Summary
In this reference architecture we have illustrated how to create a secure Cloudera Base on premises cluster that is fully encrypted with the principle of least privileges applied to authorized users that are able to perform tasks associated with their allocated roles.
Combined with perimeter security and auditing, administrators will be able use these principles in order to comply with the most stringent of regulatory requirements.
For further information have a look at the Cloudera
Security documentation, see Cloudera Runtime Security and
Governance
.