Securing a Cassandra cluster involves a varied set of tasks including authentication, authorization, and encryption. This chapter describes how you manage the following security-related tasks:
- Authentication: How you allow applications and users to log into the cluster.
- Authorization: Deals with the granting of permissions to access a database or database objects such as tables and materialized views.
- Encryption: Refers to the use of the Secure Socket Layer (SSL) to secure communications between clients and Cassandra databases, and among a cluster’s nodes.
- Firewalls ...