Skip to main content

Networking and security

This section provides an overview of security features and capabilities that an enterprise data team can use to further secure their SAP Databricks environment.

The following sections outline the features available on SAP Databricks to meet additional networking and security requirements.

Authentication and access control

Admins can manage entitlements and object access using access control lists and role-based access control. See Authentication and access control.

Authentication to the SAP Databricks account is managed through your SAP Cloud Identity Services, Identity Provisioning. Account users can be synchronized using SCIM. For more, see Identity management and permissions.

Secure access to SAP Databricks

warning

To avoid breaking the connection between BDC and SAP Databricks, refer to the SAP documentation before enforcing any IP ACLs.

By default, users can connect to SAP Databricks from any computer or IP address. IP access lists enable you to restrict access to your Databricks account and workspaces based on a user's IP address. See Manage IP access lists.

Secure access to other data sources

warning

To avoid breaking the connection between BDC and SAP Databricks, refer to the SAP documentation before configuring serverless egress control.

Serverless egress control allows you to manage outbound network connections from your serverless compute resources. This allows you to manage outbound connections from your serverless workloads, reducing the risk of data exfiltration. See What is serverless egress control?.

To enable access from Databricks to other sources on your network, use a network connectivity configuration (NCC). NCCs are account-level constructs that you can use to manage firewall enablement at scale. See Configure a firewall for serverless compute access.

Enhanced Security and Compliance add-on

SAP Databricks has put in place controls to meet the unique compliance needs of highly regulated industries.

For more information on these controls, see Configure enhanced security and compliance settings.