Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Azure Databricks provides comprehensive security and compliance features to protect your data, users, and workspaces. Configure authentication and access controls, secure network connections, encrypt data at rest and in transit, manage secrets and credentials, and meet regulatory compliance requirements.
Authentication and access control
Configure strong authentication and manage user access to your Azure Databricks environment and resources.
Feature | Description |
---|---|
Authentication and access control overview | Overview of authentication methods and access control mechanisms in Azure Databricks. |
Automatically provision users (JIT) | Enable just-in-time user provisioning to automatically create user accounts during SSO login. |
Monitor and manage access to personal access tokens | Track and manage personal access tokens for API access security. |
Access control overview | Implement fine-grained access control for workspace objects and resources. |
Networking
Secure network connections and control data flow between Azure Databricks and your environment.
Feature | Description |
---|---|
Configure private connectivity to Azure Databricks | Set up private connections for users accessing Azure Databricks workspaces. |
What is serverless egress control? | Understand and configure serverless egress control policies. |
Configure an Azure Storage firewall for serverless compute access | Set up Azure Storage firewall rules for serverless compute access. |
Deploy Azure Databricks in your VNet | Deploy Azure Databricks in your own virtual network for enhanced security. |
Data security and encryption
Protect your data at rest and in transit with encryption and security controls.
Feature | Description |
---|---|
Data security and encryption overview | Overview of encryption options and data protection features in Azure Databricks. |
Customer-managed keys overview | Use your own encryption keys to protect data and maintain control over encryption. |
Encrypt traffic between cluster worker nodes | Enable encryption for data in transit between cluster nodes. |
Credential redaction | Automatically redact sensitive credentials from logs and outputs. |
Secret management
Securely store and manage credentials and sensitive information.
Feature | Description |
---|---|
Keep data secure with secrets | Overview of secret management capabilities for storing credentials securely. |
Secrets in Spark conf or environment variables | Configure secrets for use in Spark configurations and environment variables. |
Secret workflow example | Step-by-step tutorial for creating and using secrets in Azure Databricks. |
Compliance
Meet regulatory requirements and implement security best practices.
Feature | Description |
---|---|
Compliance overview | Overview of compliance features and regulatory support in Azure Databricks. |
Compliance security profile overview | Security profiles for various compliance frameworks and standards. |
Enhanced security monitoring | Advanced monitoring capabilities for detecting security anomalies and threats. |
HIPAA | Configuration guidance for HIPAA compliance requirements. |