7. Security7. Security 7.1 Security Overview7.2 Encryption and Authentication using SSL7.3 Authentication using SASL7.4 Authorization and ACLs7.5 Incorporating Security Features in a Running Cluster7.6 ZooKeeper Authentication7.7 ZooKeeper Encryption