The Big Data store components (Nodes) communicate between them. The components do not authenticate each other.
When deploying DPOD All-In-One appliance, all communication between the big data store components is done internally making the authentication between components less significant security wise.
When deploying DPOD in a distributed architecture we highly recommend restrict access to big data store components using network security components like firewall.
Encryption at Rest
Note |
---|
Note |
Non-Appliance Mode Only The steps below are only applicable for DPOD non-appliance mode installation. |
You may leverage the operating system (Red Hat Enterprise Linux) capabilities for handling encryption of data at rest, such as LUKS Disk Encryption.
...