This guide is intended for system administrators who want to secure a cluster using data encryption, user authentication, and authorization techniques. This topic also provides
information about Hadoop security programs and shows you how to set up a gateway to restrict access.