<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi @APJESK, To address your follow-up questions about the... in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/150290#M5000</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/170854"&gt;@APJESK&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;To address your follow-up questions about the two behaviors you observed after implementing the folder ACL structure:&lt;/P&gt;
&lt;P&gt;ISSUE 1: USERS CAN STILL CREATE NOTEBOOKS IN THEIR HOME FOLDER&lt;/P&gt;
&lt;P&gt;This is by-design behavior. Every Databricks user automatically gets a personal home folder at /Users/&amp;lt;username&amp;gt; with CAN MANAGE permission. This permission is built into the platform and cannot be removed or restricted by workspace admins. There is no workspace setting, ACL configuration, or entitlement toggle that prevents a user from creating objects in their own home folder.&lt;/P&gt;
&lt;P&gt;So even though you only granted DE-grp CAN MANAGE on /Team/DatabricksEngineering and nothing else, each user in that group still has full control over their personal /Users/&amp;lt;username&amp;gt; directory.&lt;/P&gt;
&lt;P&gt;ISSUE 2: USERS CAN ATTACH HOME FOLDER NOTEBOOKS TO SHARED CLUSTERS&lt;/P&gt;
&lt;P&gt;Compute permissions and workspace folder permissions are evaluated independently. The CAN ATTACH TO permission on a cluster grants the user the ability to attach any notebook they own or can run, regardless of where that notebook lives in the workspace folder hierarchy. Since users own their home folder notebooks (they have CAN MANAGE), they can attach and execute those notebooks on any cluster where they hold CAN ATTACH TO.&lt;/P&gt;
&lt;P&gt;This is also expected behavior. There is no folder-aware restriction on compute attachment.&lt;/P&gt;
&lt;P&gt;WHAT YOU CAN DO TO STRENGTHEN GOVERNANCE&lt;/P&gt;
&lt;P&gt;While you cannot fully prevent home folder usage or add location-based compute restrictions through workspace ACLs alone, here are several complementary approaches:&lt;/P&gt;
&lt;P&gt;1. Use Unity Catalog for data-level governance&lt;/P&gt;
&lt;PRE&gt; Workspace ACLs control access to code and compute, but Unity Catalog controls access to data. Even if a user creates a notebook in their home folder and attaches to a shared cluster, they can only query tables, schemas, and catalogs they have been explicitly granted access to. This is where the real governance boundary lives. Assign table-level and schema-level permissions via groups so that only DE-grp can access engineering data assets.

 Reference: https://docs.databricks.com/en/data-governance/unity-catalog/manage-privileges/index.html&lt;/PRE&gt;
&lt;P&gt;2. Restrict cluster creation with entitlements&lt;/P&gt;
&lt;PRE&gt; Remove the "Allow unrestricted cluster creation" entitlement from the DE-grp group. This ensures they cannot spin up their own compute and must use admin-provisioned clusters. You already have this in place.&lt;/PRE&gt;
&lt;P&gt;3. Use cluster policies to enforce guardrails&lt;/P&gt;
&lt;PRE&gt; Cluster policies let you define exactly what compute configurations are allowed. You can restrict instance types, auto-termination, Spark configs, and more. Assign specific policies to specific groups so that each team only sees and uses approved compute configurations.

 Reference: https://docs.databricks.com/en/compute/policy-definition.html&lt;/PRE&gt;
&lt;P&gt;4. Limit CAN ATTACH TO permissions carefully&lt;/P&gt;
&lt;PRE&gt; Only grant CAN ATTACH TO on clusters to groups that genuinely need them. If DE-grp should only use one specific shared cluster, grant CAN ATTACH TO only on that cluster and ensure other shared clusters have no permissions granted to DE-grp. This limits the blast radius even if users create notebooks in their home folders.&lt;/PRE&gt;
&lt;P&gt;5. Use audit logs to monitor home folder activity&lt;/P&gt;
&lt;PRE&gt; You can query system.access.audit to monitor what users are doing, including notebook creation events and cluster attachment. This provides visibility into whether users are circumventing the intended folder structure.

