Security and compliance
Databricks provides comprehensive security and compliance features to protect your data, users, and workspaces. Configure authentication and access controls, secure network connections, encrypt data at rest and in transit, manage secrets and credentials, and meet regulatory compliance requirements.
Authentication and access control
Configure strong authentication and manage user access to your Databricks environment and resources.
-
- Authentication and access control overview
- Overview of authentication methods and access control mechanisms in Databricks.
-
- Monitor and revoke personal access tokens
- Track and manage personal access tokens for API access security.
-
- Manage entitlements
- Control user access to Databricks features and capabilities through entitlements.
-
- Access control lists
- Implement fine-grained access control for workspace objects and resources.
Networking
Secure network connections and control data flow between Databricks and your environment.
-
- Configure private connectivity to Databricks
- Set up private connections for users accessing Databricks workspaces.
-
- What is serverless egress control?
- Understand and configure serverless egress control policies.
-
- Limit network egress for your workspace using a firewall
- Set up firewall rules to limit network egress.
-
- Configure a customer-managed VPC
- Deploy Databricks in your own VPC for enhanced network control.
Data security and encryption
Protect your data at rest and in transit with encryption and security controls.
-
- Data security and encryption overview
- Overview of encryption options and data protection features in Databricks.
-
- Customer-managed keys for encryption
- Use your own encryption keys to protect data and maintain control over encryption.
-
- Encrypt traffic between cluster worker nodes
- Enable encryption for data in transit between cluster nodes.
-
- Credential redaction
- Automatically redact sensitive credentials from logs and outputs.
Secret management
Securely store and manage credentials and sensitive information.
-
- Secret management overview
- Overview of secret management capabilities for storing credentials securely.
-
- Tutorial: Create and use a Databricks secret
- Step-by-step tutorial for creating and using secrets in Databricks.
-
- Use a secret in a Spark configuration property or environment variable
- Configure secrets for use in Spark configurations and environment variables.
Compliance
Meet regulatory requirements and implement security best practices.
-
- Compliance overview
- Overview of compliance features and regulatory support in Databricks.
-
- Compliance security profile
- Security profiles for various compliance frameworks and standards.
-
- Enhanced security monitoring
- Advanced monitoring capabilities for detecting security anomalies and threats.
-
- Configure enhanced security and compliance settings
- Set up additional security controls for high-security environments.