Case Study

Dremio Security Architecture Guide

Dremio Security Architecture Guide

Pages 12 Pages

Dremio Security Architecture Guide May 20202 dremio.com INTR ODUCTION ....................................................................... 3 REQUIREMENTS FOR SECURING DATA FOR ANALYTICS ......... 3 Authentication (Authn) - Securing and Governing User Access ......................... 4 Authorization (Authz) - Securing and Governing User Rights ............................. 4 Auditing User Actions ......................................................................................................... 4 Data Encryption .................................................................................................................... 4 Securing Infrastructure ...................................................................................................... 5 DREMIO SECURITY FEATURES

Join for free to read