step guide on configuring Kerberos and establishing a secured Hadoop cluster.

Chapter 4, Securing the Hadoop Ecosystem, looks at the detailed internal interaction and communication protocols for each of the Hadoop ecosystem components along with the security gaps. We then provide a step-by-step guide to establish a secured Big Data ecosystem.

Chapter 5, Integrating Hadoop with Enterprise Security Systems, focuses on the implementation approach to integrate Hadoop security models with enterprise security systems and how to centrally manage access controls for users in a secured Hadoop platform.

Chapter 6, Securing Sensitive Data in Hadoop, provides a detailed implementation approach for securing sensitive data within a Hadoop ecosystem and what are the various data encryption techniques used in securing Big Data platforms.

Chapter 7, Security Event and Audit Logging in Hadoop, provides a deep dive into the security incident and event monitoring system that needs to be implemented in a secured Big Data platform. We then provide the best practices and approach for implementing these security procedures and policies.

Appendix, Solutions Available for Securing Hadoop, provides an overview of the various commercial and open source technologies that are available to build a secured Hadoop Big Data ecosystem. We look into details of each of these technologies and where they fit into the overall Big Data security reference architecture.