Hadoop Secure Mode/Kerberos is not enabled Affecting Dataproc service in Google


Severity

0.0
medium
0
10
    Severity Framework
    Snyk CCSS
    Rule category
    IAM / Access Control

Is your enviroment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
    Frameworks
  • Snyk ID SNYK-CC-00712
  • credit Snyk Research Team

Description

Failure to enable Hadoop Secure Mode/Kerberos in Google Cloud Dataproc increases the risk of unauthorized access and data breaches. Enabling Hadoop Secure Mode/Kerberos ensures authentication and encryption for secure cluster communication and protects sensitive data from unauthorized access.

How to fix?

Set the enable_kerberos attribute to true in kerberos_config of the Dataproc cluster.

Example Configuration

resource "google_dataproc_cluster" "mycluster" {
  name = "clustera1"
  region = "us-east-1"

  cluster_config {
    security_config {
      kerberos_config {
        kms_key_uri = "projects/test-project/locations/global/keyRings/kerberos-key-ring/cryptoKeys/kerberos-crypto-key"
        root_principal_password_uri = "gs://kerberos-secret-bucket20/ciphertext.encrypted"
        enable_kerberos = true
      }
    }
  }
}