Hadoop Security: Protecting Your Big Data Platform


Posted on by Ben Rothke

As the recent RSA Conference, there were scores of vendors offering various endpoint solutions to protect laptops, desktop and mobile devices. These software solutions are clearly needed given the value of the data on these devices.

Hadoop

When it comes to Hadoop, firms are storing massive amounts of data (massive as in petabytes and more); often without the same level of security they have on a laptop.

In Hadoop Security: Protecting Your Big Data Platform, (O'Reilly Media ISBN: 978-1-4919-0098-7), authors Ben Spivey and Joey Echeverria have written an invaluable reference for anyone looking to ensure their Hadoop data sets are appropriated secured. This is the type of book that you want your Hadoop administrators to have close by.

Hadoop is one part of an open-source software framework for big data. The authors correctly note that one of the hardest jobs a Hadoop security administrator has is to keep track of how the many components handle security, access control and other authentication functions.

With that, the book does a great job in providing the reader with a thorough overview of the various aspects of the Hadoop security framework. The authors detail how to correctly configure the security features for each of the components. The authors also provide actual code segments for each of the areas.

Anyone using Hadoop should certainly make sure their staff knows about the security controls required to keep their data sets safe. For that, make sure they read Hadoop Security: Protecting Your Big Data Platform.


Contributors
Ben Rothke

Senior Information Security Manager, Tapad

big data analytics

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs