The document discusses the future of Hadoop security and its evolution. It outlines what Hadoop users want to do in terms of security like protect data, be compliant, and anonymize data. It then summarizes the security measures the Hadoop community has implemented so far like authorization, auditing, encryption, and authentication methods. Finally, it outlines the next steps for Hadoop security which include scaling security administration, centralizing identity management, common security across clusters in the cloud, attribute based access control, single sign on, and centralized security dashboards.