How Identity Management Solves Five Hadoop Security Risks
Sponsored by: Centrify
April 7, 2015
Big Data is creating significant opportunities for businesses, and the explosive growth of Hadoop clearly indicates its importance as a Big Data enabling technology. But combining new technologies with high-value data can increase risk potential. And Big Data is already a prime target due to the valuable information it encompasses.
This white paper explores how configuring Hadoop environments in secure mode before they enter production, strictly controlling user access to and administrative privileges within the Hadoop cluster, and auditing user and administrative activity helps companies to avoid key Hadoop security risks including:
The formation of new application identity silos
Runaway administrator privileges
Decreased mitigation capabilities
Diminished regulatory compliance
About the Author
You May Also Like