Upgrade to Pro — share decks privately, control downloads, hide ads and more …

The future of Hadoop security and its evolution...

The future of Hadoop security and its evolution by Alejandro González at Big Data Spain 2017

This talk defines the state of the art for Hadoop security and describes the planned security features to be added. Hadoop initially was not designed with security in mind, multiple security features had being developed for some components without designing and integrated security architecture.

https://www.bigdataspain.org/2017/talk/the-future-of-hadoop-security-and-its-evolution

Big Data Spain 2017
16th - 17th November Kinépolis Madrid

Big Data Spain

November 24, 2017
Tweet

More Decks by Big Data Spain

Other Decks in Technology

Transcript

  1. Security breaches How much stolen records cost? Over of organizations

    report having been compromised by a successful cyber attack in the past 12
  2. What Hadoop users want to do? Protect Be in compliance

    Anonymize data Migrate to the cloud
  3. Authorization Auditing Encryption at REST Kerberos HW - AUTH Authentication

    methods What the community has done? In-transit Encryption HTTPS Sentry-AUTHZ Authentication Zookeeper Hue Hive Impala Solr HDFS KMS HDFS Flume Oozie HBase Impala Hue Sqoop Hive Impala HBase Accum Sentry HDFS KMS Hue HDFS Logs MapReduce YARN MapReduce YARN HDFS HBase Zookeeper Oozie SPENEGO LDAP SAML Zookeeper HBase Accumulo Hue HDFS UI None Security is very confusing!
  4. What does the community wants to do? Secure by default

    Regulatory compliance Vulnerability free software
  5. Security dimensions Perimeter Guarding access to the cluster itself Data

    Protecting data in the cluster from unauthorized visibility Access Defining what users and applications can do with data Visibility Reporting on where data came from and how it’s being used KERBEROS AD LDAP SAML PAM SSSD Ranger Sentry HDFS ACL HDFS Enc Key Management In transit Enc Atlas
  6. Scaling security administration Centralize identity management Common security across multiple

    clusters in the cloud CISO visibility Attribute based access control (ABAC) Single sign on Federating multiple directories Security policies associated with data in object stores Centralized security dashboards
  7. ABAC User Informational asset Environment Subject attributes Environmental attributes Resource

    and action attributes ABAC authorization engine Sentry RS Permit users to … when … if … or … unless ... Policy Permit Deny
  8. ABAC benefits Fewer security policies per object Central policies enforced

    while still delegating administration Better protection since more factors can be used Major canadian bank, Large global bank Large healthcare provider
  9. SSO customer benefits Improves security UX Increases productivity Strengthen security

    Reduces support costs Improves auditing In the long term engineering effort is reduced
  10. Cluster 1 Cluster 2 Cluster 3 Cluster 4 Sentry Sentry

    Sentry Sentry Sentry KMS KMS KMS KMS KMS HMS