Securing Hadoop
Implement robust end-to-end security for your Hadoop ecosystem Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform Administer the auditin...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing
2013.
|
Edición: | 1st edition |
Colección: | Community experience distilled
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627959506719 |
Tabla de Contenidos:
- Cover
- Copyright
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Table of Contents
- Preface
- Chapter 1: Hadoop Security Overview
- Why do we need to secure Hadoop?
- Challenges for securing the Hadoop ecosystem
- Key security considerations
- Reference architecture for Big Data security
- Summary
- Chapter 2: Hadoop Security Design
- What is Kerberos?
- Key Kerberos terminologies
- How Kerberos works?
- Kerberos advantages
- The Hadoop default security model with Kerberos
- Hadoop Kerberos security implementation
- User-level access controls
- Service-level access controls
- User and service authentication
- Delegation Token
- Job Token
- Block Access Token
- Summary
- Chapter 3: Setting up a Secured Hadoop Cluster
- Prerequisites
- Setting up Kerberos
- Installing the Key Distribution Center
- Configuring the Key Distribution Center
- Establishing the KDC database
- Setting up the administrator principal for KDC
- Starting the Kerberos daemons
- Setting up the first Kerberos administrator
- Adding the user or service principals
- Configuring LDAP as the Kerberos database
- Supporting AES-256 encryption for a Kerberos ticket
- Configuring Hadoop with Kerberos authentication
- Setting up the Kerberos client on all the Hadoop nodes
- Setting up the Hadoop service principals
- Creating a keytab file for the Hadoop services
- Distributing the keytab file for all slaves
- Setting up the Hadoop configuration files
- HDFS-related configurations
- MRV1-related configurations
- MRV2-related configurations
- Setting up secured DataNode
- Setting up the TaskController class
- Configuring users for Hadoop
- Automation of secured Hadoop deployment
- Summary
- Chapter 4: Securing the Hadoop Ecosystem
- Configuring Kerberos for Hadoop ecosystem components
- Securing Hive.
- Securing Hive using Sentry
- Securing Oozie
- Securing Flume
- Securing Flume sources
- Securing Hadoop sink
- Securing a Flume channel
- Securing HBase
- Securing Sqoop
- Securing Pig
- Best practices for securing the Hadoop ecosystem components
- Summary
- Chapter 5: Integrating Hadoop with Enterprise Security Systems
- Integrating Enterprise Identity Management systems
- Configuring EIM integration with Hadoop
- Integrating Active Directory-based EIM with the Hadoop ecosystem
- Accessing a secured Hadoop cluster from an enterprise network
- HttpFS
- HUE
- Knox Gateway Server
- Summary
- Chapter 6: Securing Sensitive Data in Hadoop
- Securing sensitive data in Hadoop
- Approach for securing insights in Hadoop
- Securing data in motion
- Securing data at rest
- Implementing data encryption in Hadoop
- Summary
- Chapter 7: Security Event and Audit Logging in Hadoop
- Security Incident and Event Monitoring in a Hadoop Cluster
- The Security Incident and Event Monitoring (SIEM) system
- Setting up audit logging in a secured Hadoop cluster
- Configuring Hadoop audit logs
- Summary
- Appendix: Solutions Available for Securing Hadoop
- Hadoop distribution with enhanced security support
- Automation of secured Hadoop cluster deployment
- Cloudera Manager
- Zettaset
- Different Hadoop data encryption options
- Dataguise for Hadoop
- Gazzang zNcrypt
- eCryptfs for Hadoop
- Securing the Hadoop ecosystem with Project Rhino
- Mapping of the security technologies with the reference architecture
- Infrastructure security
- OS and filesystem security
- Application security
- Network perimeter security
- Data masking and encryption
- Authentication and authorization
- Audit logging, security policies, and procedures
- Security Incident and Event Monitoring
- Index.