In this section, we will shift our focus to AWS big data application security features. More specifically, we will discuss the features and options for securing EMR clusters and serverless applications.
Security overview for big data applications
Securing the EMR cluster
In this section, we provide a quick overview of EMR security, including encryption, authentication, and authorization.
Encryption
EMR supports end-to-end encryption for a variety of different frameworks. You can configure all this in a couple of clicks. You can do S3 server-side or client-side encryption...