- Securing Hadoop
- Sudheesh Narayanan
- 319字
- 2021-11-12 16:38:15
What this book covers
Chapter 1, Hadoop Security Overview, highlights the key challenges and requirements that should be considered for securing any Hadoop-based Big Data platform. We then provide an enterprise view of Big Data security and detail the Big Data security reference architecture.
Chapter 2, Hadoop Security Design, details the internals of the Hadoop security design and explains the key concepts required for understanding and implementing Kerberos security. The focus of this chapter is to arrive at a common understanding of various terminologies and concepts required for remainder of this book.
Chapter 3, Setting Up a Secured Hadoop Cluster, provides a step-by-step guide on configuring Kerberos and establishing a secured Hadoop cluster.
Chapter 4, Securing the Hadoop Ecosystem, looks at the detailed internal interaction and communication protocols for each of the Hadoop ecosystem components along with the security gaps. We then provide a step-by-step guide to establish a secured Big Data ecosystem.
Chapter 5, Integrating Hadoop with Enterprise Security Systems, focuses on the implementation approach to integrate Hadoop security models with enterprise security systems and how to centrally manage access controls for users in a secured Hadoop platform.
Chapter 6, Securing Sensitive Data in Hadoop, provides a detailed implementation approach for securing sensitive data within a Hadoop ecosystem and what are the various data encryption techniques used in securing Big Data platforms.
Chapter 7, Security Event and Audit Logging in Hadoop, provides a deep dive into the security incident and event monitoring system that needs to be implemented in a secured Big Data platform. We then provide the best practices and approach for implementing these security procedures and policies.
Appendix, Solutions Available for Securing Hadoop, provides an overview of the various commercial and open source technologies that are available to build a secured Hadoop Big Data ecosystem. We look into details of each of these technologies and where they fit into the overall Big Data security reference architecture.
- Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c
- Pentaho Business Analytics Cookbook
- Learning Informatica PowerCenter 9.x
- 陜西文物年鑒·2015
- OAuth 2.0 Identity and Access Management Patterns
- 風險導向審計準則實施效果研究
- 項目管理實務(第二版)
- Getting Started with Oracle Tuxedo
- 內部控制審計功能與質量
- 審計學理論與實務
- Hyper-V Best Practices
- 內部審計數字化轉型:方法論與實踐
- 非參數統計:基于R語言案例分析
- 合規型內部審計:精準發現違規行為,實時化解合規風險
- SAP BusinessObjects Reporting Cookbook