Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
Azure
Loading controls...

Control: Azure > CIS v4.0 > 03 - Analytics Services > 03.01 - Azure Databricks > 03.01.07 - Ensure that diagnostic log delivery is configured for Azure Databricks

Configures auditing against a CIS Benchmark item.

Level: 1

Azure Databricks Diagnostic Logging provides insights into system operations, user activities, and security events within a Databricks workspace. Enabling diagnostic logs helps organizations: - Detect security threats by logging access, job executions, and cluster activities. - Ensure compliance with industry regulations such as SOC 2, HIPAA, and GDPR. - Monitor operational performance and troubleshoot issues proactively.

Diagnostic logging provides visibility into security and operational activities within Databricks workspaces while maintaining an audit trail for forensic investigations, and it supports compliance with regulatory standards that require logging and monitoring.

Resource Types

This control targets the following resource types:

  • Azure > Databricks > Workspace

Policies

This control type relies on these other policies when running actions:

  • Azure > CIS v4.0 > 03 - Analytics Services > 03.01 - Azure Databricks > 03.01.07 - Ensure that diagnostic log delivery is configured for Azure Databricks
  • Azure > CIS v4.0 > 03 - Analytics Services > 03.01 - Azure Databricks > 03.01.07 - Ensure that diagnostic log delivery is configured for Azure Databricks > Attestation
  • Azure > CIS v4.0 > Maximum Attestation Duration
  • Azure > CIS v4.0
  • Azure > CIS v4.0 > 03 - Analytics Services
  • Azure > CIS v4.0 > 03 - Analytics Services > Maximum Attestation Duration

Category

  • CIS > Controls v7 > 14 Controlled Access Based on the Need to Know > 14.08 Encrypt Sensitive Information at Rest

In Your Workspace

  • Controls by Resource report
  • Controls by Control Type report

Developers

    Control Type URI
    • tmod:@turbot/azure-cisv4-0#/control/types/r030107
  • Category URI
    • tmod:@turbot/cis#/control/categories/v071408
  • GraphQL
    • query controlType(id: "tmod:@turbot/azure-cisv4-0#/control/types/r030107") { … }
    • query controls(filter: "controlTypeId:'tmod:@turbot/azure-cisv4-0#/control/types/r030107'") { … }
  • CLI
    • Get Controls
    • turbot graphql controls --filter "controlTypeId:tmod:@turbot/azure-cisv4-0#/control/types/r030107"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
50
Mods
204
Resource Types
3,575
Policies
1,941
Controls
103
Quick Actions
111
IAM