In this chapter, we have covered the Hadoop security pillars, and it should now be very clear about the different aspects of security that have to be incorporated along with system security and Kerberos authentication. We studied the different advantages of Kerberos, along with how Kerberos authentication flows. This chapter also talked about user authorization, which includes two different tools, namely Ranger and Sentry. Lastly, we were also introduced to the list of JIRAs that have been solved or worked upon with the Hadoop 3.0 release.
In the next chapter, we will study network and data security, which includes aspects like Hadoop networks, perimeter security, data encryption, data masking, row, and column level security.