Chapter 7: Understanding Security in Amazon EMR

In the previous chapter, you learned about EMR cluster monitoring, scaling, high availability, and cloning capabilities.

When you implement solutions in AWS, security is the most important thing that you should be focusing on. These security aspects include infrastructure security, network security, and data-level security. AWS provides several services and features by means of which you can implement security around your solution.

In this chapter, we will explain how you can control authentication and authorization in relation to your cluster, how you can secure data with encryption at rest and in transit, and finally, how AWS IAM, VPC, subnets, and cluster security groups play a role in making ...

Get Simplify Big Data Analytics with Amazon EMR now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.