Book description
Implement robust end-to-end security for your Hadoop ecosystem
- Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
- Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
- Administer the auditing and security event monitoring system
In Detail
Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.
This book is a practitioner’s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.
This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.
Table of contents
-
Securing Hadoop
- Table of Contents
- Securing Hadoop
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Preface
- 1. Hadoop Security Overview
- 2. Hadoop Security Design
-
3. Setting Up a Secured Hadoop Cluster
- Prerequisites
-
Setting up Kerberos
-
Installing the Key Distribution Center
- Configuring the Key Distribution Center
- Establishing the KDC database
- Setting up the administrator principal for KDC
- Starting the Kerberos daemons
- Setting up the first Kerberos administrator
- Adding the user or service principals
- Configuring LDAP as the Kerberos database
- Supporting AES-256 encryption for a Kerberos ticket
-
Installing the Key Distribution Center
- Configuring Hadoop with Kerberos authentication
- Configuring users for Hadoop
- Automation of a secured Hadoop deployment
- Summary
- 4. Securing the Hadoop Ecosystem
- 5. Integrating Hadoop with Enterprise Security Systems
- 6. Securing Sensitive Data in Hadoop
- 7. Security Event and Audit Logging in Hadoop
- A. Solutions Available for Securing Hadoop
- Index
Product information
- Title: Securing Hadoop
- Author(s):
- Release date: November 2013
- Publisher(s): Packt Publishing
- ISBN: 9781783285259
You might also like
book
Hadoop Security
As more corporations turn to Hadoop to store and process their most valuable data, the risk …
book
Practical Hadoop Security
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want …
book
Virtualizing Hadoop: How to Install, Deploy, and Optimize Hadoop in a Virtualized Architecture
Plan and Implement Hadoop Virtualization for Maximum Performance, Scalability, and Business Agility Enterprises running Hadoop must …
book
Professional Hadoop Solutions
The go-to guidebook for deploying Big Data solutions with Hadoop Today's enterprise architects need to understand …