万本电子书0元读

万本电子书0元读

顶部广告

Securing Hadoop电子书

售       价:¥

5人正在读 | 0人评论 9.8

作       者:Sudheesh Narayanan

出  版  社:Packt Publishing

出版时间:2013-11-22

字       数:81.8万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It’s assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.
目录展开

Securing Hadoop

Table of Contents

Securing Hadoop

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

1. Hadoop Security Overview

Why do we need to secure Hadoop?

Challenges for securing the Hadoop ecosystem

Key security considerations

Reference architecture for Big Data security

Summary

2. Hadoop Security Design

What is Kerberos?

Key Kerberos terminologies

How Kerberos works?

Kerberos advantages

The Hadoop default security model without Kerberos

Hadoop Kerberos security implementation

User-level access controls

Service-level access controls

User and service authentication

Delegation Token

Job Token

Block Access Token

Summary

3. Setting Up a Secured Hadoop Cluster

Prerequisites

Setting up Kerberos

Installing the Key Distribution Center

Configuring the Key Distribution Center

Establishing the KDC database

Setting up the administrator principal for KDC

Starting the Kerberos daemons

Setting up the first Kerberos administrator

Adding the user or service principals

Configuring LDAP as the Kerberos database

Supporting AES-256 encryption for a Kerberos ticket

Configuring Hadoop with Kerberos authentication

Setting up the Kerberos client on all the Hadoop nodes

Setting up Hadoop service principals

Creating a keytab file for the Hadoop services

Distributing the keytab file for all the slaves

Setting up Hadoop configuration files

HDFS-related configurations

MRV1-related configurations

MRV2-related configurations

Setting up secured DataNode

Setting up the TaskController class

Configuring users for Hadoop

Automation of a secured Hadoop deployment

Summary

4. Securing the Hadoop Ecosystem

Configuring Kerberos for Hadoop ecosystem components

Securing Hive

Securing Hive using Sentry

Securing Oozie

Securing Flume

Securing Flume sources

Securing Hadoop sink

Securing a Flume channel

Securing HBase

Securing Sqoop

Securing Pig

Best practices for securing the Hadoop ecosystem components

Summary

5. Integrating Hadoop with Enterprise Security Systems

Integrating Enterprise Identity Management systems

Configuring EIM integration with Hadoop

Integrating Active-Directory-based EIM with the Hadoop ecosystem

Accessing a secured Hadoop cluster from an enterprise network

HttpFS

HUE

Knox Gateway Server

Summary

6. Securing Sensitive Data in Hadoop

Securing sensitive data in Hadoop

Approach for securing insights in Hadoop

Securing data in motion

Securing data at rest

Implementing data encryption in Hadoop

Summary

7. Security Event and Audit Logging in Hadoop

Security Incident and Event Monitoring in a Hadoop Cluster

The Security Incident and Event Monitoring (SIEM) system

Setting up audit logging in a secured Hadoop cluster

Configuring Hadoop audit logs

Summary

A. Solutions Available for Securing Hadoop

Hadoop distribution with enhanced security support

Automation of a secured Hadoop cluster deployment

Cloudera Manager

Zettaset

Different Hadoop data encryption options

Dataguise for Hadoop

Gazzang zNcrypt

eCryptfs for Hadoop

Securing the Hadoop ecosystem with Project Rhino

Mapping of security technologies with the reference architecture

Infrastructure security

OS and filesystem security

Application security

Network perimeter security

Data masking and encryption

Authentication and authorization

Audit logging, security policies, and procedures

Security Incident and Event Monitoring

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部