Afterword

Hadoop has come a long way since its inception. As you have seen throughout this book, security encompasses a lot of material across the ecosystem. With the boom of big data and the impact it’s having on businesses that quickly adopt Hadoop as their data platform of choice, it is no wonder that Hadoop and its wide ecosystem have moved rapidly. That being said, Hadoop is still very much in its infancy. Even with the many security configurations available, Hadoop has much to do until it’s on the level of relational databases and data warehouses to fully meet the needs of enterprises that have billions of dollars on the line with their data management.

The good news is that because of Hadoop’s massive growth in the marketplace, security deficits in the product are rapidly being filled. We leave you with some things that are either in development right now (possibly even completed by the time this is published), as well as features on the horizon that will be a part of the Hadoop ecosystem in the not too distant future.

Unified Authorization

One of the hardest jobs a Hadoop security administrator has is to keep track of how the myriad of components handles access controls. While we dedicated a good deal of coverage to Apache Sentry as a centralized authorization component for Hadoop, it is not there yet in terms of providing authorization across the entire ecosystem. This will happen in the long term—and it needs to. Security administrators and auditors alike need ...

Get Hadoop Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.