Skip to main content

General Dashboard

The Main SAT Dashboard ([SAT] Security Analysis Tool - Assessment Results) is a comprehensive dashboard with detailed security findings across all categories. It provides a centralized view of your Databricks security posture, enabling you to quickly identify, prioritize, and remediate security issues.

Security Dashboard

Overview

The SAT dashboard is organized into intuitive sections, each designed to help you quickly assess your security posture across all workspaces. It displays results from SAT's automated security checks, categorized by severity and security pillar.

Databricks One Integration

You can use Databricks One to access and share the SAT dashboards across your organization, making it easier to distribute security insights to stakeholders.

Dashboard Components

Workspace Security Summary

A high-level overview of security findings, broken down by category and categorized by severity (High, Medium, Low). This provides an at-a-glance view of the overall security health of each workspace.

Displayed Information:

  • Summary counts per security category
  • Color-coded severity indicators
  • Quick comparison across workspaces

Workspace Stats

Displays essential metadata about the analysis run, helping you understand the context of your security findings.

Information included:

  • ⏰ Timestamp of the Analysis
  • 🏢 Workspace Name
  • 💼 Service/Pricing Tier
  • 🌍 Cloud Region

Individual Security Category Details

Each of the five security pillars includes comprehensive information to help you understand and address security issues.

What each section includes:

  • Summary counts of deviations from security best practices
  • Detailed table of security findings, sorted by severity
  • Description of each issue
  • Links to relevant documentation for remediation guidance

Informational Section

This section highlights observations that are less prescriptive but still valuable for in-depth security reviews.

Purpose: These findings can be reviewed by data and security teams to ensure thresholds and configurations align with organizational policies. Not all informational findings require action, but they provide valuable context for security decision-making.

Additional Finding Details

Provides deep-dive information to help pinpoint the root cause of specific findings, including the logic used to detect each issue.

Example:
If the finding is "Cluster policy not used", the dashboard will list the specific cluster workloads where no policy was applied — eliminating the guesswork and enabling simplified remediation.

Security Categories & Severity Levels

Comprehensive Security Coverage

SAT evaluates over 60 security best practices across five key categories, with more being added regularly.

Security Pillars

  • 🛡️ Network Security - Network policies, VPC configurations, and network isolation
  • 👥 Identity & Access - User management, group memberships, and access controls
  • 🔐 Data Protection - Encryption, data classification, and data governance
  • ⚖️ Governance - Compliance, audit logging, and policy enforcement
  • ℹ️ Informational - Observations and recommendations for continuous improvement

Severity Levels

  • 🔴 High - Critical issues requiring immediate attention
  • 🟡 Medium - Important issues to address soon
  • 🟢 Low - Minor issues for continuous improvement

This structured view helps stakeholders quickly assess risk areas and prioritize remediation efforts across multiple workspaces.

Detection Examples

Let's look at how SAT identifies and presents security findings in practice.

Example

The example below shows how SAT highlights security issues with clear visual indicators and actionable remediation guidance.

Example Finding 1: Deprecated Runtime Versions

🔴 Deprecated Runtime Versions
This check is marked red, indicating that some workloads are using deprecated Databricks runtime versions. While such workloads may continue to run, they will no longer receive support or security patches from Databricks. The Remediation column explains the risk and provides a link to the official documentation listing currently supported runtime versions.

Security Detection Dashboard

Example Finding 2: Log Delivery

✅ Log Delivery
This check is marked green, confirming that the workspace configuration aligns with Databricks' security best practices for log delivery.

Drilling Down into Details

Customers can use the Additional Details section to view specific configuration settings or controls that caused a best practice check to fail.

Example 1: Deprecated Runtime Versions
The image below shows additional context for this check, allowing administrators to quickly identify and investigate the affected workloads.

Additional Details Example 1

Example 2: Log Delivery (GOV-3)
Customers can learn more about the "Log Delivery" check by referencing its identifier, GOV-3.

Additional Details Example 2
Continuous Improvement

Regularly running SAT checks enables a comprehensive view of your Databricks account and workspace security posture. It also supports continuous improvement by helping you detect and resolve potential security risks early.

Security Configuration Comparison

Track Your Progress

This feature enables side-by-side comparison of two SAT runs across all security dimensions, helping you identify improvements and regressions over time.

This drill-down view helps identify which best practice checks have improved or regressed, allowing security teams to take timely action.

What to look for:

✅ Improvements
Cross marks (❌) turning into check marks (✓) reflect better alignment with best practices.

⚠️ Regressions
Check marks (✓) turning into cross marks (❌) signal degradation and should be investigated immediately. Alerts are automatically triggered for critical regressions, notifying relevant stakeholders via email.

Example:
The diagram below highlights changes in individual checks across categories. The red rectangle illustrates an improvement in the "Enforce User Isolation" check, while also showing a regression in the "Admin Count" best practice.

Security Configuration Comparison

Dashboard Configuration

The dashboards are, by default, owned by the user profile or Service Principal used during SAT setup.

If you encounter errors when running the dashboard, they are most likely due to permissions issues. To update this behavior:

  1. Click on the dashboard and in the top right, click on the "Share" button.
  2. Click on the cogwheel icon and select "Assign new owner". Choose the new owner of the dashboard. Ownership can also be assigned to someone with access to the SAT catalog/schema and the underlying tables.
  3. Click on the "Published" icon next to the name of the dashboard towards the top of the page, and switch to the "Draft" version. Click on the "Publish" button that is next to the "Share" button.
    • Choose from one of the two credential options:
      • Embed credentials (default): All viewers run queries using the owner's credentials and compute.

        This may expose data to users who wouldn't normally have access.

      • Don't embed credentials: Each viewer must have access to the workspace and associated data to view the dashboard.

        We recommend using this option for more secure access control.

  4. The dashboard can be shared with other team members by clicking the "Share" button from the "Published" mode.

Key Features

The General Dashboard provides:

  • 🎯 Prioritized Checks - Checks are organized by severity, enabling focus on high-impact security areas
  • 📚 Documentation Links - Each check includes links guiding users to the most up-to-date configuration best practices
  • 🔔 Alerting Capabilities - Notifications can be triggered on failed critical checks for immediate attention
  • 🔍 Detailed Explanations - Comprehensive failure explanations enable admins to pinpoint, isolate, and remediate issues quickly

Learn More