Starting with Hadoop SecurityIntroducing Authentication and Authorization for HDFSAuthorizationReal-World Example for Designing Hadoop AuthorizationFine-Grained Authorization for HadoopSecurely Administering HDFSUsing Hadoop Logging for SecurityMonitoring for SecurityTools of the TradeEncryption: Relevance and Implementation for HadoopEncryption for Data in TransitEncryption for Data at RestSummary