CloudWiki
Rules
Critical

Ensure there is no unrestricted inbound access to TCP port 8020 (Hadoop)

Security & Compliance
No items found.
Description

TCP port 8020 is used by Hadoop Distributed File System (HDFS) to communicate with the NameNode. If there is unrestricted inbound access to this port, it could allow an attacker to access and manipulate the Hadoop cluster, leading to data breaches, data loss, or service disruption. Therefore, it is important to ensure that there is no unrestricted inbound access to TCP port 8020 in your network.

Remediation

To prevent unauthorized access to TCP port 8020, network administrators can implement the following remediation steps:

  1. Restrict access to TCP port 8020 by creating a firewall rule that allows only authorized IP addresses or ranges to connect to the port.
  2. Ensure that Hadoop clusters are properly secured with strong authentication and authorization mechanisms, such as Kerberos or LDAP.
  3. Use secure communication protocols like SSL/TLS to encrypt traffic between the NameNode and DataNode.
  4. Implement network segmentation to isolate Hadoop clusters from other parts of the network.
  5. Regularly monitor and analyze network traffic to detect any suspicious activity and take appropriate actions.
Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.