databricks

Objectives

Databricks provides two flavors of compute

Workspace Security Architecture

graph TB
    subgraph "Security Layers"
        NET[Network Security]
        COMP[Compute Security]
        DATA[Data Security]
        ACCESS[Access Control]
    end

    subgraph "Network Security Controls"
        VPC_SC[VPC Service Controls<br/>Prevent Data Exfiltration]
        FW[VPC Firewall Rules<br/>Restrict Traffic]
        PGA[Private Google Access<br/>No Public Internet]
        NPIP[No Public IPs<br/>Private Nodes Only]
    end

    subgraph "Compute Isolation"
        NS1[Cluster Namespace 1<br/>Logical Isolation]
        NS2[Cluster Namespace 2<br/>Logical Isolation]
        NS3[Cluster Namespace 3<br/>Logical Isolation]
        CP_COMM[Communication via<br/>Control Plane Only]
    end

    subgraph "Data Protection"
        CMEK[Customer Managed<br/>Encryption Keys]
        UC[Unity Catalog<br/>Fine-grained Access]
        AUDIT[Audit Logging<br/>All Access Tracked]
    end

    NET --> VPC_SC
    NET --> FW
    NET --> PGA
    NET --> NPIP

    COMP --> NS1
    COMP --> NS2
    COMP --> NS3
    NS1 --> CP_COMM
    NS2 --> CP_COMM
    NS3 --> CP_COMM

    DATA --> CMEK
    DATA --> UC
    DATA --> AUDIT

    style VPC_SC fill:#E53935
    style FW fill:#E53935
    style NS1 fill:#1E88E5
    style NS2 fill:#1E88E5
    style NS3 fill:#1E88E5
    style CMEK fill:#8E24AA
    style UC fill:#8E24AA

Optionally

Security Implementation Roadmap

graph LR
    subgraph "Phase 1: Network Foundation"
        P1_1[Customer Managed VPC]
        P1_2[Private IPs Only<br/>No Public Access]
        P1_3[Private Google Access]
    end

    subgraph "Phase 2: Traffic Control"
        P2_1[VPC Firewall Rules<br/>Restrict Egress/Ingress]
        P2_2[Cloud NAT<br/>Controlled Egress]
        P2_3[DNS Configuration<br/>Private/Restricted APIs]
    end

    subgraph "Phase 3: Advanced Security"
        P3_1[VPC Service Controls<br/>Data Exfiltration Prevention]
        P3_2[Customer Managed Keys<br/>CMEK Encryption]
        P3_3[Private Service Connect<br/>PSC Endpoints]
    end

    subgraph "Phase 4: Governance"
        P4_1[Unity Catalog<br/>Fine-grained Permissions]
        P4_2[Audit Logging<br/>Continuous Monitoring]
        P4_3[IP Access Lists<br/>Restrict Workspace Access]
    end

    P1_1 --> P1_2 --> P1_3
    P1_3 --> P2_1
    P2_1 --> P2_2 --> P2_3
    P2_3 --> P3_1
    P3_1 --> P3_2 --> P3_3
    P3_3 --> P4_1
    P4_1 --> P4_2 --> P4_3

    style P1_1 fill:#4285F4
    style P1_2 fill:#4285F4
    style P1_3 fill:#4285F4
    style P2_1 fill:#FF6F00
    style P2_2 fill:#FF6F00
    style P2_3 fill:#FF6F00
    style P3_1 fill:#E53935
    style P3_2 fill:#E53935
    style P3_3 fill:#E53935
    style P4_1 fill:#8E24AA
    style P4_2 fill:#8E24AA
    style P4_3 fill:#8E24AA

Cluster-to-Cluster Isolation

sequenceDiagram
    participant C1 as Cluster 1<br/>(Namespace A)
    participant CP as Control Plane<br/>(Communication Hub)
    participant C2 as Cluster 2<br/>(Namespace B)
    participant C3 as Cluster 3<br/>(Namespace C)

    Note over C1,C3: Direct cluster communication BLOCKED

    C1->>CP: Request to communicate
    CP->>CP: Validate permissions<br/>& namespace isolation

    alt Authorized Communication
        CP->>C2: Forward request<br/>(via Control Plane)
        C2->>CP: Response
        CP->>C1: Forward response
    else Unauthorized
        CP->>C1: Access Denied<br/>(Namespace isolation enforced)
    end

    Note over C1,C3: Security Benefits:<br/>- Logical isolation<br/>- No direct network access<br/>- Centralized authorization<br/>- Audit trail maintained

    C3->>C1: Direct connection attempt
    C1-XC3: Connection refused<br/>(Network isolation)