Securing Hadoop



Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.

This book is a practitioner’s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.

This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.

What you will learn from this book:

  • Understand the challenges of securing Hadoop and Big Data and master the reference architecture for Big Data security
  • Demystify Kerberos and the Hadoop security model
  • Learn the steps to secure a Hadoop platform with Kerberos
  • Integrate Enterprise Security Systems with Hadoop security and build an integrated security model
  • Get detailed insights into securing sensitive data in a Hadoop Big Data platform
  • Implement audit logging and a security event monitoring system for your Big Data platform
  • Discover the various industry tools and vendors that can be used to build a secured Hadoop platform
  • Recognize how the various Hadoop components interact with each other and what protocols and security they implement
  • Design a secure Hadoop infrastructure and implement the various security controls within the enterprise


Android Hacker’s Handbook

2014-5-12 17:21:35


Mastering Node.js

2014-5-13 19:54:29