This section describes how BDD workflows can be used in a secure Hadoop environment.
Additional information on BDD security is provided in the Security Guide.