SlideShare a Scribd company logo
1 of 39
Apache Hadoop Security
Today and Tomorrow
Philly Hadoop Meetup
Shravan (Sean) Pabba | Senior Systems Engineer | @skpabba
2© Cloudera, Inc. All rights reserved.
Agenda
• Hadoop Evolution
• Why is Hadoop Security Different?
• Enterprise Security
• Perimeter
• Access
• Visibility
• Data
• What’s Next?
• Demo
3© Cloudera, Inc. All rights reserved.
Have you done?
•Hadoop?
•Cloudera/Hortonworks/MapR/Others?
•Security?
•Kerberos/AD/Encryption?
4© Cloudera, Inc. All rights reserved.
Evolution of the Hadoop Platform
2005-07 2008 2009 2010 2011 2012 2013-2015
Core Hadoop
(HDFS, MapReduce)
HBase
ZooKeeper
Core Hadoop
Hive
Mahout
HBase
ZooKeeper
Core Hadoop
Sqoop
Whirr
Avro
Hive
Mahout
HBase
ZooKeeper
Core Hadoop
Flume
Bigtop
Oozie
MRUnit
HCatalog
Hue
Sqoop
Whirr
Avro
Hive
Mahout
HBase
ZooKeeper
YARN
Core Hadoop
Spark
Tez
Impala
Kafka
Flume
Bigtop
Oozie
MRUnit
HCatalog
Hue
Sqoop
Whirr
Avro
Hive
Mahout
HBase
ZooKeeper
YARN
Core Hadoop
Parquet
Sentry
Spark
Tez
Impala
Kafka
Flume
Bigtop
Oozie
MRUnit
HCatalog
Hue
Sqoop
Whirr
Avro
Hive
Mahout
HBase
ZooKeeper
YARN
Core Hadoop
The stack is continually evolving and growing!
5© Cloudera, Inc. All rights reserved.
Multiple Workloads
Batch, Interactive,
and Real-Time.
Leading performance and
usability in one platform.
• End-to-end analytic workflows
• Access more data
• Work with data in new ways
• Enable new users
Security and Administration
Process
Ingest
Sqoop, Flume
Transform
MapReduce,
Hive, Pig, Spark
Discover
Analytic Database
Impala
Search
Solr
Model
Machine Learning
SAS, R, Spark,
Mahout
Serve
NoSQL Database
HBase
Streaming
Spark Streaming
Scale-Out Storage HDFS, HBase
YARN, Cloudera Manager,
Cloudera Navigator
Multiple big data opportunities in one optimized, high-performance, multi-tenant platform.
6© Cloudera, Inc. All rights reserved.
Why is Hadoop Security Different?
Benefits of EDH Security Side Effect
A single platform for all the data
Combining data and audiences that used to be
securely silo’d
A rich, flexible ecosystem of tools &
utilities
Security method proliferation can increase costs/
introduce coverage gaps
Ingest data of any type Sensitive fields added without review
Active Archive provides lower cost
storage than legacy systems
Lose the built-in compliance controls that legacy
systems provided
7© Cloudera, Inc. All rights reserved.
Business Users
• Run high value
workloads in cluster
• Quickly adopt new
innovations
Information Security
• Follow established
policies and
procedures
• Maintain
compliance
IT/Operations
• Integrate with existing
IT investments
• Minimize end-user
support
• Automate
configuration
Multiple Security Stakeholders - Competing Goals?
8© Cloudera, Inc. All rights reserved.
A Brief History of Hadoop Security
Originally developed
without security in mind
Yahoo! focused on
adding authentication
Project Rhino works to
enhance Hadoop Security
2005 2009 2013
• No authentication of users or
services
• Anyone could submit arbitrary
code to be executed
• Any user could impersonate
other users
• Security model was complex
• Security configurations were
complex and error-prone
• No data-at-rest encryption
• Limited authorization
capabilities
Project aims to add:
• Data Protection
• Authorization
Simplified Authentication
9© Cloudera, Inc. All rights reserved.
What is Enterprise Security?
Four Functional Areas
Hadoop Cluster
Users
Applications Operators
Perimeter
Data
Access
Visibility
10© Cloudera, Inc. All rights reserved.
Enterprise Security
Authentication, Authorization, Audit, and Compliance
Perimeter
Guarding access to the
cluster itself
InfoSec Concept:
Authentication
Access
Defining what users and
applications can do
with data
InfoSec Concept:
Authorization
Kerberos, LDAP/AD, Cloudera
Manager
HDFS ACLs, Apache Sentry,
HBase ABAC
Visibility
Reporting on where
data came from and
how it’s being used
InfoSec Concept:
Audit
Cloudera Navigator
Data
Protecting data in the
cluster from
unauthorized visibility
InfoSec Concept:
Compliance
HDFS Encryption, Navigator
Encrypt & Key Trustee
11© Cloudera, Inc. All rights reserved.
• Contributed by Intel in 2013
• Blueprint for enterprise-grade
security
Cloudera and Intel Project Rhino
Rhino Goal: Unified Authorization
Engineers at Intel and Cloudera
(together with Oracle and IBM)
are jointly contributing to
Apache Sentry
Rhino Goal: Encryption and Key
Management Framework
Cloudera and Intel engineers are now
contributing HDFS encryption
capabilities that can plug into enterprise
key managers
12© Cloudera, Inc. All rights reserved.
Perimeter Security Requirements
Preserve user choice of the right
Hadoop service (e.g. Impala,
Spark)
Conform to centrally managed
authentication policies
Implement with existing standard
systems: Active Directory and
Kerberos
Perimeter
Guarding access to the
cluster itself
InfoSec Concept:
Authentication
Kerberos, LDAP/AD, Cloudera
Manager
13© Cloudera, Inc. All rights reserved.
Perimeter: Authentication in Hadoop
Kerberos
• Provably strong authentication between all Hadoop services and
(optionally) to end-points
• Cloudera Manager hides complexity
LDAP/AD
• Username / password
• Option for Hue, Hive Metastore, Impala connectors, Cloudera
Manager admin logins
SAML
• For Single Sign-On (SSO) for listed options
• Kerberos clients no longer required on most user end-points
14© Cloudera, Inc. All rights reserved.
Authentication Options and Coverage
HDFS
HBase & Search
Impala & Hive
Server 2
MapReduce &
YARN
… Other Services
Commercial BI
Gateways
Client
Client
Client
Client
… Applications
(Pig, Hue, etc.)
“End-to-End” Kerberos
“Core” Kerberos “Edge” AD/LDAP/SAML
15© Cloudera, Inc. All rights reserved.
Example
KDC
NFS Server
ID: jdoe@FOO.BAR.ORG TGT & Client Session KeyTGT & Authenticator Service Ticket & Service Session Key
Service Ticket & Authenticator Timestamp
16© Cloudera, Inc. All rights reserved.
Kerberizing Hadoop Cluster
• Need a MIT KDC or Active Directory.
• Appropriate realm definitions in place.
• Each Hadoop service needs a principal for each host it runs on.
• Cloudera Manager makes it easy to enable Kerberos.
• Recent Cloudera blog post has detailed instructions,
http://blog.cloudera.com/blog/2015/03/how-to-quickly-configure-kerberos-for-
your-apache-hadoop-cluster/
17© Cloudera, Inc. All rights reserved.
• Manages Users, Groups, and Services
• Provides username / password authentication
• Group membership determines Service access
Active Directory
• Trusted and standard third-party
• Authenticated users receive “Tickets”
• “Tickets” gain access to Services
Kerberos
Active Directory and Kerberos
User authenticates
to AD
Authenticated user
gets Kerberos Ticket
Ticket grants access
to Services e.g.
Impala
User [ssmith]
Password[***** ]
18© Cloudera, Inc. All rights reserved.
Automated Authentication with Cloudera Manager
Direct to AD Kerberos
Integration
Kerberos
Configuration Wizard
Added Tuning and
Monitoring
• Users authenticate directly against AD
• Hadoop Services defined directly in AD Kerberos
• User access to Hadoop services controlled via AD
Groups
• Automates Kerberos configuration for existing Hadoop
clusters simplifying a tedious and error prone process
