SlideShare a Scribd company logo
1 of 2
Best Practices for Securing Hadoop
Historically,Apache Hadoophasprovidedlimitedsecuritycapabilities,andmostHadoop
implementationstodate have beendeployedwithlittle thoughtgiventosecurity.Toprotectsensitive
data beingstoredandanalyzedinHadoop,securityarchitectsshoulduse astructuredapproachto
securityasrecommendedinone of Gartner’srecentresearchreport.
Source: Gartner
Source: Gartner
Take a Life Cycle Approach to Securing Data in Hadoop
Data has a lifecyclewithin an organization.Itis typically created within enterprise systems,and duringits life
cycle,it may go into and out of Hadoop and other big data repositories,as well as into backup and archival
systems. Viewed in this way, the Hadoop protection strategy cannotbe limited to the protection of only the data
within Hadoop discussed thus far.
A best practiceis to take a data life-cycle-centric approach to the security within Hadoop that considers these
issues:
 How and when is data loaded into Hadoop? Which users,groups and systems have rights to do this? If the
data loads areprogrammatic,what controls (such as certificate-based authentication) protect
programmatic access? Whatsteps are taken to ensure the integrity and authenticity of the data being
loaded?
 If sensitivedata is loaded,has itbeen anonymized where necessary?
 Are end-user or automated extracts from Hadoop prevented? Or, if allowed,how is the extracted data
protected? At a minimum, these activities should belogged usingDAP solutions described in this
research.
 Is data backed up from Hadoop? Is so,are these backups encrypted? Who has access to the backups?
 Is data archived from Hadoop? If so, how are these archives protected?
Learn more about what’s new with Big Data and visitthe Bodhtree’s Resource Center for more info.

More Related Content

More from Bodhtree

Potential link between digital adoption and business growth
Potential link between digital adoption and business growthPotential link between digital adoption and business growth
Potential link between digital adoption and business growth
Bodhtree
 
Change is the only constant
Change is the only constantChange is the only constant
Change is the only constant
Bodhtree
 
Balance your Supply Chain with Big Data
Balance your Supply Chain with Big DataBalance your Supply Chain with Big Data
Balance your Supply Chain with Big Data
Bodhtree
 

More from Bodhtree (15)

Bodhtree salesforce.com consulting_partner
Bodhtree salesforce.com consulting_partnerBodhtree salesforce.com consulting_partner
Bodhtree salesforce.com consulting_partner
 
Potential link between digital adoption and business growth
Potential link between digital adoption and business growthPotential link between digital adoption and business growth
Potential link between digital adoption and business growth
 
Advanced analytics playing a vital role for health insurers
Advanced analytics playing a vital role for health insurersAdvanced analytics playing a vital role for health insurers
Advanced analytics playing a vital role for health insurers
 
Bodhtree workforce productivity_improvement_solution
Bodhtree workforce productivity_improvement_solutionBodhtree workforce productivity_improvement_solution
Bodhtree workforce productivity_improvement_solution
 
Bodhtree executive management_program_tracking_solution
Bodhtree executive management_program_tracking_solutionBodhtree executive management_program_tracking_solution
Bodhtree executive management_program_tracking_solution
 
Bodhtree key account_planning_solution
Bodhtree key account_planning_solutionBodhtree key account_planning_solution
Bodhtree key account_planning_solution
 
Bodhtree cloud geotagging_solution
Bodhtree cloud geotagging_solutionBodhtree cloud geotagging_solution
Bodhtree cloud geotagging_solution
 
Bodhtree healthcare payer solutions
Bodhtree healthcare payer solutionsBodhtree healthcare payer solutions
Bodhtree healthcare payer solutions
 
Tele health startup case study
Tele health startup case studyTele health startup case study
Tele health startup case study
 
How unused Big Data turns into Big Value
How unused Big Data turns into Big ValueHow unused Big Data turns into Big Value
How unused Big Data turns into Big Value
 
Change is the only constant
Change is the only constantChange is the only constant
Change is the only constant
 
Bodhtree Corporate Overview
Bodhtree Corporate OverviewBodhtree Corporate Overview
Bodhtree Corporate Overview
 
Balance your Supply Chain with Big Data
Balance your Supply Chain with Big DataBalance your Supply Chain with Big Data
Balance your Supply Chain with Big Data
 
Business Analytics from Bodhtree
Business Analytics from BodhtreeBusiness Analytics from Bodhtree
Business Analytics from Bodhtree
 
Bodhtree Corporate Deck
Bodhtree Corporate DeckBodhtree Corporate Deck
Bodhtree Corporate Deck
 

Recently uploaded

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Recently uploaded (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Generic or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisions
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 

Best practices for securing hadoop

  • 1. Best Practices for Securing Hadoop Historically,Apache Hadoophasprovidedlimitedsecuritycapabilities,andmostHadoop implementationstodate have beendeployedwithlittle thoughtgiventosecurity.Toprotectsensitive data beingstoredandanalyzedinHadoop,securityarchitectsshoulduse astructuredapproachto securityasrecommendedinone of Gartner’srecentresearchreport. Source: Gartner Source: Gartner
  • 2. Take a Life Cycle Approach to Securing Data in Hadoop Data has a lifecyclewithin an organization.Itis typically created within enterprise systems,and duringits life cycle,it may go into and out of Hadoop and other big data repositories,as well as into backup and archival systems. Viewed in this way, the Hadoop protection strategy cannotbe limited to the protection of only the data within Hadoop discussed thus far. A best practiceis to take a data life-cycle-centric approach to the security within Hadoop that considers these issues:  How and when is data loaded into Hadoop? Which users,groups and systems have rights to do this? If the data loads areprogrammatic,what controls (such as certificate-based authentication) protect programmatic access? Whatsteps are taken to ensure the integrity and authenticity of the data being loaded?  If sensitivedata is loaded,has itbeen anonymized where necessary?  Are end-user or automated extracts from Hadoop prevented? Or, if allowed,how is the extracted data protected? At a minimum, these activities should belogged usingDAP solutions described in this research.  Is data backed up from Hadoop? Is so,are these backups encrypted? Who has access to the backups?  Is data archived from Hadoop? If so, how are these archives protected? Learn more about what’s new with Big Data and visitthe Bodhtree’s Resource Center for more info.