AWS Databricks Security Fundamentals

Summary

Overview of essential security features to consider when managing your AWS Databricks workspace.

Description

This course provides an overview of essential security features to consider when managing your AWS Databricks workspace. You will start by identifying components of the Databricks platform architecture and deployment models. Then, you will define several features regarding network security including no public IPs, Bring Your Own VPC, VPC peering, and IP access lists. After recognizing IdP integrations, you will explore access control configurations for different workspace assets. You will then identify encryptions and permissions available for data protection, such as IdP authentication, secrets, and table access control. Lastly, you will describe security standards and configurations for compliance, including cluster policies, Bring Your Own Key, and audit logs.

Learning objectives

  • Describe components of the AWS Databricks platform architecture and deployment model.

  • Explain network security features including no public IP address, Bring Your Own VPC, VPC peering, and IP access lists.

  • Describe identity provider integrations and access control configurations for an AWS Databricks workspace.

  • Explain encryptions and permissions available for data protection, such as identity provider authentication, secrets, and table access control.

  • Describe security standards and configurations for compliance, including cluster policies, Bring Your Own Key, and audit logs.

Prerequisites

  • Beginning-level knowledge of basic AWS cloud computing terms (ex. S3, VPC, IAM, etc.)

  • Beginning-level knowledge of basic Databricks concepts (ex. workspace, clusters, notebooks, etc.)

Learning path

  • This course is part of the platform administrator learning path. 

Proof of completion

  • Upon 80% completion of this course, you will receive a proof of completion.