Securing Hadoop. (2013)
- Record Type:
- Book
- Title:
- Securing Hadoop. (2013)
- Main Title:
- Securing Hadoop.
- Other Names:
- Narayanan, Sudheesh
- Contents:
- Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Hadoop Security Overview; Why do we need to secure Hadoop?; Challenges for securing the Hadoop ecosystem; Key security considerations; Reference architecture for Big Data security; Summary; Chapter 2: Hadoop Security Design; What is Kerberos?; Key Kerberos terminologies; How Kerberos works?; Kerberos advantages; The Hadoop default security model with Kerberos; Hadoop Kerberos security implementation; User-level access controls; Service-level access controls. User and service authenticationDelegation Token; Job Token; Block Access Token; Summary; Chapter 3: Setting up a Secured Hadoop Cluster; Prerequisites; Setting up Kerberos; Installing the Key Distribution Center; Configuring the Key Distribution Center; Establishing the KDC database; Setting up the administrator principal for KDC; Starting the Kerberos daemons; Setting up the first Kerberos administrator; Adding the user or service principals; Configuring LDAP as the Kerberos database; Supporting AES-256 encryption for a Kerberos ticket; Configuring Hadoop with Kerberos authentication. Setting up the Kerberos client on all the Hadoop nodesSetting up the Hadoop service principals; Creating a keytab file for the Hadoop services; Distributing the keytab file for all slaves; Setting up the Hadoop configuration files; HDFS-related configurations; MRV1-related configurations; MRV2-related configurations;Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Hadoop Security Overview; Why do we need to secure Hadoop?; Challenges for securing the Hadoop ecosystem; Key security considerations; Reference architecture for Big Data security; Summary; Chapter 2: Hadoop Security Design; What is Kerberos?; Key Kerberos terminologies; How Kerberos works?; Kerberos advantages; The Hadoop default security model with Kerberos; Hadoop Kerberos security implementation; User-level access controls; Service-level access controls. User and service authenticationDelegation Token; Job Token; Block Access Token; Summary; Chapter 3: Setting up a Secured Hadoop Cluster; Prerequisites; Setting up Kerberos; Installing the Key Distribution Center; Configuring the Key Distribution Center; Establishing the KDC database; Setting up the administrator principal for KDC; Starting the Kerberos daemons; Setting up the first Kerberos administrator; Adding the user or service principals; Configuring LDAP as the Kerberos database; Supporting AES-256 encryption for a Kerberos ticket; Configuring Hadoop with Kerberos authentication. Setting up the Kerberos client on all the Hadoop nodesSetting up the Hadoop service principals; Creating a keytab file for the Hadoop services; Distributing the keytab file for all slaves; Setting up the Hadoop configuration files; HDFS-related configurations; MRV1-related configurations; MRV2-related configurations; Setting up secured DataNode; Setting up the TaskController class; Configuring users for Hadoop; Automation of secured Hadoop deployment; Summary; Chapter 4: Securing the Hadoop Ecosystem; Configuring Kerberos for Hadoop ecosystem components; Securing Hive. Securing Hive using SentrySecuring Oozie; Securing Flume; Securing Flume sources; Securing Hadoop sink; Securing a Flume channel; Securing HBase; Securing Sqoop; Securing Pig; Best practices for securing the Hadoop ecosystem components; Summary; Chapter 5: Integrating Hadoop with Enterprise Security Systems; Integrating Enterprise Identity Management systems; Configuring EIM integration with Hadoop; Integrating Active Directory-based EIM with the Hadoop ecosystem; Accessing a secured Hadoop cluster from an enterprise network; HttpFS; HUE; Knox Gateway Server; Summary. Chapter 6: Securing Sensitive Data in HadoopSecuring sensitive data in Hadoop; Approach for securing insights in Hadoop; Securing data in motion; Securing data at rest; Implementing data encryption in Hadoop; Summary; Chapter 7: Security Event and Audit Logging in Hadoop; Security Incident and Event Monitoring in a Hadoop Cluster; The Security Incident and Event Monitoring (SIEM) system; Setting up audit logging in a secured Hadoop cluster; Configuring Hadoop audit logs; Summary; Appendix: Solutions Available for Securing Hadoop; Hadoop distribution with enhanced security support. … (more)
- Publisher Details:
- Place of publication not identified : Packt Publishing
- Publication Date:
- 2013
- Extent:
- 1 online resource
- Subjects:
- 004.36
COMPUTERS -- Enterprise Applications -- Business Intelligence Tools
Electronic data processing -- Distributed processing
File organization
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
COMPUTERS -- Databases -- General
Electronic books - Languages:
- English
- ISBNs:
- 1306155517
9781306155519
9781783285266
1783285265
9781783285259
1783285257 - Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.87462
- Ingest File:
- 01_006.xml