Before designing security for your Hadoop cluster, you should be very clear about the different aspects of security that have to be incorporated. This section talks about the different pillars of security that are required to make your Hadoop cluster secure and threat-proof. We will discuss each of those pillars in brief in this section. Later, they will be elaborately discussed in different sections of this chapter.
The following diagram gives you a glimpse of the Hadoop security pillars:
Before discussing the rings in the preceding diagram, we should understand one important aspect of securing the Hadoop cluster, and that is Security Administration. As a Hadoop security administrator, you have to perform the following activities at a high level:
- Get or develop a means of centralized Hadoop security enablement in terms of automated scripts...