• Tune interrelated configuration for dual KDC’s
• Service monitoring through CM when Kerberos
enabled
19© Cloudera, Inc. All rights reserved.
Access Security Requirements
Provide users access to data
needed to do their job
Centrally manage access policies
Leverage a role-based access
control model built on AD
Access
Defining what users and
applications can do
with data
InfoSec Concept:
Authorization
HDFS ACL, Apache Sentry,
HBase ABAC
20© Cloudera, Inc. All rights reserved.
Manage data access by role, instead of by individual user
• Fraud Analyst Role has read access on ALL transaction data
• Branch Teller Role has read / write access on very limited set of data
• Relationships between users and roles are established via groups
An RBAC policy is then uniformly enforced for all Hadoop services
• Provides unified authorization controls
• As opposed to tools for managing numerous, service specific policies
RBAC and Centralized Authorization
21© Cloudera, Inc. All rights reserved.
Sentry provides unified authorization via fine-grained RBAC for Impala, Hive,
Search, MapReduce, Pig, HDFS…
Unified Authorization with Apache Sentry
Sentry Perm.
Read Access
to ALL
Transaction
Data
Sentry Role
Fraud Analyst
Role
Group
Fraud
Analysts
Sam Smith
22© Cloudera, Inc. All rights reserved.
• Sentry can be configured to use AD to determine a user’s group assignments
• Group assignment changes in AD are automatically picked up, resulting in
updated Sentry role assignments
Sentry and Active Directory Groups
Sentry Perm.
Read Access
to ALL
Transaction
Data
Sentry Role
Fraud Analyst
Role
AD Group
Fraud
Analysts
Sam Smith
23© Cloudera, Inc. All rights reserved.
Sentry enforces each rule across Hadoop components
Hive
Server 2
Enforcement
code
Impala
MapRed
uce, Pig,
HDFS*
Apps:
Datameer,
Platfora,
etc*
Permissions
rules
Common enforcement
code for consistency.
Rule 1: Allow fraud analysts read access
to the transaction table
Permissions specified by
administrators
(top-level and delegated)
Enforcement
code
Enforcement
code
Enforcement
code
Search
Enforcement
code
24© Cloudera, Inc. All rights reserved.
Visual Policy Management
25© Cloudera, Inc. All rights reserved.
Visibility Security Requirements
Understand where report data
came from and discover more
data like it
Comply with policies for audit,
data classification, and lineage
Centralize the audit repository;
perform discovery; automate
lineage
Visibility
Reporting on where
data came from and
how it’s being used
InfoSec Concept:
Audit
Cloudera Navigator
26© Cloudera, Inc. All rights reserved.
Auditing and Access Management
• Full audit and access history for HDFS,
Impala, HIVE, HBase and Sentry
• Review and verify HDFS permissions
Metadata & Discovery
• Easily discover, classify, and locate data to
support governance and compliance
Lineage & Provenance
• Automatic collection and easy visualization
of upstream and downstream data lineage
Lifecycle Management
• Policy-based data management
Visibility through Cloudera Navigator
Data Management for an EDH
HDFS HBASE HIVE
CLOUDERA NAVIGATOR
CDH
Audit & Access
Management
Classification &
Discovery Lineage
Lifecycle
Management
Enterprise Metadata Repository
 Business metadata
 System metadata
27© Cloudera, Inc. All rights reserved.
28© Cloudera, Inc. All rights reserved.
Data Security Requirements
Perform analytics on regulated
data
Encrypt data at rest and in
motion, conform to key
management policies, protect
from root
Integrate with existing HSM as
part of key management
infrastructure
Data
Protecting data in the
cluster from
unauthorized visibility
InfoSec Concept:
Compliance
HDFS Encryption, Navigator
Encrypt & Key Trustee
29© Cloudera, Inc. All rights reserved.
Data: Protection in Hadoop
Data in Motion Data at Rest
“Network Encryption”
• SSL/TLS/HTTPS – web user interfaces,
JDBC
• SASL – most other paths (i.e. network
RPC)
• Centrally enabled and configured in
Cloudera Manager
“Data Encryption”
• HDFS Encryption
• Cloudera Navigator
• OS-level file system encryption
• Certified partner solutions
• Field-level encryption
• Data masking or tokenization
30© Cloudera, Inc. All rights reserved.
Encryption of Data in Motion using SSL/TLS, HTTPS and SASL
• HDFS – SASL (RPC), SASL (Data Transfer Protocol)
• YARN – SASL (RPC)
• MR – SASL (RPC), HTTPS (shuffle)
• Flume – SSL (Avro RPC)
• HS2 – SASL (Thrift), SASL (JDBC), SSL (JDBC, ODBC)
• Impala - SSL
• Search – SSL
• Hue – HTTPS
Encrypting Data In Motion
31© Cloudera, Inc. All rights reserved.
• ZK – SASL (RPC)
• Sentry – SASL (RPC)
• Oozie – HTTPS
• Spark – SSL for Akka and HTTP (for broadcast and file server) protocols. No SSL
support for WebUI and block transfer service.
• Kafka – None
Encrypting Data In Motion
32© Cloudera, Inc. All rights reserved.
• Available in CDH 5.3/Hadoop 2.6 (HDFS-
6134)
• Supports specification of HDFS directories
as “Encryption Zones”
• All subsequent directory contents
encrypted
• Multi-tenant encryption with tenant
specific keys
• Compliments Navigator encrypt for meta-
data encryption
• Key management via Navigator key trustee
HDFS Encryption
33© Cloudera, Inc. All rights reserved.
• Encryption for HDFS, HBase
• No encryption for metadata, log files,
ingest paths
• No key management
• Complicated, manual command line
configuration
• Incomplete audit trail
Open Source HDFS Encryption
Manager Navigator
Impala Hive
HDFS HBase
Sentry
Log Files
Ingest Paths
Metadata Store
Encrypted Data
Encryption Key
Legend
34© Cloudera, Inc. All rights reserved.
Cloudera’s Solution:
• ALL data encrypted: HDFS, HBase,
metadata, log files, ingest paths
• Enterprise Key Management via Navigator
Key Trustee
• Configuration support via Cloudera
Manager
• Audit integration to Cloudera Navigator
• Optional root-of-trust integration with
HSMs
Compliance-Ready Encryption & Key Management
Manager Navigator
Impala Hive
HDFS HBase
Sentry
Navigator Key Trustee
Log Files
Metadata Store
Encrypted Data
Encryption Key
Legend
Ingest Paths
35© Cloudera, Inc. All rights reserved.
Transparent layer between
application and file system
• Compliance-Ready
• Massively Scalable
• High Performance: Optimized for
Intel
• Separation of Duties
• Key Management with Navigator Key
Trustee
Navigator Encrypt
36© Cloudera, Inc. All rights reserved.
“Virtual safe-deposit box” for managing encryption keys or other
Hadoop security artifact
Navigator Key Trustee
• Separates Keys from Encrypted Data
• Centralized Management with Audit
Controls
• Integration with HSMs from Thales,
RSA, and SafeNet
• Roadmap: Management of SSL
certificates, SSH keys, tokens,
passwords, Kerberos Keytab Files, and
more
37© Cloudera, Inc. All rights reserved.
What’s Next?
• Log Redaction – Was delivered as part of CDH 5.4
• Highly Available Authorization
• Unified Credential Management
• Simplified Wire Encryption
• Attribute-Based Access Controls & “Follow the Data” Security
• Single fine-grained permissions rule (such as row and column level) to be
enforced across all access paths, including MR and Spark, in addition to Hive and
Impala.
• Continued Cloudera & Intel Efforts
38© Cloudera, Inc. All rights reserved.
Demo Time
Thank You
@skpabba

