Policy: Azure > CIS v5.0 > 2 - Analytics Services > 2.01 - Azure Databricks > 2.01.08 - Ensure critical data in Azure Databricks is encrypted with customer-managed keys (CMK)
Configures auditing against a CIS Benchmark item.
Level: 2
Azure Databricks supports encryption of data at rest using Customer Managed Keys (CMK). This includes encryption of managed services data (notebooks, secrets) and managed disk encryption for cluster VMs.
Using Customer Managed Keys provides: - Full control over encryption keys - Ability to revoke access by revoking key access - Compliance with regulatory requirements for key management - Integration with Azure Key Vault for key lifecycle management
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Setting this policy configures this control:
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/azure-cisv5-0#/policy/types/r020108
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv5-0#/policy/types/r020108"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv5-0#/policy/types/r020108"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI