官术网_书友最值得收藏!

Chapter 1. Hadoop Security Overview

Like any development project, the ones in Hadoop start with proof of concept (POC). Especially because the technology is new and continuously evolving, the focus always begins with figuring out what it can offer and how to leverage it to solve different business problems, be it consumer analysis, breaking news processing, and so on. Being an open source framework, it has its own nuances and requires a learning curve. As these POCs mature and move to pilot and then to production phase, a new infrastructure has to be set up. Then questions arise around maintaining the newly setup infrastructure, including questions on data security and the overall ecosystem's security. Few of the questions that the infrastructure administrators and security paranoids would ask are:

How secure is a Hadoop ecosystem? How secure is the data residing in Hadoop? How would different teams including business analysts, data scientists, developers, and others in the enterprise access the Hadoop ecosystem in a secure manner? How to enforce existing Enterprise Security Models in this new infrastructure? Are there any best practices for securing such an infrastructure?

This chapter will begin the journey to answer these questions and provide an overview of the typical challenges faced in securing Hadoop-based Big Data ecosystem. We will look at the key security considerations and then present the security reference architecture that can be used for securing Hadoop.

The following topics will be covered in this chapter:

  • Why do we need to secure a Hadoop-based ecosystem?
  • The challenges in securing such an infrastructure
  • Important security considerations for a Hadoop ecosystem
  • The reference architecture for securing a Hadoop ecosystem
主站蜘蛛池模板: 连城县| 乌拉特前旗| 班戈县| 临澧县| 龙游县| 威海市| 墨竹工卡县| 彭水| 乌鲁木齐县| 湖北省| 全椒县| 白沙| 清镇市| 常宁市| 扬中市| 义乌市| 乌兰察布市| 岐山县| 曲周县| 丽水市| 巴马| 新兴县| 宝坻区| 浪卡子县| 五大连池市| 嘉黎县| 安庆市| 汤阴县| 永平县| 青河县| 安平县| 凉山| 武安市| 秦安县| 若尔盖县| 南汇区| 枣阳市| 黄浦区| 昔阳县| 廊坊市| 犍为县|