More Related Content

What's hot

Apache Sentry for Hadoop security
Apache Sentry for Hadoop securityApache Sentry for Hadoop security
Apache Sentry for Hadoop securitybigdatagurus_meetup
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014Cloudera, Inc.
 
Hadoop Security Architecture
Hadoop Security ArchitectureHadoop Security Architecture
Hadoop Security ArchitectureOwen O'Malley
 
Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010
Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010
Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010Cloudera, Inc.
 
Deploying Enterprise-grade Security for Hadoop
Deploying Enterprise-grade Security for HadoopDeploying Enterprise-grade Security for Hadoop
Deploying Enterprise-grade Security for HadoopCloudera, Inc.
 
Hadoop & Security - Past, Present, Future
Hadoop & Security - Past, Present, FutureHadoop & Security - Past, Present, Future
Hadoop & Security - Past, Present, FutureUwe Printz
 
Hadoop Operations: How to Secure and Control Cluster Access
Hadoop Operations: How to Secure and Control Cluster AccessHadoop Operations: How to Secure and Control Cluster Access
Hadoop Operations: How to Secure and Control Cluster AccessCloudera, Inc.
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big DataRommel Garcia
 
Improvements in Hadoop Security
Improvements in Hadoop SecurityImprovements in Hadoop Security
Improvements in Hadoop SecurityDataWorks Summit
 
2014 sept 4_hadoop_security
2014 sept 4_hadoop_security2014 sept 4_hadoop_security
2014 sept 4_hadoop_securityAdam Muise
 
Hadoop Security in Big-Data-as-a-Service Deployments - Presented at Hadoop Su...
Hadoop Security in Big-Data-as-a-Service Deployments - Presented at Hadoop Su...Hadoop Security in Big-Data-as-a-Service Deployments - Presented at Hadoop Su...
Hadoop Security in Big-Data-as-a-Service Deployments - Presented at Hadoop Su...Abhiraj Butala
 
Nl HUG 2016 Feb Hadoop security from the trenches
Nl HUG 2016 Feb Hadoop security from the trenchesNl HUG 2016 Feb Hadoop security from the trenches
Nl HUG 2016 Feb Hadoop security from the trenchesBolke de Bruin
 
Hdp security overview
Hdp security overview Hdp security overview
Hdp security overview Hortonworks
 
Hadoop REST API Security with Apache Knox Gateway
Hadoop REST API Security with Apache Knox GatewayHadoop REST API Security with Apache Knox Gateway
Hadoop REST API Security with Apache Knox GatewayDataWorks Summit
 
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...Hortonworks
 
Hadoop ClusterClient Security Using Kerberos
Hadoop ClusterClient Security Using KerberosHadoop ClusterClient Security Using Kerberos
Hadoop ClusterClient Security Using KerberosSarvesh Meena
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with HadoopCloudera, Inc.
 

What's hot (20)

Apache Sentry for Hadoop security
Apache Sentry for Hadoop securityApache Sentry for Hadoop security
Apache Sentry for Hadoop security
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014
 
Hadoop Security Architecture
Hadoop Security ArchitectureHadoop Security Architecture
Hadoop Security Architecture
 
Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010
Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010
Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010
 
Deploying Enterprise-grade Security for Hadoop
Deploying Enterprise-grade Security for HadoopDeploying Enterprise-grade Security for Hadoop
Deploying Enterprise-grade Security for Hadoop
 
Hadoop & Security - Past, Present, Future
Hadoop & Security - Past, Present, FutureHadoop & Security - Past, Present, Future
Hadoop & Security - Past, Present, Future
 
Hadoop Operations: How to Secure and Control Cluster Access
Hadoop Operations: How to Secure and Control Cluster AccessHadoop Operations: How to Secure and Control Cluster Access
Hadoop Operations: How to Secure and Control Cluster Access
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
 
Improvements in Hadoop Security
Improvements in Hadoop SecurityImprovements in Hadoop Security
Improvements in Hadoop Security
 
2014 sept 4_hadoop_security
2014 sept 4_hadoop_security2014 sept 4_hadoop_security
2014 sept 4_hadoop_security
 
Hadoop Security in Big-Data-as-a-Service Deployments - Presented at Hadoop Su...
Hadoop Security in Big-Data-as-a-Service Deployments - Presented at Hadoop Su...Hadoop Security in Big-Data-as-a-Service Deployments - Presented at Hadoop Su...
Hadoop Security in Big-Data-as-a-Service Deployments - Presented at Hadoop Su...
 
Hadoop Security
Hadoop SecurityHadoop Security
Hadoop Security
 
Nl HUG 2016 Feb Hadoop security from the trenches
Nl HUG 2016 Feb Hadoop security from the trenchesNl HUG 2016 Feb Hadoop security from the trenches
Nl HUG 2016 Feb Hadoop security from the trenches
 
Hdp security overview
Hdp security overview Hdp security overview
Hdp security overview
 
Hadoop security
Hadoop securityHadoop security
Hadoop security
 
Hadoop REST API Security with Apache Knox Gateway
Hadoop REST API Security with Apache Knox GatewayHadoop REST API Security with Apache Knox Gateway
Hadoop REST API Security with Apache Knox Gateway
 
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
Distilling Hadoop Patterns of Use and How You Can Use Them for Your Big Data ...
 
April 2014 HUG : Apache Sentry
April 2014 HUG : Apache SentryApril 2014 HUG : Apache Sentry
April 2014 HUG : Apache Sentry
 
Hadoop ClusterClient Security Using Kerberos
Hadoop ClusterClient Security Using KerberosHadoop ClusterClient Security Using Kerberos
Hadoop ClusterClient Security Using Kerberos
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with Hadoop
 

Viewers also liked

Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access SecurityCloudera, Inc.
 
