Using Enhanced Security Monitoring to Detect & Alert for Suspicious Activity on Your Databricks Clusters
Databricks on AWS relies on custom machine images, AMIs, deployed as EC2 instances in the customer’s account. These EC2 instances provide the elastic...