官术网_书友最值得收藏!

Chapter 1. Hadoop Security Overview

Like any development project, the ones in Hadoop start with proof of concept (POC). Especially because the technology is new and continuously evolving, the focus always begins with figuring out what it can offer and how to leverage it to solve different business problems, be it consumer analysis, breaking news processing, and so on. Being an open source framework, it has its own nuances and requires a learning curve. As these POCs mature and move to pilot and then to production phase, a new infrastructure has to be set up. Then questions arise around maintaining the newly setup infrastructure, including questions on data security and the overall ecosystem's security. Few of the questions that the infrastructure administrators and security paranoids would ask are:

How secure is a Hadoop ecosystem? How secure is the data residing in Hadoop? How would different teams including business analysts, data scientists, developers, and others in the enterprise access the Hadoop ecosystem in a secure manner? How to enforce existing Enterprise Security Models in this new infrastructure? Are there any best practices for securing such an infrastructure?

This chapter will begin the journey to answer these questions and provide an overview of the typical challenges faced in securing Hadoop-based Big Data ecosystem. We will look at the key security considerations and then present the security reference architecture that can be used for securing Hadoop.

The following topics will be covered in this chapter:

  • Why do we need to secure a Hadoop-based ecosystem?
  • The challenges in securing such an infrastructure
  • Important security considerations for a Hadoop ecosystem
  • The reference architecture for securing a Hadoop ecosystem
主站蜘蛛池模板: 陆川县| 板桥市| 德清县| 浮梁县| 中西区| 商河县| 囊谦县| 长海县| 孝感市| 江达县| 昌黎县| 峡江县| 双流县| 方城县| 长顺县| 长顺县| 商丘市| 苍山县| 太康县| 南昌县| 嫩江县| 沁水县| 顺平县| 花莲市| 丘北县| 普定县| 灵川县| 抚顺县| 喀喇沁旗| 兴化市| 高台县| 高安市| 眉山市| 安图县| 陇西县| 阜平县| 岱山县| 玉树县| 沧州市| 平邑县| 蒲江县|