ClouderaNOW  Learn about the latest innovations in dataanalytics, and AI  

Watch now

Overview

The Cloudera platform is intended to meet the most demanding technical audit standards. The significant improvements in Cloudera architecture and components make Cloudera “Secure by Design.” This four-day hands-on course is presented as a project plan for Cloudera administrators to build fully secured Cloudera clusters.

The course begins with implementing Perimeter Security by installing host level security and Kerberos. Next, students protect Data by implementing Transport Layer Security using Auto-TLS and data encryption using Key Management System and Key Trustee Server (KMS/KTS). Following this, in the third stage, students control access for users and to data using Apache Ranger and Apache Atlas. The fourth stage focuses on visibility practices, teaching students how to audit systems, users, and data usage. Finally, the course introduces Cloudera practices for Risk Management in a fully secured Cloudera platform.

This course is 60% exercise and 40% lecture.

 

Download full course description

Who should take this course?

This immersion course is designed for Linux Administrators transitioning to Cloudera Administrator roles. Students must have proficiency in Linux (e.g., navigating the file system, using basic commands) and Linux text editors (e.g., vi, nano). Familiarity with Directory Services, Transport Layer Security, Kerberos, and SQL select statements is recommended. Prior experience with Cloudera products is required. Students must have reliable internet access to connect to the classroom environments hosted on Amazon Web Services.

Book the course

Course Details

Cloudera Secure by Design

  • Cloudera Security Models
  • Cloudera Security Pillars
  • Cloudera Security Levels

Project Planning for Cloudera

  • The Importance of Project Planning
  • Outline of Project Plan
  • Roles and Responsibilities of a Cloudera Administrator

Directory Services

  • Comparing Directory Services
  • Lightweight Directory Access Protocol
  • FreeIPA or Active Directory

Manage Identities on Cloudera

  • Identity Management Architecture
  • The purpose of PAM
  • Cloudera Manager and PAM

Isolated Networks

  • Architecture for Network Security
  • Building an Isolated Network

Quality Controlled Hosts

  • Cloudera Requirements for Hosts
  • Recommendations for deployment hosts

Protect Data in Motion

  • Theory for Security Protocols (TLS and SASL)
  • Tools: openssl and keytool
  • Architecture for Enterprise Certificate Authorities
  • Deploying TLS using Auto-TLS
  • Deploying SASL

Audit Cloudera

  • Auditing access on hosts
  • Auditing users with Ranger
  • Auditing lineage with Atlas

Authentication with Kerberos

  • Architecture for Kerberos
  • Kerberos CLI
  • Deploying Kerberos
  • Managing Cloudera services within Kerberos

Shared Data Experience (SDX)

  • Architecture for Apache Ranger
  • Deploying Ranger
  • Deploying Infra Solr
  • Deploying Atlas

Data at Rest

  • Theory for KMS/KTS
  • Deploying KMS/KTS
  • Encrypting Data at Rest

Single Sign-On with Knox Gateway

  • Architecture for Knox Gateway
  • Installing Knox Gateway
  • Deploying Knox Gateway SSO
  • Accessing services through Knox Gateway

Authorization with Ranger

  • Creating Ranger KMS Encryption Zones
  • Creating Ranger Security Zones
  • Creating Ranger resource policies

Classify Data with Atlas

  • Ranger Policies for Atlas
  • Searching Atlas
  • Classifying Data with Tags
  • Creating Ranger Tag Policies
  • Creating Ranger Masking Policies

Commission Cloudera

  • Validating Security Level 2
  • Checklist for commissioning Cloudera

Achieving Compliance

  • Regulatory Compliance
  • Roadmap to Security Level 3

Ready to Get Started?

Your form submission has failed.

This may have been caused by one of the following:

  • Your request timed out
  • A plugin/browser extension blocked the submission. If you have an ad blocking plugin please disable it and close this message to reload the page.