Overview
Explore practical steps for securing big data installations in this 49-minute conference talk from LASCON. Learn about the security challenges associated with big data's three Vs (Velocity, Variety, and Volume) and discover how to address the potential fourth V: Vulnerability. Delve into topics such as deployment security issues, authorization methods like Kerberos, NoSQL vulnerabilities, node-to-node encryption, and threat modeling. Gain insights on creating a secure environment with a single point of access and understand the importance of implementing robust security measures in big data projects.
Syllabus
Intro
About Manoj
Agenda
What is Big Data
Framework
Data nodes
NoSQL
Big Data Security
Deployment Security Issues
No Security
Security is not optional
No Security Examples
Authorization
Kerberos
Finding Hadoop admins
Kerberos in Hadoop
Limitations of Kerberos
No sequel vulnerabilities
Should we add OBJ
Authentication and Authorization plugin
Node to Node encryption
Enterprise adoption
Project Rhino
Threat Modeling
Secure Environment
Single Point of Access
Taught by
LASCON