Scenario: A large organization wants to implement strict access control policies for their sensitive data stored in Hive. How would you design a comprehensive authorization framework in Hive to enforce these policies effectively?

  • Access control lists (ACLs)
  • Attribute-based access control (ABAC)
  • Hierarchical access control (HAC)
  • Role-based access control (RBAC)
Implementing an effective authorization framework in Hive involves considering various access control models such as Role-based access control (RBAC), Attribute-based access control (ABAC), Access control lists (ACLs), and Hierarchical access control (HAC). Each model offers distinct advantages and challenges, and the choice depends on the organization's specific requirements and the complexity of their access control policies.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *