Databricks provides two flavors of compute
Serverless compute
node's used by a Databricks cluster is backed by GCE instances aka nodesNodes have Private IP addresses only (classic and serverless compute)
graph TB
subgraph "Security Layers"
NET[Network Security]
COMP[Compute Security]
DATA[Data Security]
ACCESS[Access Control]
end
subgraph "Network Security Controls"
VPC_SC[VPC Service Controls<br/>Prevent Data Exfiltration]
FW[VPC Firewall Rules<br/>Restrict Traffic]
PGA[Private Google Access<br/>No Public Internet]
NPIP[No Public IPs<br/>Private Nodes Only]
end
subgraph "Compute Isolation"
NS1[Cluster Namespace 1<br/>Logical Isolation]
NS2[Cluster Namespace 2<br/>Logical Isolation]
NS3[Cluster Namespace 3<br/>Logical Isolation]
CP_COMM[Communication via<br/>Control Plane Only]
end
subgraph "Data Protection"
CMEK[Customer Managed<br/>Encryption Keys]
UC[Unity Catalog<br/>Fine-grained Access]
AUDIT[Audit Logging<br/>All Access Tracked]
end
NET --> VPC_SC
NET --> FW
NET --> PGA
NET --> NPIP
COMP --> NS1
COMP --> NS2
COMP --> NS3
NS1 --> CP_COMM
NS2 --> CP_COMM
NS3 --> CP_COMM
DATA --> CMEK
DATA --> UC
DATA --> AUDIT
style VPC_SC fill:#E53935
style FW fill:#E53935
style NS1 fill:#1E88E5
style NS2 fill:#1E88E5
style NS3 fill:#1E88E5
style CMEK fill:#8E24AA
style UC fill:#8E24AA
graph LR
subgraph "Phase 1: Network Foundation"
P1_1[Customer Managed VPC]
P1_2[Private IPs Only<br/>No Public Access]
P1_3[Private Google Access]
end
subgraph "Phase 2: Traffic Control"
P2_1[VPC Firewall Rules<br/>Restrict Egress/Ingress]
P2_2[Cloud NAT<br/>Controlled Egress]
P2_3[DNS Configuration<br/>Private/Restricted APIs]
end
subgraph "Phase 3: Advanced Security"
P3_1[VPC Service Controls<br/>Data Exfiltration Prevention]
P3_2[Customer Managed Keys<br/>CMEK Encryption]
P3_3[Private Service Connect<br/>PSC Endpoints]
end
subgraph "Phase 4: Governance"
P4_1[Unity Catalog<br/>Fine-grained Permissions]
P4_2[Audit Logging<br/>Continuous Monitoring]
P4_3[IP Access Lists<br/>Restrict Workspace Access]
end
P1_1 --> P1_2 --> P1_3
P1_3 --> P2_1
P2_1 --> P2_2 --> P2_3
P2_3 --> P3_1
P3_1 --> P3_2 --> P3_3
P3_3 --> P4_1
P4_1 --> P4_2 --> P4_3
style P1_1 fill:#4285F4
style P1_2 fill:#4285F4
style P1_3 fill:#4285F4
style P2_1 fill:#FF6F00
style P2_2 fill:#FF6F00
style P2_3 fill:#FF6F00
style P3_1 fill:#E53935
style P3_2 fill:#E53935
style P3_3 fill:#E53935
style P4_1 fill:#8E24AA
style P4_2 fill:#8E24AA
style P4_3 fill:#8E24AA
sequenceDiagram
participant C1 as Cluster 1<br/>(Namespace A)
participant CP as Control Plane<br/>(Communication Hub)
participant C2 as Cluster 2<br/>(Namespace B)
participant C3 as Cluster 3<br/>(Namespace C)
Note over C1,C3: Direct cluster communication BLOCKED
C1->>CP: Request to communicate
CP->>CP: Validate permissions<br/>& namespace isolation
alt Authorized Communication
CP->>C2: Forward request<br/>(via Control Plane)
C2->>CP: Response
CP->>C1: Forward response
else Unauthorized
CP->>C1: Access Denied<br/>(Namespace isolation enforced)
end
Note over C1,C3: Security Benefits:<br/>- Logical isolation<br/>- No direct network access<br/>- Centralized authorization<br/>- Audit trail maintained
C3->>C1: Direct connection attempt
C1-XC3: Connection refused<br/>(Network isolation)