Use security configurations to set up cluster security - Amazon EMR
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Use security configurations to set up cluster security

You can use Amazon EMR security configurations to configure data encryption, Kerberos authentication, and Amazon S3 authorization for EMRFS on your clusters. First, you create a security configuration. Then, the security configuration is available to use and re-use when you create clusters.

You can use the Amazon Web Services Management Console, the Amazon Command Line Interface (Amazon CLI), or the Amazon SDKs to create security configurations. You can also use an Amazon CloudFormation template to create a security configuration. For more information, see Amazon CloudFormation User Guide and the template reference for AWS::EMR::SecurityConfiguration.