Summary
In this reference architecture we have illustrated how to create a secure CDP Private Cloud Base cluster that is fully encrypted with the principle of least privileges applied to authorized users that are able to perform tasks associated with their allocated roles.
Combined with perimeter security and auditing, administrators will be able use these principles in order to comply with the most stringent of regulatory requirements.
For further information have a look at the CDP Security documentation, see
Cloudera Runtime Security and Governance
.