Enterprise Security - Databricks

Enterprise Security

Effortless native security that unlocks your data’s potential

Ensure end-to-end security that protects your data while providing private, isolated, compliant workspaces for your data engineers, business analysts, and data scientists

  • *

Benefits for Security Teams

RETAIN CONTROL OVER YOUR DATA

Using Software-as-a-Service(SaaS) often means losing control over your sensitive data. With Databricks, keep your data in your cloud account and encrypt it with your keys. All access to data is granted through a system of least privileged access based on individual user identity.

 

MINIMIZE ATTACK SURFACE

Create compliant and private analytics workspaces for your platform users within isolated networks (VNETs / VPCs) with no public IPs and IP access lists to limit attack surface.
 

INTEGRATE AND AUTOMATE YOUR SECURITY POLICIES

Use your existing corporate directory (AD, Okta) to decide who gets to access what data using cloud native controls.

Features

 

SECURE DATA

Your Data, in Your Account: Leave your data and infrastructure in your cloud account with different data and control planes. The Databricks control plane runs and controls clusters within an isolated VNET/VPC inside your cloud account (data plane) using your compute to process the data in your cloud storage. Learn More About Platform Security
 

Data-Centric Security: Use your existing identity provider to define access policies for data in your data lake as well as data in your tables using your metastore.
 

Encryption with Root Keys: You have full control over your keys used to encrypt your data as well as the metadata. Key hierarchy enables the use of different keys for different notebooks. Revoking key revokes data access
 

Encrypted Clusters: Ensure that data stored anywhere by Databricks clusters is always encrypted without having to worry about key and cert management.
 

Identity Federation: Federate identity between your identity provider, access management and Databricks to ensure seamless and secure access to data in Azure Data Lake and AWS S3.
 

OPERATIONAL SCALE

Single Sign-On (SSO): Use cloud-native Identity Providers that support SAML protocol to authenticate your users.
 
SCIM: Native support for System for Cross-domain Identity Management (SCIM) allows customers to automatically on-board and off-board users by syncing user management with your SSO identity provider such as Azure Active Directory, Okta, Ping Identity etc.
 

ISOLATED ENVIRONMENTS

Bring your own VPC/VNET: Create your own custom VPC/VNET with your custom network configurations to comply with internal cloud and data governance policies as well as adhere to external regulations.
 

Access Control Lists / IP Whitelisting: Use strict IP access lists to specify what connections can or cannot be made in and out of your workspace thus minimizing the attack surface.
 

Code Isolation: Different users can run data analytics on the same cluster while ensuring that each user has access only to data they are authorized to access.
 

Private Network between Data and Control Planes: All communications between control and data planes happen through the cloud providers private network and are not sent over the public network.
 

COMPLIANCE AND CERTIFICATIONS

Compliance: Databricks has put in place a number of controls to meet the unique compliance needs of highly regulated industries. Learn More
 

*Availability of certification differs based on the cloud service provider used. Please check with support ensure availability on your deployment