Hadoop and Kerberos: the Madness Beyond the Gate
Hadoop and Kerberos: the Madness Beyond the GateHadoop and Kerberos: the Madness Beyond the Gate
Hadoop and Kerberos: the Madness Beyond the GateSteve Loughran
 
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionHadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionSteve Loughran
 
Administer Hadoop Cluster
Administer Hadoop ClusterAdminister Hadoop Cluster
Administer Hadoop ClusterEdureka!
 
Introduction to sentry
Introduction to sentryIntroduction to sentry
Introduction to sentrymozillazg
 
Secure Hadoop Cluster With Kerberos
Secure Hadoop Cluster With KerberosSecure Hadoop Cluster With Kerberos
Secure Hadoop Cluster With KerberosEdureka!
 
Performing Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopPerforming Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopDataWorks Summit
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
Introduction to Cloudera's Administrator Training for Apache Hadoop
Introduction to Cloudera's Administrator Training for Apache HadoopIntroduction to Cloudera's Administrator Training for Apache Hadoop
Introduction to Cloudera's Administrator Training for Apache HadoopCloudera, Inc.
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
Overview of HDFS Transparent Encryption
Overview of HDFS Transparent Encryption Overview of HDFS Transparent Encryption
Overview of HDFS Transparent Encryption Cloudera, Inc.
 
Hadoop Administration pdf
Hadoop Administration pdfHadoop Administration pdf
Hadoop Administration pdfEdureka!
 
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Cloudera, Inc.
 
Securing Your Apache Spark Applications
Securing Your Apache Spark ApplicationsSecuring Your Apache Spark Applications
Securing Your Apache Spark ApplicationsCloudera, Inc.
 
Securing Hadoop with Apache Ranger
Securing Hadoop with Apache RangerSecuring Hadoop with Apache Ranger
Securing Hadoop with Apache RangerDataWorks Summit
 

Viewers also liked (19)

Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access Security
 
Hadoop and Kerberos: the Madness Beyond the Gate
Hadoop and Kerberos: the Madness Beyond the GateHadoop and Kerberos: the Madness Beyond the Gate
Hadoop and Kerberos: the Madness Beyond the Gate
 
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionHadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
 
Administer Hadoop Cluster
Administer Hadoop ClusterAdminister Hadoop Cluster
Administer Hadoop Cluster
 
Introduction to sentry
Introduction to sentryIntroduction to sentry
Introduction to sentry
 
Apache Solr Workshop
Apache Solr WorkshopApache Solr Workshop
Apache Solr Workshop
 
Secure Hadoop Cluster With Kerberos
Secure Hadoop Cluster With KerberosSecure Hadoop Cluster With Kerberos
Secure Hadoop Cluster With Kerberos
 
Performing Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopPerforming Network & Security Analytics with Hadoop
Performing Network & Security Analytics with Hadoop
 
Hadoop admin
Hadoop adminHadoop admin
Hadoop admin
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Introduction to Cloudera's Administrator Training for Apache Hadoop
Introduction to Cloudera's Administrator Training for Apache HadoopIntroduction to Cloudera's Administrator Training for Apache Hadoop
Introduction to Cloudera's Administrator Training for Apache Hadoop
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Overview of HDFS Transparent Encryption
Overview of HDFS Transparent Encryption Overview of HDFS Transparent Encryption
Overview of HDFS Transparent Encryption
 
Sentry - An Introduction
Sentry - An Introduction Sentry - An Introduction
Sentry - An Introduction
 
Hadoop Administration pdf
Hadoop Administration pdfHadoop Administration pdf
Hadoop Administration pdf
 
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
 
Securing Your Apache Spark Applications
Securing Your Apache Spark ApplicationsSecuring Your Apache Spark Applications
Securing Your Apache Spark Applications
 
Securing Hadoop with Apache Ranger
Securing Hadoop with Apache RangerSecuring Hadoop with Apache Ranger
Securing Hadoop with Apache Ranger
 
Big data security
Big data securityBig data security
Big data security
 

Similar to Hadoop security @ Philly Hadoop Meetup May 2015

Cloudera GoDataFest Security and Governance
Cloudera GoDataFest Security and GovernanceCloudera GoDataFest Security and Governance
Cloudera GoDataFest Security and GovernanceGoDataDriven
 
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...Cloudera, Inc.
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoopNiel Dunnage
 
大数据数据治理及数据安全
大数据数据治理及数据安全大数据数据治理及数据安全
大数据数据治理及数据安全Jianwei Li
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubDataWorks Summit
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopCloudera, Inc.
 
Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataCloudera, Inc.
 
Cloudera training: secure your Cloudera cluster
Cloudera training: secure your Cloudera clusterCloudera training: secure your Cloudera cluster
Cloudera training: secure your Cloudera clusterCloudera, Inc.
 
Bringing Trus and Visibility to Apache Hadoop
Bringing Trus and Visibility to Apache HadoopBringing Trus and Visibility to Apache Hadoop
Bringing Trus and Visibility to Apache HadoopDataWorks Summit
 
Hadoop security implementationon 20171003
Hadoop security implementationon 20171003Hadoop security implementationon 20171003
Hadoop security implementationon 20171003lee tracie
 
Security implementation on hadoop
Security implementation on hadoopSecurity implementation on hadoop
Security implementation on hadoopWei-Chiu Chuang
 
Vmware Serengeti - Based on Infochimps Ironfan
Vmware Serengeti - Based on Infochimps IronfanVmware Serengeti - Based on Infochimps Ironfan
Vmware Serengeti - Based on Infochimps IronfanJim Kaskade
 
Cloudera Director: Unlock the Full Potential of Hadoop in the Cloud
Cloudera Director: Unlock the Full Potential of Hadoop in the CloudCloudera Director: Unlock the Full Potential of Hadoop in the Cloud
Cloudera Director: Unlock the Full Potential of Hadoop in the CloudCloudera, Inc.
 
Saving the elephant—now, not later
Saving the elephant—now, not laterSaving the elephant—now, not later
Saving the elephant—now, not laterDataWorks Summit
 
Webinar: Productionizing Hadoop: Lessons Learned - 20101208
Webinar: Productionizing Hadoop: Lessons Learned - 20101208Webinar: Productionizing Hadoop: Lessons Learned - 20101208
Webinar: Productionizing Hadoop: Lessons Learned - 20101208Cloudera, Inc.
 
Five Tips for Running Cloudera on AWS
Five Tips for Running Cloudera on AWSFive Tips for Running Cloudera on AWS
Five Tips for Running Cloudera on AWSCloudera, Inc.
 
Multi-Tenant Operations with Cloudera 5.7 & BT
Multi-Tenant Operations with Cloudera 5.7 & BTMulti-Tenant Operations with Cloudera 5.7 & BT
Multi-Tenant Operations with Cloudera 5.7 & BTCloudera, Inc.
 
