Securing Hadoop


Securing Hadoop
eBook: $17.99
Formats: PDF, PacktLib, ePub and Mobi formats
$15.29
save 15%!
Print + free eBook + free PacktLib access to the book: $47.98    Print cover: $29.99
$29.99
save 37%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Overview
Table of Contents
Author
Support
Sample Chapters
  • Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
  • Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
  • Administer the auditing and security event monitoring system

Book Details

Language : English
Paperback : 116 pages [ 235mm x 191mm ]
Release Date : November 2013
ISBN : 1783285257
ISBN 13 : 9781783285259
Author(s) : Sudheesh Narayanan
Topics and Technologies : All Books, Big Data and Business Intelligence, Open Source

Table of Contents

Preface
Chapter 1: Hadoop Security Overview
Chapter 2: Hadoop Security Design
Chapter 3: Setting Up a Secured Hadoop Cluster
Chapter 4: Securing the Hadoop Ecosystem
Chapter 5: Integrating Hadoop with Enterprise Security Systems
Chapter 6: Securing Sensitive Data in Hadoop
Chapter 7: Security Event and Audit Logging in Hadoop
Appendix: Solutions Available for Securing Hadoop
Index
  • Chapter 1: Hadoop Security Overview
    • Why do we need to secure Hadoop?
    • Challenges for securing the Hadoop ecosystem
    • Key security considerations
      • Reference architecture for Big Data security
    • Summary
    • Chapter 2: Hadoop Security Design
      • What is Kerberos?
        • Key Kerberos terminologies
        • How Kerberos works?
        • Kerberos advantages
      • The Hadoop default security model without Kerberos
      • Hadoop Kerberos security implementation
        • User-level access controls
        • Service-level access controls
        • User and service authentication
        • Delegation Token
        • Job Token
        • Block Access Token
      • Summary
      • Chapter 3: Setting Up a Secured Hadoop Cluster
        • Prerequisites
        • Setting up Kerberos
          • Installing the Key Distribution Center
            • Configuring the Key Distribution Center
            • Establishing the KDC database
            • Setting up the administrator principal for KDC
            • Starting the Kerberos daemons
            • Setting up the first Kerberos administrator
            • Adding the user or service principals
            • Configuring LDAP as the Kerberos database
            • Supporting AES-256 encryption for a Kerberos ticket
        • Configuring Hadoop with Kerberos authentication
          • Setting up the Kerberos client on all the Hadoop nodes
          • Setting up the Hadoop service principals
            • Creating a keytab file for Hadoop services
            • Distributing the keytab file for all the slaves
            • Setting up Hadoop configuration files
            • HDFS-related configurations
            • MRV1-related configurations
            • MRV2-related configurations
            • Setting up secured DataNode
            • Setting up the TaskController class
        • Configuring users for Hadoop
        • Automation of a secured Hadoop deployment
        • Summary
        • Chapter 4: Securing the Hadoop Ecosystem
          • Configuring Kerberos for Hadoop ecosystem components
            • Securing Hive
              • Securing Hive using Sentry
            • Securing Oozie
            • Securing Flume
              • Securing Flume sources
              • Securing Hadoop sink
              • Securing a Flume channel
            • Securing HBase
            • Securing Sqoop
            • Securing Pig
          • Best practices for securing the Hadoop ecosystem components
          • Summary
          • Chapter 5: Integrating Hadoop with Enterprise Security Systems
            • Integrating Enterprise Identity Management systems
              • Configuring EIM integration with Hadoop
              • Integrating Active-Directory-based EIM with the Hadoop ecosystem
            • Accessing a secured Hadoop cluster from an enterprise network
              • HttpFS
              • HUE
              • Knox Gateway Server
            • Summary
                • Appendix: Solutions Available for Securing Hadoop
                  • Hadoop distribution with enhanced security support
                  • Automation of a secured Hadoop cluster deployment
                    • Cloudera Manager
                    • Zettaset
                  • Different Hadoop data encryption options
                    • Dataguise for Hadoop
                    • Gazzang zNcrypt
                    • eCryptfs for Hadoop
                  • Securing the Hadoop ecosystem with Project Rhino
                  • Mapping of security technologies with the reference architecture
                    • Infrastructure security
                    • OS and filesystem security
                    • Application security
                    • Network perimeter security
                    • Data masking and encryption
                    • Authentication and authorization
                    • Audit logging, security policies, and procedures
                    • Security Incident and Event Monitoring

                  Sudheesh Narayanan

                  Sudheesh Narayanan is a Technology Strategist and Big Data Practitioner with expertise in technology consulting and implementing Big Data solutions. With over 15 years of IT experience in Information Management, Business Intelligence, Big Data & Analytics, and Cloud & J2EE application development, he provided his expertise in architecting, designing, and developing Big Data products, Cloud management platforms, and highly scalable platform services. His expertise in Big Data includes Hadoop and its ecosystem components, NoSQL databases (MongoDB, Cassandra, and HBase), Text Analytics (GATE and OpenNLP), Machine Learning (Mahout, Weka, and R), and Complex Event Processing. Sudheesh is currently working with Genpact as the Assistant Vice President and Chief Architect – Big Data, with focus on driving innovation and building Intellectual Property assets, frameworks, and solutions. Prior to Genpact, he was the co-inventor and Chief Architect of the Infosys BigDataEdge product.
                  Sorry, we don't have any reviews for this title yet.

                  Submit Errata

                  Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.

                  Sample chapters

                  You can view our sample chapters and prefaces of this title on PacktLib or download sample chapters in PDF format.

                  Frequently bought together

                  Securing Hadoop +    Mastering Object-oriented Python =
                  50% Off
                  the second eBook
                  Price for both: ₨495.00

                  Buy both these recommended eBooks together and get 50% off the cheapest eBook.

                  What you will learn from this book

                  • Understand the challenges of securing Hadoop and Big Data and master the reference architecture for Big Data security
                  • Demystify Kerberos and the Hadoop security model
                  • Learn the steps to secure a Hadoop platform with Kerberos
                  • Integrate Enterprise Security Systems with Hadoop security and build an integrated security model
                  • Get detailed insights into securing sensitive data in a Hadoop Big Data platform
                  • Implement audit logging and a security event monitoring system for your Big Data platform
                  • Discover the various industry tools and vendors that can be used to build a secured Hadoop platform
                  • Recognize how the various Hadoop components interact with each other and what protocols and security they implement
                  • Design a secure Hadoop infrastructure and implement the various security controls within the enterprise

                  In Detail

                  Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.

                  This book is a practitioner’s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.

                  This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.

                  Approach

                  This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.

                  Who this book is for

                  This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It’s assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

                  Code Download and Errata
                  Packt Anytime, Anywhere
                  Register Books
                  Print Upgrades
                  eBook Downloads
                  Video Support
                  Contact Us
                  Awards Voting Nominations Previous Winners
                  Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
                  Resources
                  Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software