 Reference: https://docs.databricks.com/en/admin/system-tables/audit-logs.html&lt;/PRE&gt;
&lt;P&gt;6. Consider separate workspaces for stronger isolation&lt;/P&gt;
&lt;PRE&gt; For stricter governance requirements, separate environments (dev, staging, prod) into distinct workspaces. Each workspace has its own set of folder ACLs, compute resources, and access controls. This gives you a harder boundary than folder-level ACLs within a single workspace.&lt;/PRE&gt;
&lt;P&gt;SUMMARY&lt;/P&gt;
&lt;P&gt;The home folder behavior and compute attachment behavior you observed are both by design. The workspace folder ACL model gives you governance over shared team folders, but every user retains CAN MANAGE on their personal directory. The recommended approach is to layer Unity Catalog data permissions on top of workspace ACLs so that even if a user runs code from their home folder on a shared cluster, they can only touch the data they are authorized to access.&lt;/P&gt;
&lt;P&gt;Your proposed folder structure (/Teams, /Shared, /Repos, /Admin) is a solid foundation. The key is to pair it with Unity Catalog grants, restricted compute entitlements, cluster policies, and careful CAN ATTACH TO assignments.&lt;/P&gt;
&lt;P&gt;* This reply used an agent system I built to research and draft this response based on the wide set of documentation I have available and previous memory. I personally review the draft for any obvious issues and for monitoring system reliability and update it when I detect any drift, but there is still a small chance that something is inaccurate, especially if you are experimenting with brand new features.&lt;/P&gt;
&lt;P&gt;If this answer resolves your question, could you mark it as "Accept as Solution"? That helps other users quickly find the correct fix.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Mar 2026 01:05:24 GMT</pubDate>
    <dc:creator>SteveOstrowski</dc:creator>
    <dc:date>2026-03-09T01:05:24Z</dc:date>
    <item>
      <title>Workspace Folder ACL design</title>
      <link>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/145186#M4758</link>
      <description>&lt;P&gt;How should the Databricks workspace folder architecture be designed to support cross-team collaboration, access governance, and scalability in an enterprise platform? Please suggest below or share some ideas from your experience Thanks&lt;/P&gt;&lt;P&gt;Note: I'm new to Databricks I'm not aware about the Realtime scenario, so requesting your help how workspace folder ACL id designed and practiced at enterprise level.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Each team owns and manages its workspace objects within dedicated folders, while selectively sharing approved assets with other teams using folder-level access control to ensure governance and collaboration.&lt;/P&gt;&lt;P&gt;/Teams&lt;/P&gt;&lt;P&gt;/DataEngineers&lt;/P&gt;&lt;P&gt;/DataAnalysts&lt;/P&gt;&lt;P&gt;/DataScientists&lt;/P&gt;&lt;P&gt;/Admin&lt;/P&gt;&lt;P&gt;/Shared&lt;/P&gt;&lt;P&gt;/Repos&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jan 2026 20:34:38 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/145186#M4758</guid>
      <dc:creator>APJESK</dc:creator>
      <dc:date>2026-01-25T20:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Workspace Folder ACL design</title>
      <link>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/145288#M4761</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/170854"&gt;@APJESK&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Based on some digging and real-world patterns I’ve seen, here’s how I’d think about workspace folder ACL design in an enterprise Databricks environment.&lt;/P&gt;
&lt;P class="p1"&gt;Folder architecture: the big idea&lt;/P&gt;
&lt;P class="p1"&gt;Your proposed structure is a solid starting point. The core principle you’re leaning into is the right one: give teams clear ownership of their own spaces, and enable sharing intentionally through folder-level ACLs. That maps well to how Databricks permissions actually work at scale and aligns with enterprise best practices.&lt;/P&gt;
&lt;P class="p1"&gt;Recommended folder structure&lt;/P&gt;
&lt;P class="p1"&gt;A clean, opinionated structure like this tends to hold up well over time:&lt;/P&gt;
&lt;P class="p1"&gt;/Users&lt;/P&gt;
&lt;P class="p1"&gt;/[individual user workspaces]&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;/Teams&lt;/P&gt;
&lt;P class="p1"&gt;/DataEngineering&lt;/P&gt;
