# Big data security

You can choose between two methods of implementing big data security. The security and protection of sensitive data is a major concern of data management today. To assist users in protecting their data, Pentaho provides two methods of implementing security for the Pentaho Server: Kerberos authentication and secure impersonation. Both methods are secure, and require a user to provide proof of identity to securely connect to a cluster. Also see [Pentaho and CDP security](https://docs.pentaho.com/pdia-admin/secure-the-pentaho-system/big-data-security/pentaho-and-cdp-security-big-date-security) if you are using a Knox security gateway along with Kerberos authentication for your Cloudera Data Platform (CDP) cluster.
