Through Hadoop security deployment experience summary

Source: Internet
Author: User
Keywords nbsp ; security through summary of experience is it
Tags access aliyun data data protection data security environment hadoop html

& http: //www.aliyun.com/zixun/aggregation/37954.html "> nbsp; Summarize the following ten tips through the Hadoop security deployment experience to ensure data security in large and complex environments.

1, first strike strong! In the planning and deployment phase to determine the data privacy protection strategy, it is best to put the data into Hadoop to determine the protection strategy.
2, to determine what data belongs to the sensitive data of the enterprise. According to the company's privacy protection policies, as well as relevant industry regulations and government regulations to comprehensively determine.
3, timely detection of sensitive data is exposed, or whether to import into Hadoop.
4, collect information and decide whether to expose the security risk.
5, Determine whether business analysis needs to access real data, or determine whether it is possible to use these sensitive data. Then, select the appropriate encryption technology. If you have any questions, encrypt and hide them, and provide the most secure encryption and flexible coping strategies to accommodate future needs.
6. Ensure that the data protection scheme uses both hiding and encryption techniques, especially if we need to keep sensitive data separate in Hadoop.
7, to ensure that the data protection program applies to all data files, in order to preserve the accuracy of data analysis in the data summary.
8. Determine whether you need to tailor the protection scheme for a particular data set and consider splitting the Hadoop directory into smaller, more secure groups.
Make sure the encryption solution you choose is interoperable with your company's access control technology to allow different users to selectively access data in your Hadoop cluster.
10, to ensure that the need for encryption when the right technology (such as Java, Pig, etc.) can be deployed and supports seamless decryption and fast access to data.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.