Auditing, privacy, and compliance
Databricks provides features that allow you to audit and monitor detailed usage patterns. Not all audit and monitoring features are available on all pricing tiers. The following table contains an overview of the features and how they align to pricing plans.
Feature |
Pricing tier |
---|---|
Audit logs |
Premium |
GDPR and CCPA compliance with Delta Lake |
Standard |
The compliance security profile |
Enterprise |
HIPAA compliance features |
Enterprise |
PCI-DSS compliance controls |
Enterprise |
FedRAMP Moderate compliance controls |
Enterprise |
Enhanced Security Monitoring |
Enterprise |
Audit log schemas for Capsule8 and ClamAV |
Enterprise |
Audit logs
Databricks provides access to audit logs of activities performed by Databricks users, allowing you to monitor detailed usage patterns. You can configure two types of audit and usage logging:
Billable usage log delivery: Automated delivery of usage logs. See Deliver and access billable usage logs.
Audit log delivery: Automated delivery of audit logs. See Configure audit logging.
Privacy and compliance
Databricks has put in place controls to meet the unique compliance needs of highly regulated industries.
To learn how you can use Delta Lake on Databricks to manage General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) compliance for your data lake, see GDPR and CCPA compliance with Delta Lake
For more information about privacy and compliance and Databricks, see the Databricks Security and Trust Center.
The compliance security profile
You must enable the compliance security profile to use Databricks to process data that is regulated under the following compliance standards:
You can enable the compliance security profile on all existing and future workspaces in your Databricks account or on specific workspaces. For more information, see Enable the compliance security profile.
Monitoring
Enhanced Security Monitoring provides an enhanced disk image and additional security monitoring agents that generate logs that you can review. See Enhanced Security Monitoring
Enhanced Security Monitoring and the compliance security profile both enable several additional monitoring agents. The output for these monitoring agents is available within Databricks audit logs. For more information, see Audit log schemas for Capsule8 and ClamAV.