&lt;P class="p1"&gt;/DataScience&lt;/P&gt;
&lt;P class="p1"&gt;/Analytics&lt;/P&gt;
&lt;P class="p1"&gt;/MLOps&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;/Shared&lt;/P&gt;
&lt;P class="p1"&gt;/CommonLibraries&lt;/P&gt;
&lt;P class="p1"&gt;/UtilityNotebooks&lt;/P&gt;
&lt;P class="p1"&gt;/Templates&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;/Production&lt;/P&gt;
&lt;P class="p1"&gt;/Jobs&lt;/P&gt;
&lt;P class="p1"&gt;/Pipelines&lt;/P&gt;
&lt;P class="p1"&gt;/Models&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;/Repos&lt;/P&gt;
&lt;P class="p1"&gt;/[git-integrated folders]&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;/Sandbox&lt;/P&gt;
&lt;P class="p1"&gt;/Experimental&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;How to think about permissions by folder&lt;/P&gt;
&lt;P class="p1"&gt;Team folders (/Teams/*)&lt;/P&gt;
&lt;P class="p1"&gt;Each team should have CAN MANAGE on its own folder. That gives them full autonomy to create, modify, and delete notebooks and other objects without needing central intervention. By default, other teams should have no access, with selective CAN VIEW or CAN RUN granted only for assets that are explicitly meant to be shared.&lt;/P&gt;
&lt;P class="p1"&gt;Shared folders&lt;/P&gt;
&lt;P class="p1"&gt;Shared spaces should be mostly read-only. Grant CAN VIEW or CAN RUN broadly so teams can consume common utilities and templates, but reserve CAN EDIT for a small set of maintainers, usually a platform or enablement team. This prevents “shared folder entropy” over time.&lt;/P&gt;
&lt;P class="p1"&gt;Production folders&lt;/P&gt;
&lt;P class="p1"&gt;Lock these down tightly. Only automation identities (service principals) and a small number of designated owners should have CAN MANAGE. Everyone else should be limited to CAN VIEW or CAN RUN, depending on whether they need visibility into outputs or the ability to trigger workloads.&lt;/P&gt;
&lt;P class="p1"&gt;Repos folders&lt;/P&gt;
&lt;P class="p1"&gt;Repos are their own special case. Folder ACLs still apply, but Git gives you an additional layer of control. Teams should own their repo folders and manage collaboration through Git workflows and branch protections rather than loose workspace permissions.&lt;/P&gt;
&lt;P class="p1"&gt;Permission inheritance (this matters a lot)&lt;/P&gt;
&lt;P class="p1"&gt;Databricks folders use inheritance. Anything you put inside a folder automatically inherits that folder’s ACLs. This is a huge win operationally because it means you set permissions once at the folder level instead of micromanaging individual notebooks.&lt;/P&gt;
&lt;P class="p1"&gt;One nuance worth calling out: if someone has access to a single object inside a folder, they can see the parent folder name, but they won’t be able to browse or access sibling objects unless they’re explicitly granted access. This behavior is often misunderstood but works in your favor for selective sharing.&lt;/P&gt;
&lt;P class="p1"&gt;Enterprise best practices that actually stick&lt;/P&gt;
&lt;P class="p1"&gt;Use groups, not users&lt;/P&gt;
&lt;P class="p1"&gt;Always assign permissions to groups. Never individual users. Groups should mirror how your org actually works, for example:&lt;/P&gt;
&lt;P class="p1"&gt;data-engineers-team&lt;/P&gt;
&lt;P class="p1"&gt;data-scientists-team&lt;/P&gt;
&lt;P class="p1"&gt;analytics-viewers&lt;/P&gt;
&lt;P class="p1"&gt;production-job-runners&lt;/P&gt;
&lt;P class="p1"&gt;This makes onboarding, offboarding, and audits dramatically easier.&lt;/P&gt;
&lt;P class="p1"&gt;Adopt a three-environment model&lt;/P&gt;
&lt;P class="p1"&gt;When possible, separate Dev, Staging, and Prod into distinct workspaces. This reduces blast radius and creates clear promotion paths. Within each workspace, keep the folder structure consistent so teams don’t have to relearn where things live.&lt;/P&gt;
&lt;P class="p1"&gt;Establish a lightweight center of excellence&lt;/P&gt;
&lt;P class="p1"&gt;A small enablement or platform group goes a long way. They don’t need to gate everything, but they should own shared patterns, folder templates, and documented ACL conventions. Typically, they’re the stewards of /Shared and /Templates.&lt;/P&gt;
&lt;P class="p1"&gt;Give people a sandbox on purpose&lt;/P&gt;
&lt;P class="p1"&gt;Exploration is healthy, but it needs guardrails. Dedicated sandbox areas or even sandbox workspaces with tighter data access and cluster policies let people experiment without risking governed environments.&lt;/P&gt;
