This guide is intended for system administrators who want to secure a cluster using data encryption, user authentication, and authorization techniques. This topic also provides information about Hadoop security programs and shows you how to set up a gateway to restrict access.
- Perimeter Security and Authentication: Guarding access to the system, its data, and its various services.
- Entitlement and Access: Defining and enforcing what users and applications can do with data.
- Data Protection: Protecting data from unauthorized access either while at rest or in transit.