Gartner Blog Network


What’s new in Hadoop Security?

by Joerg Fritsch  |  April 17, 2015  |  Comments Off on What’s new in Hadoop Security?

2014 was a big year for Hadoop security. After a number of acquisitions, some exciting TIT FOR TAT strategies between vendors and the entry of established DAP ( = Database Audit and Protection) vendors into the Hadoop security market, clients have now a number of good choices as to how they want to secure their big data in Hadoop for production.

Controls are available for different stages of the data life cycle:
  • Controls applied when the data is captured.
  • Controls applied when data is preserved.
  • Controls applied when data is analyzed.
  • Auditing, monitoring and assessment functions.

For structured data in Hadoop, security architects have regained the controls that they have been used to in RDBMS. For unstructured data, clients must resort to basic platform security and hope for the best. The 2015 version of my research note “Protecting Big Data in Hadoop” assess and introduces the available controls and maturity levels to security and risk management professionals who need to secure big data in Hadoop.

Though the controls that are meanwhile available are plenty, the market still disagrees on the best way to control the many ways of data in Hadoop,–either North/South or East/West between the transforms and components. Some push central security services, others push data encryption (or an other transform) that would implicitly govern data access on all its ways.

I believe that my new report gives a very good overview and gives the necessary guidance to finally from the new paradigms in their production environments.

Category: 

Tags: big-data  data  hadoop  

Joerg Fritsch
Research Director
1 year at Gartner
15 years IT Industry

Joerg Fritsch is a Research Director in the Gartner for Technical Professionals Security and Risk Management Strategies team. His specialties include information security, data center and cloud security, big data (analytics), cloud computing, PaaS, distributed systems, messaging and event-driven systems, and very fast networks and servers. Read Full Bio




Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.