Benchmark: 3.1 Azure Databricks
Overview
This section covers security recommendations for Azure Databricks.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 3.1 Azure Databricks.
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.cis_v400_3_1
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.cis_v400_3_1 --share
Controls
- 3.1.1 Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet)
- 3.1.2 Ensure that network security groups are configured for Databricks subnets
- 3.1.3 Ensure that traffic is encrypted between cluster worker nodes
- 3.1.4 Ensure that users and groups are synced from Microsoft Entra ID to Azure Databricks
- 3.1.5 Ensure that Unity Catalog is configured for Azure Databricks
- 3.1.6 Ensure that usage is restricted and expiry is enforced for Databricks personal access tokens
- 3.1.7 Ensure that diagnostic log delivery is configured for Azure Databricks
- 3.1.8 Ensure that data at rest and in transit is encrypted in Azure Databricks using customer managed keys (CMK)