Security and compliance
Databricks provides comprehensive security and compliance features to protect your data, users, and workspaces. Configure authentication and access controls, secure network connections, encrypt data at rest and in transit, manage secrets and credentials, and meet regulatory compliance requirements.
Authentication and access control
Configure strong authentication and manage user access to your Databricks environment and resources.
-
- Authentication and access control overview
- Overview of authentication methods and access control mechanisms in Databricks.
-
- Configure SSO in Databricks
- Set up single sign-on (SSO) with various identity providers including Microsoft Entra ID, Okta, and AWS IAM Identity Center.
-
- Configure multi-factor authentication
- Set up multi-factor authentication for enhanced security.
-
- Access control lists
- Implement fine-grained access control for workspace objects and resources.
Networking
Secure network connections and control data flow between Databricks and your environment.
-
- Configure private connectivity to Databricks
- Set up private connections for users accessing Databricks workspaces.
-
- What is serverless egress control?
- Understand and configure serverless egress control policies.
-
- Configure a firewall for serverless compute access
- Set up firewall rules for serverless compute access.
-
- Configure a customer-managed VPC
- Deploy Databricks in your own VPC for enhanced network control.
Data security and encryption
Protect your data at rest and in transit with encryption and security controls.
-
- Data security and encryption overview
- Overview of encryption options and data protection features in Databricks.
-
- Customer-managed keys for encryption
- Use your own encryption keys to protect data and maintain control over encryption.
-
- Encrypt traffic between cluster worker nodes
- Enable encryption for data in transit between cluster nodes.
-
- Credential redaction
- Automatically redact sensitive credentials from logs and outputs.
Secret management
Securely store and manage credentials and sensitive information.
-
- Secret management overview
- Overview of secret management capabilities for storing credentials securely.
-
- Tutorial: Create and use a Databricks secret
- Step-by-step tutorial for creating and using secrets in Databricks.
-
- Use a secret in a Spark configuration property or environment variable
- Configure secrets for use in Spark configurations and environment variables.
Compliance
Meet regulatory requirements and implement security best practices.
-
- Compliance overview
- Overview of compliance features and regulatory support in Databricks.
-
- Compliance security profile
- Security profiles for various compliance frameworks and standards.
-
- Enhanced security monitoring
- Advanced monitoring capabilities for detecting security anomalies and threats.
-
- Databricks on AWS GovCloud (FedRAMP High)
- Configuration guidance for Databricks on AWS GovCloud.