Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Computer science
- Data bases
- Securing Hadoop. Implement robust end-to-end security for your Hadoop ecosystem
E-book details
Log in, If you're interested in the contents of the item.
Securing Hadoop. Implement robust end-to-end security for your Hadoop ecosystem
Ebook
Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.
This book is a practitioner's guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.
This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.
This book is a practitioner's guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.
This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.
- Securing Hadoop
- Table of Contents
- Securing Hadoop
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Hadoop Security Overview
- Why do we need to secure Hadoop?
- Challenges for securing the Hadoop ecosystem
- Key security considerations
- Reference architecture for Big Data security
- Summary
- 2. Hadoop Security Design
- What is Kerberos?
- Key Kerberos terminologies
- How Kerberos works?
- Kerberos advantages
- The Hadoop default security model without Kerberos
- Hadoop Kerberos security implementation
- User-level access controls
- Service-level access controls
- User and service authentication
- Delegation Token
- Job Token
- Block Access Token
- Summary
- What is Kerberos?
- 3. Setting Up a Secured Hadoop Cluster
- Prerequisites
- Setting up Kerberos
- Installing the Key Distribution Center
- Configuring the Key Distribution Center
- Establishing the KDC database
- Setting up the administrator principal for KDC
- Starting the Kerberos daemons
- Setting up the first Kerberos administrator
- Adding the user or service principals
- Configuring LDAP as the Kerberos database
- Supporting AES-256 encryption for a Kerberos ticket
- Installing the Key Distribution Center
- Configuring Hadoop with Kerberos authentication
- Setting up the Kerberos client on all the Hadoop nodes
- Setting up Hadoop service principals
- Creating a keytab file for the Hadoop services
- Distributing the keytab file for all the slaves
- Setting up Hadoop configuration files
- HDFS-related configurations
- MRV1-related configurations
- MRV2-related configurations
- Setting up secured DataNode
- Setting up the TaskController class
- Configuring users for Hadoop
- Automation of a secured Hadoop deployment
- Summary
- 4. Securing the Hadoop Ecosystem
- Configuring Kerberos for Hadoop ecosystem components
- Securing Hive
- Securing Hive using Sentry
- Securing Oozie
- Securing Flume
- Securing Flume sources
- Securing Hadoop sink
- Securing a Flume channel
- Securing HBase
- Securing Sqoop
- Securing Pig
- Securing Hive
- Best practices for securing the Hadoop ecosystem components
- Summary
- Configuring Kerberos for Hadoop ecosystem components
- 5. Integrating Hadoop with Enterprise Security Systems
- Integrating Enterprise Identity Management systems
- Configuring EIM integration with Hadoop
- Integrating Active-Directory-based EIM with the Hadoop ecosystem
- Accessing a secured Hadoop cluster from an enterprise network
- HttpFS
- HUE
- Knox Gateway Server
- Summary
- Integrating Enterprise Identity Management systems
- 6. Securing Sensitive Data in Hadoop
- Securing sensitive data in Hadoop
- Approach for securing insights in Hadoop
- Securing data in motion
- Securing data at rest
- Implementing data encryption in Hadoop
- Approach for securing insights in Hadoop
- Summary
- Securing sensitive data in Hadoop
- 7. Security Event and Audit Logging in Hadoop
- Security Incident and Event Monitoring in a Hadoop Cluster
- The Security Incident and Event Monitoring (SIEM) system
- Setting up audit logging in a secured Hadoop cluster
- Configuring Hadoop audit logs
- Summary
- Security Incident and Event Monitoring in a Hadoop Cluster
- A. Solutions Available for Securing Hadoop
- Hadoop distribution with enhanced security support
- Automation of a secured Hadoop cluster deployment
- Cloudera Manager
- Zettaset
- Different Hadoop data encryption options
- Dataguise for Hadoop
- Gazzang zNcrypt
- eCryptfs for Hadoop
- Securing the Hadoop ecosystem with Project Rhino
- Mapping of security technologies with the reference architecture
- Infrastructure security
- OS and filesystem security
- Application security
- Network perimeter security
- Data masking and encryption
- Authentication and authorization
- Audit logging, security policies, and procedures
- Security Incident and Event Monitoring
- Index
- Title: Securing Hadoop. Implement robust end-to-end security for your Hadoop ecosystem
- Author: Sudheesh Narayan
- Original title: Securing Hadoop. Implement robust end-to-end security for your Hadoop ecosystem
- ISBN: 9781783285266, 9781783285266
- Date of issue: 2013-11-22
- Format: Ebook
- Item ID: e_3atq
- Publisher: Packt Publishing