Cloudera Security

This guide is intended for system administrators who want to secure a cluster using data encryption, user authentication, and authorization techniques. This topic also provides information about Hadoop security programs and shows you how to set up a gateway to restrict access.

Cloudera strives to consolidate security configurations across several projects. The process of securing an enterprise data hub comprises at least the following operations:
  • Perimeter Security and Authentication: Guarding access to the system, its data, and its various services.
  • Entitlement and Access: Defining and enforcing what users and applications can do with data.
  • Data Protection: Protecting data from unauthorized access either while at rest or in transit.