Chapter 6. Securing Sensitive Data in Hadoop
In Chapter 5, Integrating Hadoop with Enterprise Security Systems, we looked at integrating a secured Hadoop cluster with an Enterprise Identity Management system and enforce user authorization within Hadoop. User privileges are managed centrally and then synchronized with the secured Hadoop cluster. This enables enterprise users to access secured Hadoop services seamlessly. As an organization matures with their Big Data implementations, there is an increasing need to move sensitive information into the Hadoop ecosystem to generate valuable insights. Sensitive data in the cluster needs special protection and should be secured both at rest and in motion.
In this chapter, we look at how to secure sensitive data within a Hadoop ecosystem.
These are the topics we'll be covering in this chapter:
Securing sensitive data in Hadoop
Encrypting sensitive data in Hadoop
Implementing data encryption in Hadoop