Security and compliance
Databricks provides comprehensive security and compliance features to protect your data, users, and workspaces. Configure authentication and access controls, secure network connections, encrypt data at rest and in transit, manage secrets and credentials, and meet regulatory compliance requirements.
Authentication and access control
Configure strong authentication and manage user access to your Databricks environment and resources.
Feature | Description |
---|---|
Overview of authentication methods and access control mechanisms in Databricks. | |
Set up single sign-on (SSO) with various identity providers including Microsoft Entra ID, Okta, and AWS IAM Identity Center. | |
Set up multi-factor authentication for enhanced security. | |
Implement fine-grained access control for workspace objects and resources. |
Networking
Secure network connections and control data flow between Databricks and your environment.
Feature | Description |
---|---|
Set up private connections for users accessing Databricks workspaces. | |
Understand and configure serverless egress control policies. | |
Set up firewall rules for serverless compute access. | |
Deploy Databricks in your own VPC for enhanced network control. |
Data security and encryption
Protect your data at rest and in transit with encryption and security controls.
Feature | Description |
---|---|
Overview of encryption options and data protection features in Databricks. | |
Use your own encryption keys to protect data and maintain control over encryption. | |
Enable encryption for data in transit between cluster nodes. | |
Automatically redact sensitive credentials from logs and outputs. |
Secret management
Securely store and manage credentials and sensitive information.
Feature | Description |
---|---|
Overview of secret management capabilities for storing credentials securely. | |
Step-by-step tutorial for creating and using secrets in Databricks. | |
Use a secret in a Spark configuration property or environment variable | Configure secrets for use in Spark configurations and environment variables. |
Compliance
Meet regulatory requirements and implement security best practices.
Feature | Description |
---|---|
Overview of compliance features and regulatory support in Databricks. | |
Security profiles for various compliance frameworks and standards. | |
Advanced monitoring capabilities for detecting security anomalies and threats. | |
Configuration guidance for FedRAMP moderate compliance requirements. |