Onboard a Databricks App to SSPM
Focus
Focus
SaaS Security

Onboard a Databricks App to SSPM

Table of Contents

Onboard a Databricks App to SSPM

Connect a Databricks instance to SSPM to detect posture risks.
Where Can I Use This?What Do I Need?
  • Strata Cloud Manager
  • SaaS Security Posture Management license
Or any of the following licenses that include the Data Security license:
  • CASB-X
  • CASB-PA
For SSPM to detect posture risks in your Databricks instance, you must onboard your Databricks instance to SSPM. Through the onboarding process, SSPM logs in to Databricks using administrator account credentials. SSPM uses this account to scan your Databricks instance for misconfigured settings. If there are misconfigured settings, SSPM suggests a remediation action based on best practices.
SSPM gets access to your Databricks instance by using Okta SSO or Microsoft Azure credentials that you provide during the onboarding process. For this reason, your organization must be using Okta or Microsoft Azure as an identity provider. The Okta or Microsoft Azure account must be configured for multi-factor authentication (MFA) using one-time passcodes.
To onboard your Databricks instance, you complete the following actions:
  1. Collect information for accessing your Databricks instance.
    To access your Databricks instance, SSPM requires the following information, which you will specify during the onboarding process.
    ItemDescription
    UsernameThe username or email address of the account that SSPM will use to access your Databricks instance. The format that you use can depend on whether SSPM will be logging in directly to your account or through an identity provider.
    Required Permissions: The user must be a Databricks administrator.
    PasswordThe password for the login account.
    If you're logging in through Okta, you must provide SSPM with the following additional information:
    ItemDescription
    Okta subdomainThe Okta subdomain for your organization. The subdomain was included in the login URL that Okta assigned to your organization.
    Okta 2FA secretA key that is used to generate one-time passcodes for MFA.
    If you're using Azure Active Directory (AD) as your identity provider, you must provide SSPM with the following additional information:
    ItemDescription
    Azure 2FA secretA key that is used to generate one-time passcodes for MFA.
    As you complete the following steps, make note of the values of the items described in the preceding tables. You will need to enter these values during onboarding to access your Databricks instance from SSPM.
    1. Identify the account that SSPM will use to access your Databricks instance. The user account must have administrator privileges in Databricks. SSPM needs this administrator access to monitor your Databricks instance.
    2. Get a secret key for MFA.
      The steps you follow to get the MFA secret key differ depending on the identity provider you're using to access the account.
      1. (For Okta log in) To access the account through Okta:
        1. Identify your Okta subdomain.
        2. Generate and copy an MFA secret key.
      2. (For Microsoft Azure log in) To access the account through Microsoft Azure:
        1. Enable third-party software OATH tokens for the administrator account.
        2. Configure the account for MFA and copy the MFA secret key.
  2. Connect SSPM to your Databricks instance.
    By adding a Databricks app in SSPM, you enable SSPM to connect to your Databricks instance.
    1. Log in to Strata Cloud Manager.
    2. Select ManageConfigurationSaaS SecurityPosture SecurityApplicationsAdd Application and click the Databricks tile.
    3. On the Posture Security tab, Add New instance.
    4. Specify how you want SSPM to connect to your Databricks instance. SSPM can Log in with Okta or Log in with Azure.
    5. When prompted, provide SSPM with the login credentials and the information it needs for MFA.
    6. Connect.