Skip to content

Commit c2c54cd

Browse files
Merge pull request #275110 from sreekzz/patch-39
Update concept-security.md
2 parents 2fd9027 + 18a924d commit c2c54cd

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

articles/hdinsight-aks/concept-security.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,20 @@ title: Security in HDInsight on AKS
33
description: An introduction to security with managed identity from Microsoft Entra ID in HDInsight on AKS.
44
ms.service: hdinsight-aks
55
ms.topic: conceptual
6-
ms.date: 08/29/2023
6+
ms.date: 05/11/2024
77
---
88

99
# Overview of enterprise security in Azure HDInsight on AKS
1010

1111
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
1212

13-
Azure HDInsight on AKS offers is secure by default, and there are several methods to address your enterprise security needs. Most of these solutions are activated by default.
13+
Azure HDInsight on AKS offers security by default, and there are several methods to address your enterprise security needs.
1414

1515
This article covers overall security architecture, and security solutions by dividing them into four traditional security pillars: perimeter security, authentication, authorization, and encryption.
1616

1717
## Security architecture
1818

19-
Enterprise readiness for any software requires stringent security checks to prevent and address threats that may arise. HDInsight on AKS provides a multi-layered security model to protect you on multiple layers. The security architecture uses modern authorization methods using MSI. All the storage access is through MSI, and the database access is through username/password. The password is stored in Azure [Key Vault](../key-vault/general/basic-concepts.md), defined by the customer. This makes the setup robust and secure by default.
19+
Enterprise readiness for any software requires stringent security checks to prevent and address threats that may arise. HDInsight on AKS provides a multi-layered security model to protect you on multiple layers. The security architecture uses modern authorization methods using MSI. All the storage access is through MSI, and the database access is through username/password. The password is stored in Azure [Key Vault](../key-vault/general/basic-concepts.md), defined by the customer. This feature makes the setup robust and secure by default.
2020

2121
The below diagram illustrates a high-level technical architecture of security in HDInsight on AKS.
2222

@@ -64,13 +64,12 @@ The above roles are from the ARM operations perspective. For more information, s
6464

6565
You can allow users, service principals, managed identity to access the cluster through portal or using ARM.
6666

67-
This access enables you to
68-
69-
* View clusters and manage jobs.
67+
This access enables
68+
* View clusters, and manage jobs.
7069
* Perform all the monitoring and management operations.
7170
* Perform auto scale operations and update the node count.
7271

73-
The access won't be provided for
72+
The access not provided for
7473
* Cluster deletion
7574

7675
:::image type="content" source="./media/concept-security/cluster-access.png" alt-text="Screenshot showing the cluster data access." border="true" lightbox="./media/concept-security/cluster-access.png":::

0 commit comments

Comments
 (0)