Hadoop Operations - Past, Present, and Future
Hadoop Operations - Past, Present, and FutureHadoop Operations - Past, Present, and Future
Hadoop Operations - Past, Present, and FutureDataWorks Summit
 
Simplify and Secure your Hadoop Environment with Hortonworks and Centrify
Simplify and Secure your Hadoop Environment with Hortonworks and CentrifySimplify and Secure your Hadoop Environment with Hortonworks and Centrify
Simplify and Secure your Hadoop Environment with Hortonworks and CentrifyHortonworks
 

Similar to Hadoop security @ Philly Hadoop Meetup May 2015 (20)

Cloudera GoDataFest Security and Governance
Cloudera GoDataFest Security and GovernanceCloudera GoDataFest Security and Governance
Cloudera GoDataFest Security and Governance
 
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
Comprehensive Security for the Enterprise II: Guarding the Perimeter and Cont...
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
大数据数据治理及数据安全
大数据数据治理及数据安全大数据数据治理及数据安全
大数据数据治理及数据安全
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
 
Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the Data
 
Cloudera training: secure your Cloudera cluster
Cloudera training: secure your Cloudera clusterCloudera training: secure your Cloudera cluster
Cloudera training: secure your Cloudera cluster
 
Bringing Trus and Visibility to Apache Hadoop
Bringing Trus and Visibility to Apache HadoopBringing Trus and Visibility to Apache Hadoop
Bringing Trus and Visibility to Apache Hadoop
 
Securing Spark Applications
Securing Spark ApplicationsSecuring Spark Applications
Securing Spark Applications
 
Hadoop security implementationon 20171003
Hadoop security implementationon 20171003Hadoop security implementationon 20171003
Hadoop security implementationon 20171003
 
Security implementation on hadoop
Security implementation on hadoopSecurity implementation on hadoop
Security implementation on hadoop
 
Vmware Serengeti - Based on Infochimps Ironfan
Vmware Serengeti - Based on Infochimps IronfanVmware Serengeti - Based on Infochimps Ironfan
Vmware Serengeti - Based on Infochimps Ironfan
 
Cloudera Director: Unlock the Full Potential of Hadoop in the Cloud
Cloudera Director: Unlock the Full Potential of Hadoop in the CloudCloudera Director: Unlock the Full Potential of Hadoop in the Cloud
Cloudera Director: Unlock the Full Potential of Hadoop in the Cloud
 
Saving the elephant—now, not later
Saving the elephant—now, not laterSaving the elephant—now, not later
Saving the elephant—now, not later
 
Webinar: Productionizing Hadoop: Lessons Learned - 20101208
Webinar: Productionizing Hadoop: Lessons Learned - 20101208Webinar: Productionizing Hadoop: Lessons Learned - 20101208
Webinar: Productionizing Hadoop: Lessons Learned - 20101208
 
Five Tips for Running Cloudera on AWS
Five Tips for Running Cloudera on AWSFive Tips for Running Cloudera on AWS
Five Tips for Running Cloudera on AWS
 
Multi-Tenant Operations with Cloudera 5.7 & BT
Multi-Tenant Operations with Cloudera 5.7 & BTMulti-Tenant Operations with Cloudera 5.7 & BT
Multi-Tenant Operations with Cloudera 5.7 & BT
 
Hadoop Operations - Past, Present, and Future
Hadoop Operations - Past, Present, and FutureHadoop Operations - Past, Present, and Future
Hadoop Operations - Past, Present, and Future
 
Simplify and Secure your Hadoop Environment with Hortonworks and Centrify
Simplify and Secure your Hadoop Environment with Hortonworks and CentrifySimplify and Secure your Hadoop Environment with Hortonworks and Centrify
Simplify and Secure your Hadoop Environment with Hortonworks and Centrify
 

Recently uploaded

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 

Recently uploaded (20)

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 

Hadoop security @ Philly Hadoop Meetup May 2015

  • 1. Apache Hadoop Security Today and Tomorrow Philly Hadoop Meetup Shravan (Sean) Pabba | Senior Systems Engineer | @skpabba
  • 2. 2© Cloudera, Inc. All rights reserved. Agenda • Hadoop Evolution • Why is Hadoop Security Different? • Enterprise Security • Perimeter • Access • Visibility • Data • What’s Next? • Demo
  • 3. 3© Cloudera, Inc. All rights reserved. Have you done? •Hadoop? •Cloudera/Hortonworks/MapR/Others? •Security? •Kerberos/AD/Encryption?
  • 4. 4© Cloudera, Inc. All rights reserved. Evolution of the Hadoop Platform 2005-07 2008 2009 2010 2011 2012 2013-2015 Core Hadoop (HDFS, MapReduce) HBase ZooKeeper Core Hadoop Hive Mahout HBase ZooKeeper Core Hadoop Sqoop Whirr Avro Hive Mahout HBase ZooKeeper Core Hadoop Flume Bigtop Oozie MRUnit HCatalog Hue Sqoop Whirr Avro Hive Mahout HBase ZooKeeper YARN Core Hadoop Spark Tez Impala Kafka Flume Bigtop Oozie MRUnit HCatalog Hue Sqoop Whirr Avro Hive Mahout HBase ZooKeeper YARN Core Hadoop Parquet Sentry Spark Tez Impala Kafka Flume Bigtop Oozie MRUnit HCatalog Hue Sqoop Whirr Avro Hive Mahout HBase ZooKeeper YARN Core Hadoop The stack is continually evolving and growing!
  • 5. 5© Cloudera, Inc. All rights reserved. Multiple Workloads Batch, Interactive, and Real-Time. Leading performance and usability in one platform. • End-to-end analytic workflows • Access more data • Work with data in new ways • Enable new users Security and Administration Process Ingest Sqoop, Flume Transform MapReduce, Hive, Pig, Spark Discover Analytic Database Impala Search Solr Model Machine Learning SAS, R, Spark, Mahout Serve NoSQL Database HBase Streaming Spark Streaming Scale-Out Storage HDFS, HBase YARN, Cloudera Manager, Cloudera Navigator Multiple big data opportunities in one optimized, high-performance, multi-tenant platform.
  • 6. 6© Cloudera, Inc. All rights reserved. Why is Hadoop Security Different? Benefits of EDH Security Side Effect A single platform for all the data Combining data and audiences that used to be securely silo’d A rich, flexible ecosystem of tools & utilities Security method proliferation can increase costs/ introduce coverage gaps Ingest data of any type Sensitive fields added without review Active Archive provides lower cost storage than legacy systems Lose the built-in compliance controls that legacy systems provided
  • 7. 7© Cloudera, Inc. All rights reserved. Business Users • Run high value workloads in cluster • Quickly adopt new innovations Information Security • Follow established policies and procedures • Maintain compliance IT/Operations • Integrate with existing IT investments • Minimize end-user support • Automate configuration Multiple Security Stakeholders - Competing Goals?
  • 8. 8© Cloudera, Inc. All rights reserved. A Brief History of Hadoop Security Originally developed without security in mind Yahoo! focused on adding authentication Project Rhino works to enhance Hadoop Security 2005 2009 2013 • No authentication of users or services • Anyone could submit arbitrary code to be executed • Any user could impersonate other users • Security model was complex • Security configurations were complex and error-prone • No data-at-rest encryption • Limited authorization capabilities Project aims to add: • Data Protection • Authorization Simplified Authentication
  • 9. 9© Cloudera, Inc. All rights reserved. What is Enterprise Security? Four Functional Areas Hadoop Cluster Users Applications Operators Perimeter Data Access Visibility
  • 10. 10© Cloudera, Inc. All rights reserved. Enterprise Security Authentication, Authorization, Audit, and Compliance Perimeter Guarding access to the cluster itself InfoSec Concept: Authentication Access Defining what users and applications can do with data InfoSec Concept: Authorization Kerberos, LDAP/AD, Cloudera Manager HDFS ACLs, Apache Sentry, HBase ABAC Visibility Reporting on where data came from and how it’s being used InfoSec Concept: Audit Cloudera Navigator Data Protecting data in the cluster from unauthorized visibility InfoSec Concept: Compliance HDFS Encryption, Navigator Encrypt & Key Trustee
  • 11. 11© Cloudera, Inc. All rights reserved. • Contributed by Intel in 2013 • Blueprint for enterprise-grade security Cloudera and Intel Project Rhino Rhino Goal: Unified Authorization Engineers at Intel and Cloudera (together with Oracle and IBM) are jointly contributing to Apache Sentry Rhino Goal: Encryption and Key Management Framework Cloudera and Intel engineers are now contributing HDFS encryption capabilities that can plug into enterprise key managers
  • 12. 12© Cloudera, Inc. All rights reserved. Perimeter Security Requirements Preserve user choice of the right Hadoop service (e.g. Impala, Spark) Conform to centrally managed authentication policies Implement with existing standard systems: Active Directory and Kerberos Perimeter Guarding access to the cluster itself InfoSec Concept: Authentication Kerberos, LDAP/AD, Cloudera Manager
  • 13. 13© Cloudera, Inc. All rights reserved. Perimeter: Authentication in Hadoop Kerberos • Provably strong authentication between all Hadoop services and (optionally) to end-points • Cloudera Manager hides complexity LDAP/AD • Username / password • Option for Hue, Hive Metastore, Impala connectors, Cloudera Manager admin logins SAML • For Single Sign-On (SSO) for listed options • Kerberos clients no longer required on most user end-points
  • 14. 14© Cloudera, Inc. All rights reserved. Authentication Options and Coverage HDFS HBase & Search Impala & Hive Server 2 MapReduce & YARN … Other Services Commercial BI Gateways Client Client Client Client … Applications (Pig, Hue, etc.) “End-to-End” Kerberos “Core” Kerberos “Edge” AD/LDAP/SAML
  • 15. 15© Cloudera, Inc. All rights reserved. Example KDC NFS Server ID: jdoe@FOO.BAR.ORG TGT & Client Session KeyTGT & Authenticator Service Ticket & Service Session Key Service Ticket & Authenticator Timestamp
  • 16. 16© Cloudera, Inc. All rights reserved. Kerberizing Hadoop Cluster • Need a MIT KDC or Active Directory. • Appropriate realm definitions in place. • Each Hadoop service needs a principal for each host it runs on. • Cloudera Manager makes it easy to enable Kerberos. • Recent Cloudera blog post has detailed instructions, http://blog.cloudera.com/blog/2015/03/how-to-quickly-configure-kerberos-for- your-apache-hadoop-cluster/
  • 17. 17© Cloudera, Inc. All rights reserved. • Manages Users, Groups, and Services • Provides username / password authentication • Group membership determines Service access Active Directory • Trusted and standard third-party • Authenticated users receive “Tickets” • “Tickets” gain access to Services Kerberos Active Directory and Kerberos User authenticates to AD Authenticated user gets Kerberos Ticket Ticket grants access to Services e.g. Impala User [ssmith] Password[***** ]
  • 18. 18© Cloudera, Inc. All rights reserved. Automated Authentication with Cloudera Manager Direct to AD Kerberos Integration Kerberos Configuration Wizard Added Tuning and Monitoring • Users authenticate directly against AD • Hadoop Services defined directly in AD Kerberos • User access to Hadoop services controlled via AD Groups • Automates Kerberos configuration for existing Hadoop clusters simplifying a tedious and error prone process • Tune interrelated configuration for dual KDC’s • Service monitoring through CM when Kerberos enabled
