In this chapter, we introduced the Hive security areas of authentication, authorization, mask, and encryption. We covered authentications in the metastore server and hiveserver2. Then, we talked about default, storage-based, and SQL standard-based mode authorization. At the end of this chapter, we discussed various ways of applying data masks and security in Hive. After going through this chapter, you should be able to address security concerns with different authentication, authorization, and data-mask or security methods.
In the next chapter, we'll talk about using Hive with other tools in the big data ecosystem.