Practical Hadoop security /
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
Apress,
[2014?]
|
Colección: | Expert's voice in security.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Machine generated contents note: ch. 1 Understanding Security Concepts
- Introducing Security Engineering
- Security Engineering Framework
- Psychological Aspects of Security Engineering
- Introduction to Security Protocols
- Securing a Program
- Non-Malicious Flaws
- Malicious Flaws
- Securing a Distributed System
- Authentication
- Authorization
- Encryption
- Summary
- ch. 2 Introducing Hadoop
- Hadoop Architecture
- HDFS
- Inherent Security Issues with HDFS Architecture
- Hadoop's Job Framework using MapReduce
- Inherent Security Issues with Hadoop's Job Framework
- Hadoop's Operational Security Woes
- Hadoop Stack
- Main Hadoop Components
- Summary
- ch. 3 Introducing Hadoop Security
- Starting with Hadoop Security
- Introducing Authentication and Authorization for HDFS
- Authorization
- Real-World Example for Designing Hadoop Authorization
- Fine-Grained Authorization for Hadoop
- Securely Administering HDFS
- Using Hadoop Logging for Security
- Monitoring for Security
- Tools of the Trade
- Encryption: Relevance and Implementation for Hadoop
- Encryption for Data in Transit
- Encryption for Data at Rest
- Summary
- ch. 4 Open Source Authentication in Hadoop
- Pieces of the Security Puzzle
- Establishing Secure Client Access
- Countering Spoofing with PuTTY's Host Keys
- Key-Based Authentication Using PuTTY
- Using Passphrases
- Building Secure User Authentication
- Kerberos Overview
- Installing and Configuring Kerberos
- Preparing for Kerberos Implementation
- Implementing Kerberos for Hadoop
- Securing Client-Server Communications
- Safe Inter-process Communication
- Encrypting HTTP Communication
- Securing Data Communication
- Summary
- ch. 5 Implementing Granular Authorization
- Designing User Authorization
- Call the Cops: A Real-World Security Example
- Determine Access Groups and their Access Levels
- Implement the Security Model
- Access Control Lists for HDFS
- Role-Based Authorization with Apache Sentry
- Hive Architecture and Authorization Issues
- Sentry Architecture
- Implementing Roles
- Summary
- ch. 6 Hadoop Logs: Relating and Interpretation
- Using Log4j API
- Loggers
- Appenders
- Layout
- Filters
- Reviewing Hadoop Audit Logs and Daemon Logs
- Audit Logs
- Hadoop Daemon Logs
- Correlating and Interpreting Log Files
- What to Correlate?
- How to Correlate Using Job Name?
- Important Considerations for Logging
- Time Synchronization
- Hadoop Analytics
- Splunk
- Summary
- ch. 7 Monitoring in Hadoop
- Overview of a Monitoring System
- Simple Monitoring System
- Monitoring System for Hadoop
- Hadoop Metrics
- jvm Context
- dfs Context
- rpc Context
- mapred Context
- Metrics and Security
- Metrics Filtering
- Capturing Metrics Output to File
- Security Monitoring with Ganglia and Nagios
- Ganglia
- Monitoring HBase Using Ganglia
- Nagios
- Nagios Integration with Ganglia
- Nagios Community
- Summary
- ch. 8 Encryption in Hadoop
- Introduction to Data Encryption
- Popular Encryption Algorithms
- Applications of Encryption
- Hadoop Encryption Options Overview
- Encryption Using Intel's Hadoop Distro
- Step-by-Step Implementation
- Special Classes Used by Intel Distro
- Using Amazon Web Services to Encrypt Your Data
- Deciding on a Model for Data Encryption and Storage
- Encrypting a Data File Using Selected Model
- Summary
- Appendix A: Pageant Use and Implementation
- Using Pageant
- Security Considerations
- Appendix B: PuTTY and SSH Implementation for Linux-Based Clients
- Using SSH for Remote Access
- Appendix C: Setting Up a KeyStore and TrustStore for HTTP Encryption
- Create HTTPS Certificates and KeyStore/TrustStore Files
- Adjust Permissions for KeyStore/TrustStore Files
- Appendix D: Hadoop Metrics and Their Relevance to Security.