& http: //www.aliyun.com/zixun/aggregation/37954.html "> nbsp; Summarize the following ten tips through the Hadoop security deployment experience to ensure data security in large and complex environments.
1, first strike strong! In the planning and deployment phase to determine the data privacy protection strategy, it is best to put the data into Hadoop to determine the protection strategy.
2, to determine what data belongs to the sensitive data of the enterprise. According to the company's privacy protection policies, as well as relevant industry regulations and government regulations to comprehensively determine.
3, timely detection of sensitive data is exposed, or whether to import into Hadoop.
4, collect information and decide whether to expose the security risk.
5, Determine whether business analysis needs to access real data, or determine whether it is possible to use these sensitive data. Then, select the appropriate encryption technology. If you have any questions, encrypt and hide them, and provide the most secure encryption and flexible coping strategies to accommodate future needs.
6. Ensure that the data protection scheme uses both hiding and encryption techniques, especially if we need to keep sensitive data separate in Hadoop.
7, to ensure that the data protection program applies to all data files, in order to preserve the accuracy of data analysis in the data summary.
8. Determine whether you need to tailor the protection scheme for a particular data set and consider splitting the Hadoop directory into smaller, more secure groups.
Make sure the encryption solution you choose is interoperable with your company's access control technology to allow different users to selectively access data in your Hadoop cluster.
10, to ensure that the need for encryption when the right technology (such as Java, Pig, etc.) can be deployed and supports seamless decryption and fast access to data.