Summary
In this chapter, we have reviewed the authentication and authorization principles used in Hadoop. We have discussed the HDFS permissions model, as well as MapReduce access control lists. The default Hadoop security policy is prone to various attacks. We have reviewed how to configure Kerberos support in Hadoop to comply with enterprise-level security requirements.
In the next chapter, we will focus on monitoring Hadoop cluster's health and performance.