  • 19. 19© Cloudera, Inc. All rights reserved. Access Security Requirements Provide users access to data needed to do their job Centrally manage access policies Leverage a role-based access control model built on AD Access Defining what users and applications can do with data InfoSec Concept: Authorization HDFS ACL, Apache Sentry, HBase ABAC
  • 20. 20© Cloudera, Inc. All rights reserved. Manage data access by role, instead of by individual user • Fraud Analyst Role has read access on ALL transaction data • Branch Teller Role has read / write access on very limited set of data • Relationships between users and roles are established via groups An RBAC policy is then uniformly enforced for all Hadoop services • Provides unified authorization controls • As opposed to tools for managing numerous, service specific policies RBAC and Centralized Authorization
  • 21. 21© Cloudera, Inc. All rights reserved. Sentry provides unified authorization via fine-grained RBAC for Impala, Hive, Search, MapReduce, Pig, HDFS… Unified Authorization with Apache Sentry Sentry Perm. Read Access to ALL Transaction Data Sentry Role Fraud Analyst Role Group Fraud Analysts Sam Smith
  • 22. 22© Cloudera, Inc. All rights reserved. • Sentry can be configured to use AD to determine a user’s group assignments • Group assignment changes in AD are automatically picked up, resulting in updated Sentry role assignments Sentry and Active Directory Groups Sentry Perm. Read Access to ALL Transaction Data Sentry Role Fraud Analyst Role AD Group Fraud Analysts Sam Smith
  • 23. 23© Cloudera, Inc. All rights reserved. Sentry enforces each rule across Hadoop components Hive Server 2 Enforcement code Impala MapRed uce, Pig, HDFS* Apps: Datameer, Platfora, etc* Permissions rules Common enforcement code for consistency. Rule 1: Allow fraud analysts read access to the transaction table Permissions specified by administrators (top-level and delegated) Enforcement code Enforcement code Enforcement code Search Enforcement code
  • 24. 24© Cloudera, Inc. All rights reserved. Visual Policy Management
  • 25. 25© Cloudera, Inc. All rights reserved. Visibility Security Requirements Understand where report data came from and discover more data like it Comply with policies for audit, data classification, and lineage Centralize the audit repository; perform discovery; automate lineage Visibility Reporting on where data came from and how it’s being used InfoSec Concept: Audit Cloudera Navigator
  • 26. 26© Cloudera, Inc. All rights reserved. Auditing and Access Management • Full audit and access history for HDFS, Impala, HIVE, HBase and Sentry • Review and verify HDFS permissions Metadata & Discovery • Easily discover, classify, and locate data to support governance and compliance Lineage & Provenance • Automatic collection and easy visualization of upstream and downstream data lineage Lifecycle Management • Policy-based data management Visibility through Cloudera Navigator Data Management for an EDH HDFS HBASE HIVE CLOUDERA NAVIGATOR CDH Audit & Access Management Classification & Discovery Lineage Lifecycle Management Enterprise Metadata Repository  Business metadata  System metadata
  • 27. 27© Cloudera, Inc. All rights reserved.
  • 28. 28© Cloudera, Inc. All rights reserved. Data Security Requirements Perform analytics on regulated data Encrypt data at rest and in motion, conform to key management policies, protect from root Integrate with existing HSM as part of key management infrastructure Data Protecting data in the cluster from unauthorized visibility InfoSec Concept: Compliance HDFS Encryption, Navigator Encrypt & Key Trustee
  • 29. 29© Cloudera, Inc. All rights reserved. Data: Protection in Hadoop Data in Motion Data at Rest “Network Encryption” • SSL/TLS/HTTPS – web user interfaces, JDBC • SASL – most other paths (i.e. network RPC) • Centrally enabled and configured in Cloudera Manager “Data Encryption” • HDFS Encryption • Cloudera Navigator • OS-level file system encryption • Certified partner solutions • Field-level encryption • Data masking or tokenization
  • 30. 30© Cloudera, Inc. All rights reserved. Encryption of Data in Motion using SSL/TLS, HTTPS and SASL • HDFS – SASL (RPC), SASL (Data Transfer Protocol) • YARN – SASL (RPC) • MR – SASL (RPC), HTTPS (shuffle) • Flume – SSL (Avro RPC) • HS2 – SASL (Thrift), SASL (JDBC), SSL (JDBC, ODBC) • Impala - SSL • Search – SSL • Hue – HTTPS Encrypting Data In Motion
  • 31. 31© Cloudera, Inc. All rights reserved. • ZK – SASL (RPC) • Sentry – SASL (RPC) • Oozie – HTTPS • Spark – SSL for Akka and HTTP (for broadcast and file server) protocols. No SSL support for WebUI and block transfer service. • Kafka – None Encrypting Data In Motion
  • 32. 32© Cloudera, Inc. All rights reserved. • Available in CDH 5.3/Hadoop 2.6 (HDFS- 6134) • Supports specification of HDFS directories as “Encryption Zones” • All subsequent directory contents encrypted • Multi-tenant encryption with tenant specific keys • Compliments Navigator encrypt for meta- data encryption • Key management via Navigator key trustee HDFS Encryption
  • 33. 33© Cloudera, Inc. All rights reserved. • Encryption for HDFS, HBase • No encryption for metadata, log files, ingest paths • No key management • Complicated, manual command line configuration • Incomplete audit trail Open Source HDFS Encryption Manager Navigator Impala Hive HDFS HBase Sentry Log Files Ingest Paths Metadata Store Encrypted Data Encryption Key Legend
  • 34. 34© Cloudera, Inc. All rights reserved. Cloudera’s Solution: • ALL data encrypted: HDFS, HBase, metadata, log files, ingest paths • Enterprise Key Management via Navigator Key Trustee • Configuration support via Cloudera Manager • Audit integration to Cloudera Navigator • Optional root-of-trust integration with HSMs Compliance-Ready Encryption & Key Management Manager Navigator Impala Hive HDFS HBase Sentry Navigator Key Trustee Log Files Metadata Store Encrypted Data Encryption Key Legend Ingest Paths
  • 35. 35© Cloudera, Inc. All rights reserved. Transparent layer between application and file system • Compliance-Ready • Massively Scalable • High Performance: Optimized for Intel • Separation of Duties • Key Management with Navigator Key Trustee Navigator Encrypt
  • 36. 36© Cloudera, Inc. All rights reserved. “Virtual safe-deposit box” for managing encryption keys or other Hadoop security artifact Navigator Key Trustee • Separates Keys from Encrypted Data • Centralized Management with Audit Controls • Integration with HSMs from Thales, RSA, and SafeNet • Roadmap: Management of SSL certificates, SSH keys, tokens, passwords, Kerberos Keytab Files, and more
  • 37. 37© Cloudera, Inc. All rights reserved. What’s Next? • Log Redaction – Was delivered as part of CDH 5.4 • Highly Available Authorization • Unified Credential Management • Simplified Wire Encryption • Attribute-Based Access Controls & “Follow the Data” Security • Single fine-grained permissions rule (such as row and column level) to be enforced across all access paths, including MR and Spark, in addition to Hive and Impala. • Continued Cloudera & Intel Efforts
  • 38. 38© Cloudera, Inc. All rights reserved. Demo Time