&lt;P class="p1"&gt;Permission levels refresher&lt;/P&gt;
&lt;P class="p1"&gt;Databricks gives you five levels at the folder layer:&lt;/P&gt;
&lt;P class="p1"&gt;NO PERMISSIONS: can’t see or access anything&lt;/P&gt;
&lt;P class="p1"&gt;CAN VIEW: browse and read, clone, export&lt;/P&gt;
&lt;P class="p1"&gt;CAN RUN: execute notebooks and files&lt;/P&gt;
&lt;P class="p1"&gt;CAN EDIT: create, modify, and delete&lt;/P&gt;
&lt;P class="p1"&gt;CAN MANAGE: full control, including permissions&lt;/P&gt;
&lt;P class="p1"&gt;Be especially careful with CAN MANAGE — that’s the sharpest knife.&lt;/P&gt;
&lt;P class="p1"&gt;Scaling without chaos&lt;/P&gt;
&lt;P class="p1"&gt;Resist the urge to create a new workspace for every use case. Most enterprises are healthiest with a modest number of workspaces per account, using folders to organize teams and projects inside them.&lt;/P&gt;
&lt;P class="p1"&gt;Automate where you can. Terraform for workspace setup and permissions, SCIM for group sync from your identity provider — these pay off quickly as you scale.&lt;/P&gt;
&lt;P class="p1"&gt;Also, remember the division of responsibility: workspace ACLs govern access to code and compute, while Unity Catalog governs access to data. You want both, not one pretending to do the other’s job.&lt;/P&gt;
&lt;P class="p1"&gt;Common pitfalls to avoid&lt;/P&gt;
&lt;P class="p1"&gt;Don’t hand out CAN MANAGE casually. Don’t stash production assets in default DBFS locations that bypass Unity Catalog. And don’t create a brand-new workspace for every project if a folder would do — that just creates operational overhead.&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;How I’d implement this in practice&lt;/P&gt;
&lt;P class="p1"&gt;Start simple. For smaller orgs, one workspace per environment with a well-designed folder hierarchy is usually enough. As requirements grow — compliance, data isolation, geography — add workspaces intentionally, not reactively.&lt;/P&gt;
&lt;P class="p1"&gt;Most importantly, document your folder structure and ACL patterns somewhere visible. Consistency and clarity matter more than cleverness here.&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Cheers,&lt;/P&gt;
&lt;P class="p1"&gt;Louis&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 15:47:43 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/145288#M4761</guid>
      <dc:creator>Louis_Frolio</dc:creator>
      <dc:date>2026-01-26T15:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: Workspace Folder ACL design</title>
      <link>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/145307#M4765</link>
      <description>&lt;P&gt;Thanks for the detailed information, Iwill review and get back to you if any question meanwhile can you please on this query&amp;nbsp;&lt;/P&gt;&lt;H3&gt;&lt;STRONG&gt;Databricks Workspace ACL Enforcement – How to Prevent Users from Creating Objects Outside Team Folder and Attaching to Shared Clusters?&lt;/STRONG&gt;&lt;/H3&gt;&lt;H4&gt;&lt;STRONG&gt;Background&lt;/STRONG&gt;&lt;/H4&gt;&lt;P&gt;I am configuring workspace-level access control in Databricks to restrict Data Engineers (DE group) to operate only inside a dedicated team folder and to prevent unintended compute usage.&lt;/P&gt;&lt;P&gt;Here is the setup I implemented:&lt;/P&gt;&lt;H4&gt;&lt;STRONG&gt;Configuration Details&lt;/STRONG&gt;&lt;/H4&gt;&lt;P&gt;&lt;STRONG&gt;Identity &amp;amp; Group Setup&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Created a user and added the user to &lt;STRONG&gt;DE-grp&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Assigned &lt;STRONG&gt;Workspace User&lt;/STRONG&gt; role to DE-grp&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Applied default workspace entitlements&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Folder Permissions&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Created a workspace folder:&lt;BR /&gt;/Team/DatabricksEngineering&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Assigned &lt;STRONG&gt;CAN MANAGE&lt;/STRONG&gt; permission to &lt;STRONG&gt;DE-grp&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;No permissions were granted to DE-grp on other workspace folders&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Compute Permissions&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Admin created shared clusters&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Granted &lt;STRONG&gt;Attach To&lt;/STRONG&gt; permission to &lt;STRONG&gt;DE-grp&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;DE-grp does NOT have permission to create clusters&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;STRONG&gt;Expected Behavior&lt;/STRONG&gt;&lt;/H4&gt;&lt;P&gt;I expected the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Users in DE-grp should only create and manage notebooks inside:&lt;BR /&gt;/Team/DatabricksEngineering&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Users should NOT be able to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Create workspace objects outside this folder&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Attach notebooks to shared clusters unless explicitly allowed&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;STRONG&gt;Observed Behavior (Problem)&lt;/STRONG&gt;&lt;/H4&gt;&lt;P&gt;When logging in as a DE-grp user:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Workspace Object Scope Leak&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;User can still create notebooks inside their personal Home folder:&lt;BR /&gt;/Users/&amp;lt;username&amp;gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Since the user owns their Home folder, they automatically get &lt;STRONG&gt;CAN MANAGE&lt;/STRONG&gt; permission&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;This bypasses folder-based governance&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Compute Access Gap&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Even though the user cannot create clusters:&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;They can still attach their notebooks which they created in Home folder to existing shared clusters and execute code&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 26 Jan 2026 21:16:09 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/145307#M4765</guid>
      <dc:creator>APJESK</dc:creator>
      <dc:date>2026-01-26T21:16:09Z</dc:date>
    </item>
    <item>
      <title>Hi @APJESK, To address your follow-up questions about the...</title>
      <link>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/150290#M5000</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/170854"&gt;@APJESK&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;To address your follow-up questions about the two behaviors you observed after implementing the folder ACL structure:&lt;/P&gt;
&lt;P&gt;ISSUE 1: USERS CAN STILL CREATE NOTEBOOKS IN THEIR HOME FOLDER&lt;/P&gt;
&lt;P&gt;This is by-design behavior. Every Databricks user automatically gets a personal home folder at /Users/&amp;lt;username&amp;gt; with CAN MANAGE permission. This permission is built into the platform and cannot be removed or restricted by workspace admins. There is no workspace setting, ACL configuration, or entitlement toggle that prevents a user from creating objects in their own home folder.&lt;/P&gt;
&lt;P&gt;So even though you only granted DE-grp CAN MANAGE on /Team/DatabricksEngineering and nothing else, each user in that group still has full control over their personal /Users/&amp;lt;username&amp;gt; directory.&lt;/P&gt;
&lt;P&gt;ISSUE 2: USERS CAN ATTACH HOME FOLDER NOTEBOOKS TO SHARED CLUSTERS&lt;/P&gt;
&lt;P&gt;Compute permissions and workspace folder permissions are evaluated independently. The CAN ATTACH TO permission on a cluster grants the user the ability to attach any notebook they own or can run, regardless of where that notebook lives in the workspace folder hierarchy. Since users own their home folder notebooks (they have CAN MANAGE), they can attach and execute those notebooks on any cluster where they hold CAN ATTACH TO.&lt;/P&gt;
&lt;P&gt;This is also expected behavior. There is no folder-aware restriction on compute attachment.&lt;/P&gt;
&lt;P&gt;WHAT YOU CAN DO TO STRENGTHEN GOVERNANCE&lt;/P&gt;
&lt;P&gt;While you cannot fully prevent home folder usage or add location-based compute restrictions through workspace ACLs alone, here are several complementary approaches:&lt;/P&gt;
&lt;P&gt;1. Use Unity Catalog for data-level governance&lt;/P&gt;
&lt;PRE&gt; Workspace ACLs control access to code and compute, but Unity Catalog controls access to data. Even if a user creates a notebook in their home folder and attaches to a shared cluster, they can only query tables, schemas, and catalogs they have been explicitly granted access to. This is where the real governance boundary lives. Assign table-level and schema-level permissions via groups so that only DE-grp can access engineering data assets.

