Hi Chirag,

Couple things can be done to reduce the attack surface (including but not
limited to):
* Use delegation tokens where only JM needs the keytab file:
https://nightlies.apache.org/flink/flink-docs-master/docs/deployment/security/security-delegation-token/
* Limit the access rights of the keytab to the minimum
* Rotate the keytab time to time
* The keytab can be encrypted at rest but that's fully custom logic outside
of Flink

G


On Fri, Sep 15, 2023 at 7:05 AM Chirag Dewan via user <user@flink.apache.org>
wrote:

> Hi,
>
> I am trying to implement a HDFS Source connector that can collect files
> from Kerberos enabled HDFS. As per the Kerberos support, I have provided my
> keytab file to Job Managers and all the Task Managers.
>
> Now, I understand that keytab file is a security concern and if left
> unsecured can be used by hackers to gain access to HDFS.
>
> So I wanted to understand if there's a way to encrypt this file on storage
> (at rest) and later decrypt before JM and TMs can initialize the
> KerberosModule?
>
> Or if there any other standard practices in controlling the keytab access
> from Storage. Would appreciate some ideas.
>
>
> Thanks
>

Reply via email to