Quick Start Security for Azure Databricks
Thank you!
We got your information.
Coralogix Extension For Azure Databricks Includes:
Alerts - 4
Stay on top of Azure Databricks key performance metrics. Keep everyone in the know with integration with Slack, PagerDuty and more.
Data Exfiltration Detected
This alert indicates that potential data exfiltration or unauthorized data transfer activities have been detected within the Azure Databricks environment. Impact Data Breach: Data exfiltration may result in a data breach, compromising the confidentiality, integrity, and availability of sensitive data stored within Azure Databricks. Intellectual Property Theft: Exfiltrated data may include intellectual property, proprietary information, or trade secrets, leading to intellectual property theft and loss of competitive advantage. Regulatory Compliance Violations: Unauthorized data transfer activities may violate regulatory requirements and data protection laws, leading to legal and financial consequences for the organization. Financial Loss: Data exfiltration incidents can result in financial losses due to regulatory fines, legal fees, remediation costs, and loss of business opportunities. Mitigation Data Classification: Classify data stored and processed within Azure Databricks based on sensitivity and regulatory requirements to enforce appropriate access controls, encryption, and data protection measures. Access Controls: Implement granular access controls and permissions within Azure Databricks to restrict access to sensitive data to authorized users and roles only. Encryption: Encrypt sensitive data at rest and in transit within Azure Databricks to protect it from unauthorized access or interception during data transfer. Data Loss Prevention (DLP): Implement DLP solutions or policies to prevent unauthorized data transfer activities and enforce data protection policies within Azure Databricks. Mitre tactic: TA0040 Mitre technique: T1566
Secure Data Storage Violation Detected
This alert indicates that a violation related to secure data storage practices has been detected within the Azure Databricks environment. It suggests that data storage practices may not meet the organization's defined security standards or regulatory requirements. This violation could involve storing sensitive data in unsecured or non-compliant locations, improper encryption of data at rest, inadequate access controls, or other security lapses related to data storage. Impact Data Breach Risk: Secure data storage violations increase the risk of data breaches, exposing sensitive information to unauthorized access or disclosure. This can result in financial losses, reputational damage, and legal consequences for the organization. Loss of Trust: Data breaches or compliance violations resulting from insecure data storage practices can erode customer trust and confidence in the organization's ability to protect their data. Operational Disruption: Remediation efforts to address secure data storage violations may disrupt normal operations and cause delays in business processes. Mitigation Access Controls: Implement granular access controls and permissions to restrict access to sensitive data to authorized users and roles only. Data Masking and Anonymization: Mask or anonymize sensitive data to reduce the risk of exposure in non-production environments or when shared with third parties. Data Loss Prevention (DLP): Implement DLP solutions or policies to prevent unauthorized data storage or transmission of sensitive information and enforce data protection policies. Mitre tactic : TA0005 Mitre technique:T1078
Compromised Credentials Detected in Azure Databricks
This alert indicates that suspicious activities related to compromised credentials have been detected within the Azure Databricks environment. It could include unauthorized access attempts using compromised credentials, abnormal login patterns, or suspicious user activities indicating potential credential misuse. Impact Data Breach: Compromised credentials can lead to unauthorized access to sensitive data stored within Azure Databricks, potentially resulting in a data breach. Account Takeover: If attackers successfully obtain and misuse credentials, they may gain unauthorized access to Azure Databricks resources, compromising the integrity and confidentiality of data. Data Loss or Theft: Attackers with compromised credentials may exfiltrate sensitive data from Azure Databricks, leading to data loss or theft. Reputational Damage: A data breach resulting from compromised credentials can damage the organization's reputation and erode customer trust. Mitigation: Immediate Response: Upon detection of compromised credentials, promptly investigate and remediate the security incident to prevent further unauthorized access. Credential Reset: Immediately reset compromised credentials and implement strong, unique passwords or credentials for affected accounts. Mitre tactic: TA0005 Mitre technique: T1562
Unauthorized Data Access Detected in Azure Databricks
This alert indicates that unauthorized access to sensitive data stored within Azure Databricks has been detected. It could be triggered by activities such as unauthorized users attempting to access data, suspicious data access patterns, or data exfiltration attempts. Impact Data Breach: Unauthorized access to sensitive data can result in a data breach, compromising the confidentiality and integrity of the data stored within Azure Databricks. Loss of Trust: Data breaches can lead to a loss of trust among customers, partners, and stakeholders, damaging the reputation and credibility of the organization. Legal and Regulatory Consequences: Data breaches may lead to legal and regulatory consequences, including fines, penalties, and legal actions, especially if the breach involves personally identifiable information (PII) or sensitive data subject to compliance requirements. Financial Loss: Data breaches can result in financial losses due to remediation costs, legal fees, regulatory fines, and potential lawsuits. Mitigation Immediate Response: Upon detection of unauthorized data access, promptly investigate and mitigate the security incident to prevent further data exposure. Containment: Take immediate steps to contain the breach by revoking unauthorized access, isolating compromised systems, and limiting further data access. Data Encryption: Implement data encryption at rest and in transit to protect sensitive data stored within Azure Databricks from unauthorized access. Access Control: Review and strengthen access controls and permissions within Azure Databricks to ensure that only authorized users have access to sensitive data. Monitoring and Auditing: Enhance monitoring and auditing capabilities within Azure Databricks to detect and alert on suspicious data access activities in real-time. Mitre tactic: TA0004 Mitre technique:T1566
Integration
Learn more about Coralogix's out-of-the-box integration with Azure Databricks in our documentation.