+

We'd love to work with you!

By answering these 7 questions, we can find out if we're a match

Building Secure Cloudera Clusters

Course Details Find Out More
Code ADMIN-332
Tuition (CAD) Array
Tuition (USD) Array

The significant improvements in CDP architecture and tools makes CDP “Secure by Design.” The Cloudera Data Platform is intended to meet the most demanding technical audit standards. This four-day hands-on course is presented as a project plan for CDP administrators to achieve technical audit standards. The first project stage is implementing Perimeter Security by installing host level security and Kerberos. The second project stage protects Data by implementing Transport Layer Security using Auto-TLS and data encryption using Key Management System and Key Trustee Server (KMS/KTS). The third project stage controls Access for users and to data using Ranger and Atlas. The fourth stage teaches Visibility practices for auditing systems, users, and data usage. This project stage also analyzes applications in terms of vulnerabilities and introduces CDP practices for Risk Management in a fully secured Cloudera Data Platform. This course is 60% exercise and 40% lecture.

Who Can Benefit

  • This immersion course is intended for Linux Administrators who are taking up roles as CDP Administrators.

Prerequisites

  • We recommend a minimum of 3 to 5 years of system administration experience in industry. Students must have proficiency in Linux CLI. Knowledge of Directory Services, Transport Layer Security, Kerberos, and SQL select statements is helpful. Prior experience with Cloudera products is expected, experience with CDH or HDP is sufficient.

Course Content

Security Management

  • CDP Security Models
  • CDP Security Pillars
  • CDP Security Levels

Project Planning

  • The Importance of Project Planning
  • Roles and Responsibilities

Isolated Networks

  • Architecture for Network Security
  • Building an Isolated Network

Identity Management

  • FreeIPA or Active Directory
  • Identity Management Architecture
  • Pluggable Authentication Modules
  • Lightweight Directory Access Protocol
  • Cloudera Manager Roles
  • Managing Super Users

Quality Controlled Hosts

  • CDP Requirements for Hosts
  • Recommendations for deployment hosts

Encrypt Network Traffic

  • Theory for Security Protocols
  • Tools: openssl and keytool
  • Architecture for Certificate Authorities
  • Deploying TLS using Auto-TLS
  • Deploying SASL

Authentication with Kerberos

  • Architecture for Kerberos
  • Kerberos CLI
  • Deploying Kerberos
  • Managing CDP services within Kerberos

Shared Data Experience (SDX)

  • Architecture for Apache Ranger
  • Deploying Ranger
  • Deploying Infra Solr
  • Deploying Atlas

Data at Rest

  • Theory for KMS with KTS
  • Deploying KMS with KTS
  • Encrypting Data at Rest

Single Sign-On with Knox Gateway

  • Architecture for Knox Gateway
  • Installing Knox Gateway
  • Deploying Knox Gateway SSO
  • Accessing services through Knox Gateway

Authorization with Ranger

  • Creating Ranger Data Encryption Zones
  • Creating Ranger Security Zones
  • Creating Ranger resource policies
  • Creating Ranger masking policies

Classify Data with Atlas

  • Ranger Policies for Atlas
  • Searching Atlas
  • Classifying Data with Tags
  • Creating Ranger Tag Policies
  • Creating Ranger Masking Policies

Audit CDP

  • Auditing access on hosts
  • Auditing users with Ranger
  • Auditing lineage with Atlas
  • Troubleshooting with Audits

Audit CDP

  • Auditing access on hosts
  • Auditing users with Ranger
  • Auditing lineage with Atlas
  • Troubleshooting with Audits

Commission CDP

  • Validating Security Level 2
  • Checklist for commissioning CDP

Achieving Compliance

  • Regulatory Compliance
  • Roadmap to Security Level 3

Find Out More

  • This field is for validation purposes and should be left unchanged.