Books & Videos

Table of Contents

  1. Chapter 1 Introduction

    1. Security Overview

    2. Hadoop Security: A Brief History

    3. Hadoop Components and Ecosystem

    4. Summary

  2. Security Architecture

    1. Chapter 2 Securing Distributed Systems

      1. Threat Categories
      2. Threat and Risk Assessment
      3. Vulnerabilities
      4. Defense in Depth
      5. Summary
    2. Chapter 3 System Architecture

      1. Operating Environment
      2. Network Security
      3. Hadoop Roles and Separation Strategies
      4. Operating System Security
      5. Summary
    3. Chapter 4 Kerberos

      1. Why Kerberos?
      2. Kerberos Overview
      3. Kerberos Workflow: A Simple Example
      4. Kerberos Trusts
      5. MIT Kerberos
      6. Summary
  3. Authentication, Authorization, and Accounting

    1. Chapter 5 Identity and Authentication

      1. Identity
      2. Authentication
      3. Summary
    2. Chapter 6 Authorization

      1. HDFS Authorization
      2. Service-Level Authorization
      3. MapReduce and YARN Authorization
      4. ZooKeeper ACLs
      5. Oozie Authorization
      6. HBase and Accumulo Authorization
      7. Summary
    3. Chapter 7 Apache Sentry (Incubating)

      1. Sentry Concepts
      2. The Sentry Service
      3. Hive Authorization
      4. Impala Authorization
      5. Solr Authorization
      6. Sentry Privilege Models
      7. Sentry Policy Administration
      8. Summary
    4. Chapter 8 Accounting

      1. HDFS Audit Logs
      2. MapReduce Audit Logs
      3. YARN Audit Logs
      4. Hive Audit Logs
      5. Cloudera Impala Audit Logs
      6. HBase Audit Logs
      7. Accumulo Audit Logs
      8. Sentry Audit Logs
      9. Log Aggregation
      10. Summary
  4. Data Security

    1. Chapter 9 Data Protection

      1. Encryption Algorithms
      2. Encrypting Data at Rest
      3. Encrypting Data in Transit
      4. Data Destruction and Deletion
      5. Summary
    2. Chapter 10 Securing Data Ingest

      1. Integrity of Ingested Data
      2. Data Ingest Confidentiality
      3. Ingest Workflows
      4. Enterprise Architecture
      5. Summary
    3. Chapter 11 Data Extraction and Client Access Security

      1. Hadoop Command-Line Interface
      2. Securing Applications
      3. HBase
      4. Accumulo
      5. Oozie
      6. Sqoop
      7. SQL Access
      8. WebHDFS/HttpFS
      9. Summary
    4. Chapter 12 Cloudera Hue

      1. Hue HTTPS
      2. Hue Authentication
      3. Hue Authorization
      4. Hue SSL Client Configurations
      5. Summary
  5. Putting It All Together

    1. Chapter 13 Case Studies

      1. Case Study: Hadoop Data Warehouse
      2. Case Study: Interactive HBase Web Application