Editor's Notes

  1. * We offer the most complete set of processing, analysis, and serving frameworks for Hadoop. * Including comprehensive support for YARN. For example, Impala runs on YARN. YARN is not a differentiator. === What’s really significant about this architecture is how it unifies diverse access to common data. In traditional approaches, you’d have separate systems to collect, store, process, explore, model, and serve data. Different teams would use different systems for each workload, and users whose roles span multiple systems would have to use several of them to achieve their objectives. With Cloudera’s enterprise data hub: You can perform end-to-end data workflows in a single system, dramatically lowering time to value. Each workload can access unlimited data, thanks to the underlying data platform, enhancing the value of each workload. Power users can now access their data in new ways: SQL, search, machine learning, programming, etc. At the same time, new users are enabled by these diverse workloads to interact with data. Cloudera Enterprise provides comprehensive support for batch, interactive, and real-time workloads: Batch Data integration with Apache Sqoop Data processing with MapReduce, Apache Hive, Apache Pig Memory-centric processing with Apache Spark Interactive Analytic SQL with Impala Search with Apache Solr Machine Learning with Apache Spark Real-Time Data integration with Apache Kafka, Apache Flume Stream processing with Apache Spark Data serving with Apache HBase Shared resource management ensures that each workload is handled appropriately and abides by IT policy. What’s more, 3rd party tools, such as SAS or Informatica can run as native workloads inside Cloudera’s enterprise data hub.
  2. Business Manager Run high value workloads in cluster Quickly adopt new innovations InfoSec Follow established policies and procedures Maintain compliance IT Ops Integrate with existing IT investments Minimize end-user support Automate configuration
  3. There are many aspects to security - and it's all too easy for other vendors to claim their platforms are "secure" because they cover one or more of these pillars. To achieve comprehensive security, we offer all four pillars of security: Perimeter, Access, Visibility, and Data. Cloudera Enterprise achieves all of these and is compliance-ready out-of-the-box to ensure you’re protected
  4. Directory services and Kerberos
  5. Username/Password LDAP/AD authentication is an option for - Hue, Hive Metastore, Impala connectors, Cloudera Manager Admin logins SAML for SSO – Hue, Cloudera Manager (the last bullet applies to both of the bullets above it) Kerberos-based – use industry standard Kerberos Provably strong authentication between all Hadoop services, and to clients or client proxies Cloudera Manager hides complexity Coming soon (5.1): plug directly into AD for Kerberos Eliminates MIT Kerberos infrastructure requirement Username/password – against LDAP/AD SAML for SSO Kerberos clients no longer required on most user end-points
  6. Kerberos Principals A user in Kerberos is called a principal, which is made up of three distinct components: the primary, instance, and realm. A Kerberos principal is used in a Kerberos-secured system to represent a unique identity. The first component of the principal is called the primary, or sometimes the user component. The primary component is an arbitrary string and may be the operating system username of the user or the name of a service. The primary component is followed by an optional section called the instance, which is used to create principals that are used by users in special roles or to define the host on which a service runs, for example. An instance, if it exists, is separated from the primary by a slash and then the content is used to disambiguate multiple principals for a single user or service. The final component of the principal is the realm. The realm is similar to a domain in DNS in that it logically defines a related group of objects, although rather than hostnames as in DNS, the Kerberos realm defines a group of principals . Each realm can have its own settings including the location of the KDC on the network and supported encryption algorithms. Large organizations commonly create distinct realms to delegate administration of a realm to a group within the enterprise. Realms, by convention, are written in uppercase characters. Kerberos assigns tickets to Kerberos principals to enable them to access Kerberos-secured Hadoop services. For the Hadoop daemon principals, the principal names should be of the format username/fully.qualified.domain.name@YOUR-REALM.COM. In this guide, username in the username/fully.qualified.domain.name@YOUR-REALM.COM principal refers to the username of an existing Unix account that is used by Hadoop daemons, such as hdfs or mapred. Human users who want to access the Hadoop cluster also need to have Kerberos principals; in this case, username refers to the username of the user's Unix account, such as joe or jane. Single-component principal names (such as joe@YOUR-REALM.COM) are acceptable for client user accounts. Hadoop does not support more than two-component principal names. Kerberos Keytabs A keytab is a file containing pairs of Kerberos principals and an encrypted copy of that principal's key. A keytab file for a Hadoop daemon is unique to each host since the principal names include the hostname. This file is used to authenticate a principal on a host to Kerberos without human interaction or storing a password in a plain text file. Because having access to the keytab file for a principal allows one to act as that principal, access to the keytab files should be tightly secured. They should be readable by a minimal set of users, should be stored on local disk, and should not be included in host backups, unless access to those backups is as secure as access to the local host.
  7. “We currently manage all user authentication and service access through a combination of Active Directory and Kerberos. We have ‘audited’ procedures based around these technologies. Help me understand how your cluster will fit into these paradigms. Also, my cousin said I will have to stand up an additional KDC and put Kerberos clients on every desktop. I really hope that’s not the case, Kerberos configuration is a pain in the a**”
  8. There are many aspects to security - and it's all too easy for other vendors to claim their platforms are "secure" because they cover one or more of these pillars. To achieve comprehensive security, we offer all four pillars of security: Perimeter, Access, Visibility, and Data. Cloudera Enterprise achieves all of these and is compliance-ready out-of-the-box to ensure you’re protected
  9. In trying to solve the data access problem in Impala – we need to introduce a very important concept. Role Based Access Controls. This is very similar to the idea of Active Directory. With role based access control - I am a user in a group, and that group is assigned to some role, that role has a set of privileges that define what data the role can access and the actions that can be performed. This relationship user-group-role-privileges defines the users access and privileges.
  10. Recall: AD Group membership in conjunction with Kerberos is used to control access to SERVICES e.g. Impala
  11. There are many aspects to security - and it's all too easy for other vendors to claim their platforms are "secure" because they cover one or more of these pillars. To achieve comprehensive security, we offer all four pillars of security: Perimeter, Access, Visibility, and Data. Cloudera Enterprise achieves all of these and is compliance-ready out-of-the-box to ensure you’re protected
  12. Full audit and access history for HDFS, Impala, Hive, HBase, and Sentry Automatic collection and easy visualization of upstream and downstream data lineage Easily discover, classify, and locate data to comply with business governance and compliance rules
  13. Why you need Navigator: Lots of Data Landing in Cloudera Enterprise Huge quantities Many different sources – structured and unstructured Varying levels of sensitivity Many Users Working with the Data Administrators and compliance officers Analysts and data scientists Business users Need to Effectively Control and Consume Data Get visibility and control over the environment Discover and explore data
  14. There are many aspects to security - and it's all too easy for other vendors to claim their platforms are "secure" because they cover one or more of these pillars. To achieve comprehensive security, we offer all four pillars of security: Perimeter, Access, Visibility, and Data. Cloudera Enterprise achieves all of these and is compliance-ready out-of-the-box to ensure you’re protected
  15. Data in motion – network encryption Network RPC encryption using SASL HDFS data transfer protocol MR shuffle SSL for web-based user and administration tools Data at rest Certified Partner Solutions: Field-level encryption, data masking or tokenization OS-level file-system encryption Coming soon: HDFS file encryption Selectively encrypt folders – apply only where needed; separate tenants using separate keys per folder
  16. https://github.com/intel-hadoop/project-rhino/
  17. Navigator encrypt provides massively scalable, hi-performance at rest data encryption for all critical Hadoop data, in and out of HDFS Navigator encrypt uses process based access controls to mitigate data custodian issues and prevent unauthorized access to data in clear-text Navigator key trustee provides secure, policy driven key management for Navigator encrypt. Key trustee can also be used to secure and manage any security related Hadoop assets e.g. SSL Certificates and SSH Keys
  18. Navigator encrypt provides massively scalable, hi-performance at rest data encryption for all critical Hadoop data, in and out of HDFS Navigator encrypt uses process based access controls to mitigate data custodian issues and prevent unauthorized access to data in clear-text Navigator key trustee provides secure, policy driven key management for Navigator encrypt. Key trustee can also be used to secure and manage any security related Hadoop assets e.g. SSL Certificates and SSH Keys
  19. Navigator Encrypt provides massively scalable, high performance at rest data encryption for all critical Hadoop data, in and out of HDFS. Transparent encryption for Hadoop data as it’s written to disk. We can enable compliance (HIPAA, PCI-DSS, SOX, FERPA, EU data protection) initiatives that require at-rest encryption and key management Fast, easy deployment and configuration with enterprise scalability We provide a transparent layer between the application and file system that dramatically reduces performance impact of encryption Fully integrated into Navigator. Features Navigator encrypt uses process based access controls to mitigate data custodian issues and prevent unauthorized access to data in clear-text We can ensure sensitive data and encryption keys are never stored in plain text nor exposed publicly We can make sure only applications that need access to plaintext data will have it Navigator encrypt can prevent admins and super users from accessing encrypted data You can establish a variety of key retrieval policies that dictate who or what can access the secure artifact Keys protected by Navigator key trustee Navigator encrypt provides massively scalable, high performance at rest data encryption for all critical Hadoop data, in and out of HDFS. Transparent encryption for Hadoop data as it’s written to disk. We can enable compliance (HIPAA, PCI-DSS, SOX, FERPA, EU data protection) initiatives that require at-rest encryption and key management Fast, easy deployment and configuration with enterprise scalability We provide a transparent layer between the application and file system that dramatically reduces performance impact of encryption Fully integrated into Navigator. Features Navigator encrypt uses process based access controls to mitigate data custodian issues and prevent unauthorized access to data in clear-text We can ensure sensitive data and encryption keys are never stored in plain text nor exposed publicly We can make sure only applications that need access to plaintext data will have it Navigator encrypt can prevent admins and super users from accessing encrypted data You can establish a variety of key retrieval policies that dictate who or what can access the secure artifact Keys protected by Navigator key trustee
  20. Navigator key trustee is Cloudera’s key manager and the primary use case is storing keys for Navigator encrypt Key trustee is a software based key manager with packaged integrations to HSM’s like SafeNet Luna, Thales nShield and RSA DPM ensuring consistency with infosec policies that require these boxes to serve as root-of-trust inside a corporate environment Key trustee runs on a dedicated server and ensures the keys are stored separate from the data which is a requirement for regulations like PCI In addition to key management, you can think of key trustee as a virtual safe deposit box that can be used to secure any type of sensitive assets for the cluster. SSL certificates, ssh keys, passwords, keytab files, truststore files and more can all be secured with key trustee