At Databricks, we know that data is one of the most valuable assets to organizations and that protecting it is a top priority. That's why we built security into every layer of the Databricks Lakehouse Platform. But we recognize that customers can struggle to assess whether their deployment is well-architected, what areas are well-fortified and which need attention. Even if you're confident when you deploy the platform, security teams may not re-assess and configuration drift could inadvertently lead to data and intellectual property breaches. A chain is as strong as its weakest link, leading our customers to ask:
We are excited to announce the Security Analysis Tool (SAT)! SAT helps our customers answer these questions and harden their Databricks deployments by reviewing current deployments against our security best practices. It uses a checklist that prioritizes observed deviations by severity and provides links to resources that will help you resolve outstanding issues. SAT can be run as a routine scan for all workspaces in your environment to help establish continuous adherence to best practices, and health reports can be scheduled to provide continual confidence in the security of your sensitive datasets.
SAT runs in the customer's account as an automated workflow that collects deployment details via Databricks REST APIs. Scan results are persisted in Delta tables to analyze security health trends over time. SAT contains a dashboard that displays findings grouped into five security categories: Network Security, Identity & Access, Data Protection, Governance and Informational. Security teams can set up alerts that will notify them when SAT detects insecure configurations and policy deviations. It also provides additional details on individual checks that fail so that an admin can quickly pinpoint and remediate the issue. Forewarned is Forearmed!
SAT comprises of the following assets:
As shown above (Figure 2), the SAT components run in the customer workspace as denoted by the numbers in the diagram. Each component performs the following functions:
SAT setup and usage can be broken into three phases, as shown in the diagram below (Figure 3).
Detailed instructions to install the Security Analysis Tool can be found here.
The SAT Dashboard displays (Figure 4) security scan results for each workspace, sorted by severity.
The dashboard is broken into five sections and each pillar is laid out in a consistent format.
Security Analysis Tool (SAT) analyzes 37 best practices, with more on the way, and presents the insights in a dashboard. What do you do with these insights? We will use two examples to illustrate how a typical user would make use of the insights.
In the first example, the SAT scan highlights one finding that surfaces a potential risk - the red check mark in Figure 5. The Deprecated runtime versions check is red indicating that there are runtimes that are deprecated. Workloads on unsupported runtime versions may continue to run, but they receive no Databricks support or fixes. The "check id" associated with the finding can be used in the "Additional Details" section to query for more detailed information on what configuration setting or control failed a specific best practice rule. For example, the image below showcases additional details on the "Deprecated runtime versions" risk for administrators to investigate. The Remediation column in the screenshot describes the risk and remediation actions needed with links to the documentation of the Databricks runtime versions that are currently supported. The user should take the recommended remediation action in a timely manner commensurate with the severity of the finding.
In the second example, we highlight one finding that meets Databricks' best practices - the green check mark in Figure 5. The Log delivery check is green, confirming that the workspace follows Databricks security best practices. Again, the "check id" ("GOV-3") can be used in the "Additional details" section to get detailed information. No further action is required, but we recommend the user to run these checks regularly to view Databricks account workspace security and ensure continuous improvement comprehensively.
This blog post introduced you to the Security Analysis Tool for the Databricks Lakehouse Platform. You also saw how easy it is to set up SAT in a few steps and observe the security health of your Databricks account workspaces over time. We also showed you detection examples so that you can harden your Databricks deployment. We invite you to set up SAT in your Databricks deployments or ask for help from your Databricks account team. Stay tuned for more blog posts and video content on Databricks Security!
If you are curious about how Databricks approaches security, please review our Security & Trust Center. We encourage you to review Databricks Security Best Practices documents. If you have questions or suggestions about SAT, please feel free to reach us at [email protected].