Skip to main content

Functionality

The Security Analysis Tool (SAT) is an observability utility designed to improve the security posture of Databricks deployments. It helps you identify deviations from established security best practices and monitor the security health of your Databricks workspaces.

Proactive Security Monitoring

Running SAT as a routine scan across all workspaces builds confidence — especially when onboarding sensitive datasets and workflows — by ensuring that critical security gaps are addressed proactively.

Security Functionality

How SAT Works​

SAT is typically run daily as an automated workflow within your environment. Here's what it does:

📊 Data Collection
Collects configuration details from Databricks accounts and workspaces via REST APIs.

💾 Historical Tracking
Persists results in Delta tables within your storage environment for historical tracking and trend analysis.

📈 Centralized Reporting
Displays results in a centralized Databricks SQL dashboard, categorized into five distinct sections to help stakeholders review relevant workspace settings.


Key Features​

đŸŽ¯ Prioritized Checks
Checks are organized by severity, enabling focus on high-impact security areas.

📚 Documentation Links
Each check includes links guiding users to the most up-to-date configuration best practices.

🔔 Alerting Capabilities
Notifications can be triggered on failed critical checks for immediate attention.

🔍 Detailed Explanations
Comprehensive failure explanations enable admins to pinpoint, isolate, and remediate issues quickly.


Security Categories & Severity Levels​

Comprehensive Coverage

SAT evaluates over 60 security best practices across five key categories, with more being added regularly.

Data from all configured workspaces is consolidated and presented through a single-pane SQL Dashboard. All findings are organized into the following categories:

Security Pillars:

  • đŸ›Ąī¸ Network Security
  • đŸ‘Ĩ Identity & Access
  • 🔐 Data Protection
  • âš–ī¸ Governance
  • â„šī¸ Informational

Severity Levels:

  • 🔴 High - Critical issues requiring immediate attention
  • 🟡 Medium - Important issues to address soon
  • đŸŸĸ Low - Minor issues for continuous improvement

This structured view helps stakeholders quickly assess risk areas and prioritize remediation efforts across multiple workspaces.

Security Dashboard

Dashboard Components​

The SAT dashboard is organized into intuitive sections, each designed to help you quickly assess your security posture across all workspaces.

A high-level overview of security findings, broken down by category and categorized by severity (High, Medium, Low). This provides an at-a-glance view of the overall security health of each workspace.

What you'll see:

  • Summary counts per security category
  • Color-coded severity indicators
  • Quick comparison across workspaces

Displays essential metadata about the analysis run, helping you understand the context of your security findings.

Information included:

  • ⏰ Timestamp of the Analysis
  • đŸĸ Workspace Name
  • đŸ’ŧ Service/Pricing Tier
  • 🌍 Cloud Region

Each of the five security pillars includes comprehensive information to help you understand and address security issues.

What each section includes:

  • Summary counts of deviations from security best practices
  • Detailed table of security findings, sorted by severity
  • Description of each issue
  • Links to relevant documentation for remediation guidance

This section highlights observations that are less prescriptive but still valuable for in-depth security reviews.

Purpose: These findings can be reviewed by data and security teams to ensure thresholds and configurations align with organizational policies. Not all informational findings require action, but they provide valuable context for security decision-making.

Provides deep-dive information to help pinpoint the root cause of specific findings, including the logic used to detect each issue.

Example:
If the finding is "Cluster policy not used", the dashboard will list the specific cluster workloads where no policy was applied — eliminating the guesswork and enabling simplified remediation.


Detection Example​

Let's look at how SAT identifies and presents security findings in practice.

Real-World Example

The example below shows how SAT highlights security issues with clear visual indicators and actionable remediation guidance.

Two findings shown:

🔴 Deprecated Runtime Versions
This check is marked red, indicating that some workloads are using deprecated Databricks runtime versions. While such workloads may continue to run, they will no longer receive support or security patches from Databricks. The Remediation column explains the risk and provides a link to the official documentation listing currently supported runtime versions.

✅ Log Delivery
This check is marked green, confirming that the workspace configuration aligns with Databricks' security best practices for log delivery.

Security Detection Dashboard

Drilling Down into Details​

Customers can use the Additional Details section to view specific configuration settings or controls that caused a best practice check to fail.

Example 1: Deprecated Runtime Versions
The image below shows additional context for this check, allowing administrators to quickly identify and investigate the affected workloads.

Additional Details Example 1

Example 2: Log Delivery (GOV-3)
Customers can learn more about the "Log Delivery" check by referencing its identifier, GOV-3.

Additional Details Example 2
Continuous Improvement

Regularly running SAT checks enables a comprehensive view of your Databricks account and workspace security posture. It also supports continuous improvement by helping you detect and resolve potential security risks early.


Security Configuration Comparison​

Track Your Progress

This feature enables side-by-side comparison of two SAT runs across all security dimensions, helping you identify improvements and regressions over time.

This drill-down view helps identify which best practice checks have improved or regressed, allowing security teams to take timely action.

What to look for:

✅ Improvements
Cross marks (❌) turning into check marks (✓) reflect better alignment with best practices.

âš ī¸ Regressions
Check marks (✓) turning into cross marks (❌) signal degradation and should be investigated immediately. Alerts are automatically triggered for critical regressions, notifying relevant stakeholders via email.

Example:
The diagram below highlights changes in individual checks across categories. The red rectangle illustrates an improvement in the "Enforce User Isolation" check, while also showing a regression in the "Admin Count" best practice.

Security Configuration Comparison

Getting Started​

Deployment Requirement

SAT must be installed in at least one workspace per Databricks account on AWS or GCP, and in at least one workspace per Azure subscription.

Ready to install SAT?

📖 Installation Guides:

📖 Usage Guide:

  • Usage Guide - Instructions on running workflows, viewing dashboards, and customizing security checks

Executive Dashboard​

In addition to the comprehensive SAT dashboard, an Executive Dashboard is also provided. This view consolidates key findings from the complete dashboard and presents them in an easy-to-digest format.

What leadership can do:

  • ✅ Quickly understand the overall security health of Databricks deployments
  • ✅ Identify critical security issues that require immediate attention
  • ✅ Track security improvements over time
  • ✅ Make informed decisions about security investments and priorities

This executive-level view complements the detailed technical dashboard, ensuring that both technical teams and business stakeholders have access to the security insights they need.

Executive Dashboard

Secret Scanner Dashboard​

SAT includes a Secret Scanner Dashboard that detects exposed credentials such as API keys, tokens, and passwords across your Databricks Notebooks. This powerful feature helps you quickly identify, prioritize, and remediate secret leaks to keep your Databricks workspaces secure.

Key Features:

🔍 Comprehensive Detection

  • Scans all notebooks across monitored workspaces
  • Identifies various types of secrets (API keys, tokens, passwords, custom secrets)
  • Provides unique secret counts and total occurrences

⚡ Quick Remediation

  • Detailed breakdown of secrets by notebook
  • Direct notebook path references
  • Categorized by secret type for easy prioritization

This dashboard enables security teams to maintain a proactive stance on credential management, ensuring that sensitive information is not inadvertently exposed in notebook code.

Secret Scanner Dashboard