SecurityPDF version

Summary

In this reference architecture we have illustrated how to create a secure Cloudera Base on premises cluster that is fully encrypted with the principle of least privileges applied to authorized users that are able to perform tasks associated with their allocated roles.

Combined with perimeter security and auditing, administrators will be able use these principles in order to comply with the most stringent of regulatory requirements.

For further information have a look at the Cloudera Security documentation, see Cloudera Runtime Security and Governance.