Skip to main content

Usage

Note

Navigate to Workspace -> Applications -> SAT -> files -> configs -> self_assessment_checks.yaml and ensure that the "enabled" values for the listed manual checks are set to either true or false, based on your environment. The SAT tool will automatically evaluate all other configurations.

Running the SAT Jobs and Pipelines

Note: These jobs can take up to 10 mins to run per workspace.

Within the Jobs and Pipelines pane, there should now be two jobs available: SAT Initializer Notebook and SAT Driver Notebook.

  • Run the SAT Initalizer Notebook first. It only needs to complete successfully once, though it can be re-run if needed.
  • Once the initializer completes, run the SAT Driver Notebook, which can be executed on a recurring basis. By default, it is scheduled to run every Monday, Wednesday, and Friday.

Optionally, run the SAT Secrets Scanner Notebook to scan workspace notebooks for exposed secrets using TruffleHog. This can be run on-demand or scheduled separately based on your security requirements. Once the Jobs and Pipelines have finished running, you should see the schema under the catalog that was set at the time of installation for SAT within the Catalog pane.

Catalog View

Accessing and Viewing the SAT Dashboards

SAT provides multiple dashboards to suit different audiences and use cases:

  1. Main SAT Dashboard - [SAT] Security Analysis Tool - Assessment Results
    A comprehensive dashboard with detailed security findings across all categories.

  2. Executive Dashboard
    A streamlined, high-level view designed for stakeholders and executives who need a quick overview of the security posture.

  3. Secret Scanner Dashboard
    A specialized dashboard that detects and reports exposed credentials (API keys, tokens, passwords) across your Databricks notebooks.

Leverage Databricks One

You can use Databricks One to access and share the SAT dashboards across your organization, making it easier to distribute security insights to stakeholders.

Dashboard Configuration

The dashboards are, by default, owned by the user profile or Service Principal used during SAT setup. If you encounter errors when running the dashboard, they are most likely due to permissions issues. To update this behavior:

  • Click on the dashboard and in the top right, click on the "Share" button.

  • Click on the cogwheel icon and select "Assign new owner". Choose the new owner of the dashboard. Ownership can also be assigned to someone with access to the SAT catalog/schema and the underlying tables.

  • Click on the "Published" icon next to the name of the dashboard towards the top of the page, and switch to the "Draft" version. Click on the "Publish" button that is next to the "Share" button.

    • Choose from one of the two credential options:
      • Embed credentials (default): All viewers run queries using the owner's credentials and compute.

        This may expose data to users who wouldn't normally have access.

      • Don't embed credentials: Each viewer must have access to the workspace and associated data to view the dashboard.

        We recommend using this option for more secure access control.

  • The dashboard can be shared with other team members by clicking the "Share" button from the "Published" mode.

  • This is what the SAT dashboard should look like:

Security Dashboard

Activating Alerts

Navigate to the Alerts from the left-hand pane under the SQL section. Click on All Alerts to view all of the alerts created by the SAT jobs.

Alerts_View

Click on one of the alerts to see the details.

Alerts_Details

Click on the "Add Schedules" button. From the "Settings" tab, you can define the schedule for the alert to be triggered.

Alerts_Settings

Next, click on the "Destinations" tab. From here, you can search for a user (email) or a destination object for the alert to be sent to. Click on "Create" to save the schedule with the selected recipient(s) for the alert.

Alerts_Destination

Updating Configuration Files (Optional)

  • Modifying security_best_practices (Optional)
    • Navigate to Workspace -> Applications -> SAT -> files -> notebooks -> Setup -> 7. update_sat_check_configuration
    • Use this utility to:
      • Enable or disable individual checks
      • Modify the Evaluation value
      • Update the Alert Configuration for each check
    • Configure widget settings on "Widget Change" for this notebook to "Do Nothing".
update_sat_check_configuration
  • Modify workspace_configs_file (Required for manual checks values)
    • Navigate to Workspace -> Applications -> SAT -> files -> notebooks -> Setup -> 8. update_workspace_configuration

    • Use this utility to:

      • Enable analysis for a specific workspace by setting analysis_enabled to True, or disable it by setting it to False.
      • Turn on a specific workspace while turning off others for a focused run.
      • Apply your configuration changes to multiple workspaces using the “Apply Setting to All Workspaces” option.
    • Configure widget settings on "Widget Change" for this notebook to "Do Nothing".

    • Update manual check values for each workspace

      • sso_enabled: Set to True if Single Sign-On (SSO) is enabled for the workspace.
      • scim_enabled: Set to True if SCIM integration is configured for user and group provisioning.
      • vpc_peering_done: Set to False if the workspace is not peered with another VPC.
      • object_storage_encrypted: Set to True if your object storage buckets are encrypted.
      • table_access_control_enabled: Set to True if Table Access Control (ACLs) is enabled to enforce user isolation on clusters.

      These settings are critical for running manual checks and ensuring accurate SAT analysis results.

update_workspace_configuration

Configuring Secret Scanning (Optional)

The SAT Secrets Scanner uses TruffleHog to detect exposed secrets in Databricks workspace notebooks. This includes detection of:

  • Databricks-specific tokens (DKEA, DAPI, DOSE)
  • AWS, Azure, and GCP cloud credentials
  • API tokens and keys (GitHub, Slack, Stripe, etc.)
  • Private keys and other sensitive credentials

Configuration

Secret scanning behavior can be configured via the trufflehog_detectors.yaml file located in the configs folder:

  • days_back: Controls how far back to search for modified notebooks
    • Set to 1 to scan notebooks modified in the last day (default)
    • Set to 7 to scan notebooks modified in the last week
    • Set to 0 to scan ALL notebooks in the workspace (no time filter)
  • page_size: Number of notebooks to process per API page (default: 50)
  • custom detectors: Add custom regex patterns to detect organization-specific secret formats

Viewing Secret Scan Results

Secret scan results are stored in the secret_scan_results table within your SAT schema and available to reviews via SAT Dashboard.