Control: Azure > CIS v5.0 > 2 - Analytics Services > 2.01 - Azure Databricks > 2.01.03 - Ensure that traffic is encrypted between cluster worker nodes
Configures auditing against a CIS Benchmark item.
Level: 2
By default, data exchanged between worker nodes in an Azure Databricks cluster is not encrypted. To ensure that data is encrypted at all times, whether at rest or in transit, you can create an initialization script that configures your clusters to encrypt traffic between worker nodes using AES 256-bit encryption over a TLS 1.3 connection.
- Protects sensitive data during transit between cluster nodes, mitigating risks of data interception or unauthorized access. - Aligns with organizational security policies and compliance requirements that mandate encryption of data in transit. - Enhances overall security posture by ensuring that all inter-node communications within the cluster are encrypted.
Resource Types
This control targets the following resource types:
Policies
This control type relies on these other policies when running actions:
- Azure > CIS v5.0 > 2 - Analytics Services > 2.01 - Azure Databricks > 2.01.03 - Ensure that traffic is encrypted between cluster worker nodes
- Azure > CIS v5.0 > 2 - Analytics Services > 2.01 - Azure Databricks > 2.01.03 - Ensure that traffic is encrypted between cluster worker nodes > Attestation
- Azure > CIS v5.0 > Maximum Attestation Duration
- Azure > CIS v5.0
- Azure > CIS v5.0 > 2 - Analytics Services
- Azure > CIS v5.0 > 2 - Analytics Services > Maximum Attestation Duration
Category
In Your Workspace
Developers
- tmod:@turbot/azure-cisv5-0#/control/types/r020103
- tmod:@turbot/cis#/control/categories/v071404
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/azure-cisv5-0#/control/types/r020103"
Get Controls