 Reference: https://docs.databricks.com/en/data-governance/unity-catalog/manage-privileges/index.html&lt;/PRE&gt;
&lt;P&gt;2. Restrict cluster creation with entitlements&lt;/P&gt;
&lt;PRE&gt; Remove the "Allow unrestricted cluster creation" entitlement from the DE-grp group. This ensures they cannot spin up their own compute and must use admin-provisioned clusters. You already have this in place.&lt;/PRE&gt;
&lt;P&gt;3. Use cluster policies to enforce guardrails&lt;/P&gt;
&lt;PRE&gt; Cluster policies let you define exactly what compute configurations are allowed. You can restrict instance types, auto-termination, Spark configs, and more. Assign specific policies to specific groups so that each team only sees and uses approved compute configurations.

 Reference: https://docs.databricks.com/en/compute/policy-definition.html&lt;/PRE&gt;
&lt;P&gt;4. Limit CAN ATTACH TO permissions carefully&lt;/P&gt;
&lt;PRE&gt; Only grant CAN ATTACH TO on clusters to groups that genuinely need them. If DE-grp should only use one specific shared cluster, grant CAN ATTACH TO only on that cluster and ensure other shared clusters have no permissions granted to DE-grp. This limits the blast radius even if users create notebooks in their home folders.&lt;/PRE&gt;
&lt;P&gt;5. Use audit logs to monitor home folder activity&lt;/P&gt;
&lt;PRE&gt; You can query system.access.audit to monitor what users are doing, including notebook creation events and cluster attachment. This provides visibility into whether users are circumventing the intended folder structure.

 Reference: https://docs.databricks.com/en/admin/system-tables/audit-logs.html&lt;/PRE&gt;
&lt;P&gt;6. Consider separate workspaces for stronger isolation&lt;/P&gt;
&lt;PRE&gt; For stricter governance requirements, separate environments (dev, staging, prod) into distinct workspaces. Each workspace has its own set of folder ACLs, compute resources, and access controls. This gives you a harder boundary than folder-level ACLs within a single workspace.&lt;/PRE&gt;
&lt;P&gt;SUMMARY&lt;/P&gt;
&lt;P&gt;The home folder behavior and compute attachment behavior you observed are both by design. The workspace folder ACL model gives you governance over shared team folders, but every user retains CAN MANAGE on their personal directory. The recommended approach is to layer Unity Catalog data permissions on top of workspace ACLs so that even if a user runs code from their home folder on a shared cluster, they can only touch the data they are authorized to access.&lt;/P&gt;
&lt;P&gt;Your proposed folder structure (/Teams, /Shared, /Repos, /Admin) is a solid foundation. The key is to pair it with Unity Catalog grants, restricted compute entitlements, cluster policies, and careful CAN ATTACH TO assignments.&lt;/P&gt;
&lt;P&gt;* This reply used an agent system I built to research and draft this response based on the wide set of documentation I have available and previous memory. I personally review the draft for any obvious issues and for monitoring system reliability and update it when I detect any drift, but there is still a small chance that something is inaccurate, especially if you are experimenting with brand new features.&lt;/P&gt;
&lt;P&gt;If this answer resolves your question, could you mark it as "Accept as Solution"? That helps other users quickly find the correct fix.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 01:05:24 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/workspace-folder-acl-design/m-p/150290#M5000</guid>
      <dc:creator>SteveOstrowski</dc:creator>
      <dc:date>2026-03-09T01:05:24Z</dc:date>
    </item>
  </channel>
</rss>

