O'Reilly logo

Securing Hadoop by Sudheesh Narayanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Securing Sensitive Data in Hadoop

In Chapter 5, Integrating Hadoop with Enterprise Security Systems, we looked at integrating a secured Hadoop cluster with an Enterprise Identity Management system and enforce user authorization within Hadoop. User privileges are managed centrally and then synchronized with the secured Hadoop cluster. This enables enterprise users to access secured Hadoop services seamlessly. As an organization matures with their Big Data implementations, there is an increasing need to move sensitive information into the Hadoop ecosystem to generate valuable insights. Sensitive data in the cluster needs special protection and should be secured both at rest and in motion.

In this chapter, we look at how to secure sensitive ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required