Technical requirements
In this chapter, we will dive deep into the different security aspects of EMR, including IAM access permissions, data encryption, and controlling network traffic to the EMR cluster. Before getting started, please make sure you have access to the following resources.
- An AWS account
- An IAM user who has permission to create and manage an EMR cluster with related resources, including Amazon EC2 instances, required IAM roles, and security groups
- IAM access privileges to create VPC endpoints as well as create and manage encryption keys using AWS KMS
- Access to EMR security documentation that is available through
Now, let's understand what it means when we talk about security in EMR and how the shared responsibility model works.