Securing Hadoop

Implement robust end-to-end security for your Hadoop ecosystem

Securing Hadoop

Sudheesh Narayanan

Implement robust end-to-end security for your Hadoop ecosystem
Mapt Subscription
FREE
$29.99/m after trial
eBook
$12.60
RRP $17.99
Save 29%
Print + eBook
$29.99
RRP $29.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$12.60
$29.99
$29.99p/m after trial
RRP $17.99
RRP $29.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781783285259
Paperback116 pages

Book Description

Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.

This book is a practitioner’s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.

This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.

Table of Contents

Chapter 1: Hadoop Security Overview
Why do we need to secure Hadoop?
Challenges for securing the Hadoop ecosystem
Key security considerations
Summary
Chapter 2: Hadoop Security Design
What is Kerberos?
The Hadoop default security model without Kerberos
Hadoop Kerberos security implementation
Summary
Chapter 3: Setting Up a Secured Hadoop Cluster
Prerequisites
Setting up Kerberos
Configuring Hadoop with Kerberos authentication
Configuring users for Hadoop
Automation of a secured Hadoop deployment
Summary
Chapter 4: Securing the Hadoop Ecosystem
Configuring Kerberos for Hadoop ecosystem components
Best practices for securing the Hadoop ecosystem components
Summary
Chapter 5: Integrating Hadoop with Enterprise Security Systems
Integrating Enterprise Identity Management systems
Accessing a secured Hadoop cluster from an enterprise network
Summary
Chapter 6: Securing Sensitive Data in Hadoop
Securing sensitive data in Hadoop
Summary
Chapter 7: Security Event and Audit Logging in Hadoop
Security Incident and Event Monitoring in a Hadoop Cluster
Setting up audit logging in a secured Hadoop cluster
Summary

What You Will Learn

  • Understand the challenges of securing Hadoop and Big Data and master the reference architecture for Big Data security
  • Demystify Kerberos and the Hadoop security model
  • Learn the steps to secure a Hadoop platform with Kerberos
  • Integrate Enterprise Security Systems with Hadoop security and build an integrated security model
  • Get detailed insights into securing sensitive data in a Hadoop Big Data platform
  • Implement audit logging and a security event monitoring system for your Big Data platform
  • Discover the various industry tools and vendors that can be used to build a secured Hadoop platform
  • Recognize how the various Hadoop components interact with each other and what protocols and security they implement
  • Design a secure Hadoop infrastructure and implement the various security controls within the enterprise

Authors

Table of Contents

Chapter 1: Hadoop Security Overview
Why do we need to secure Hadoop?
Challenges for securing the Hadoop ecosystem
Key security considerations
Summary
Chapter 2: Hadoop Security Design
What is Kerberos?
The Hadoop default security model without Kerberos
Hadoop Kerberos security implementation
Summary
Chapter 3: Setting Up a Secured Hadoop Cluster
Prerequisites
Setting up Kerberos
Configuring Hadoop with Kerberos authentication
Configuring users for Hadoop
Automation of a secured Hadoop deployment
Summary
Chapter 4: Securing the Hadoop Ecosystem
Configuring Kerberos for Hadoop ecosystem components
Best practices for securing the Hadoop ecosystem components
Summary
Chapter 5: Integrating Hadoop with Enterprise Security Systems
Integrating Enterprise Identity Management systems
Accessing a secured Hadoop cluster from an enterprise network
Summary
Chapter 6: Securing Sensitive Data in Hadoop
Securing sensitive data in Hadoop
Summary
Chapter 7: Security Event and Audit Logging in Hadoop
Security Incident and Event Monitoring in a Hadoop Cluster
Setting up audit logging in a secured Hadoop cluster
Summary

Book Details

ISBN 139781783285259
Paperback116 pages
Read More

Read More Reviews

Recommended for You

Hadoop Beginner's Guide Book Cover
Hadoop Beginner's Guide
$ 29.99
$ 21.00
Hadoop MapReduce Cookbook Book Cover
Hadoop MapReduce Cookbook
$ 29.99
$ 21.00
Scaling Big Data with Hadoop and Solr Book Cover
Scaling Big Data with Hadoop and Solr
$ 26.99
$ 18.90
Hadoop Real-World Solutions Cookbook Book Cover
Hadoop Real-World Solutions Cookbook
$ 29.99
$ 21.00
Hadoop Operations and Cluster Management Cookbook Book Cover
Hadoop Operations and Cluster Management Cookbook
$ 29.99
$ 21.00
Storm Real-time Processing Cookbook Book Cover
Storm Real-time Processing Cookbook
$ 29.99
$ 21.00