coverpage
Securing Hadoop
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. Hadoop Security Overview
Why do we need to secure Hadoop?
Challenges for securing the Hadoop ecosystem
Key security considerations
Summary
Chapter 2. Hadoop Security Design
What is Kerberos?
The Hadoop default security model without Kerberos
Hadoop Kerberos security implementation
Summary
Chapter 3. Setting Up a Secured Hadoop Cluster
Prerequisites
Setting up Kerberos
Configuring Hadoop with Kerberos authentication
Configuring users for Hadoop
Automation of a secured Hadoop deployment
Summary
Chapter 4. Securing the Hadoop Ecosystem
Configuring Kerberos for Hadoop ecosystem components
Best practices for securing the Hadoop ecosystem components
Summary
Chapter 5. Integrating Hadoop with Enterprise Security Systems
Integrating Enterprise Identity Management systems
Accessing a secured Hadoop cluster from an enterprise network
Summary
Chapter 6. Securing Sensitive Data in Hadoop
Securing sensitive data in Hadoop
Summary
Chapter 7. Security Event and Audit Logging in Hadoop
Security Incident and Event Monitoring in a Hadoop Cluster
Setting up audit logging in a secured Hadoop cluster
Summary
Appendix A. Solutions Available for Securing Hadoop
Hadoop distribution with enhanced security support
Automation of a secured Hadoop cluster deployment
Different Hadoop data encryption options
Securing the Hadoop ecosystem with Project Rhino
Mapping of security technologies with the reference architecture
Index
更新时间:2021-11-12 16:38:26