<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: network security for DBFS storage account in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25624#M17859</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for information I've asked Microsoft Support, there's any other security recommandations than those listed in the official documentation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/dbfs/dbfs-root" alt="https://learn.microsoft.com/en-us/azure/databricks/dbfs/dbfs-root" target="_blank"&gt;Recommendations for working with DBFS root - Azure Databricks | Microsoft Learn&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Léo&lt;/P&gt;</description>
    <pubDate>Fri, 04 Nov 2022 09:50:29 GMT</pubDate>
    <dc:creator>Osirus</dc:creator>
    <dc:date>2022-11-04T09:50:29Z</dc:date>
    <item>
      <title>network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25609#M17844</link>
      <description>&lt;P&gt;In Azure Databricks the DBFS storage account is open to all networks. Changing that to use a private endpoint or minimizing access to selected networks is not allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to add network security to this storage account? &lt;/P&gt;&lt;P&gt;Alternatively, is it possible to configure another storage account for DBFS that is owned, secured and maintained by the customer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clarification: This post is intended to be about the DBFS root&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 08:42:48 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25609#M17844</guid>
      <dc:creator>Bas1</dc:creator>
      <dc:date>2022-03-15T08:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25610#M17845</link>
      <description>&lt;P&gt;Yes it is possible. Please create own Azure data lake storage and mount it to directory of your choice.&lt;/P&gt;&lt;P&gt;In all databases, tables use location pointing to your mount.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to do it I explained step by step in that post &lt;A href="https://community.databricks.com/s/feed/0D53f00001eQGOHCA4" alt="https://community.databricks.com/s/feed/0D53f00001eQGOHCA4" target="_blank"&gt;https://community.databricks.com/s/feed/0D53f00001eQGOHCA4&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 12:33:33 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25610#M17845</guid>
      <dc:creator>Hubert-Dudek</dc:creator>
      <dc:date>2022-03-15T12:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25611#M17846</link>
      <description>&lt;P&gt;Thank you very much, I am going to look into that! &lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 12:43:20 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25611#M17846</guid>
      <dc:creator>Bas1</dc:creator>
      <dc:date>2022-03-15T12:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25612#M17847</link>
      <description>&lt;P&gt;Is that the way to go to replace the default DBFS-root?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 15:04:38 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25612#M17847</guid>
      <dc:creator>Bas1</dc:creator>
      <dc:date>2022-03-15T15:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25613#M17848</link>
      <description>&lt;P&gt;No it is additionall mount (new directory for your data)​&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 15:06:40 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25613#M17848</guid>
      <dc:creator>Hubert-Dudek</dc:creator>
      <dc:date>2022-03-15T15:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25614#M17849</link>
      <description>&lt;P&gt;I should rephrase the question a little to make clear what our goal is: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there a way to add network security to the dbfs-root that is deployed with Databricks in Azure? It feels somewhat uneasy having a storage account that may hold credentials, uploaded data or notebook results which is open to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to add a layer of network protection on top of what is already there?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 16:47:10 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25614#M17849</guid>
      <dc:creator>Bas1</dc:creator>
      <dc:date>2022-03-15T16:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25615#M17850</link>
      <description>&lt;P&gt;Hello @Bas Toeter​&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could enable double encryption on DBFS root storage account&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/databricks/security/keys/double-encryption" target="test_blank"&gt;https://docs.microsoft.com/en-us/azure/databricks/security/keys/double-encryption&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are Deny assignments that prevent any changes to the storage account.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 15:57:06 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25615#M17850</guid>
      <dc:creator>User16764241763</dc:creator>
      <dc:date>2022-03-16T15:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25616#M17851</link>
      <description>&lt;P&gt;Hi @Arvind Ravish​&amp;nbsp;,  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I understand double encryption will protect us when one of the keys is lost or when the entire algoritme is compromised. I don't think it would help when there is unauthorised acces to the storage account.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As it is not so simple to introduce a private endpoint for the DBFS root, I should probably take one step back and assess the impact of a compromised DBFS root first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A compromised DBFS root also leads to a compromised Metastore, not sure how bad that would be, but it seems to contain mostly metadata. In our case losing that would probably not hurt much. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The documentation states:  "The DBFS root also contains data—including &lt;B&gt;mount point metadata and credentials &lt;/B&gt;and certain types of logs—that is not visible and cannot be directly accessed."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What data is in these mounts that the DBFS root holds the credentials for?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 15:09:46 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25616#M17851</guid>
      <dc:creator>Bas1</dc:creator>
      <dc:date>2022-03-17T15:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25617#M17852</link>
      <description>&lt;P&gt;@Bas Toeter​&amp;nbsp;, at least regarding metastore it is in Mysql RDS and you can backup metastore and than use own Azure SQL with private link and have full control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding DBFS root I am trying not to use it and use own datapoints. Log redirection and clean there logs regularly. Root dbfs is managed by databricks so I trust it is secure but I prefer not to use it because of lack of full control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that there will be significant changes in security (Roadmap) which for sure include enhanced encryption and private links.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding credentials you can replace it with Azure key vault with private link.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 15:56:50 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25617#M17852</guid>
      <dc:creator>Hubert-Dudek</dc:creator>
      <dc:date>2022-03-17T15:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25619#M17854</link>
      <description>&lt;P&gt;I have the same question, it would be helpful to know if there is any way to secure the DBFS Root Storage Account by restricting access from specific VNets rather than having it open from all networks (in Azure this is regarding the Storage Account starting with dbstorage*******). &lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 12:41:00 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25619#M17854</guid>
      <dc:creator>affine</dc:creator>
      <dc:date>2022-05-20T12:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25620#M17855</link>
      <description>&lt;P&gt;In the coming weeks, there will be changes, so it will be possible to have everything in databricks in the private network using private IPs.&lt;/P&gt;</description>
      <pubDate>Sat, 21 May 2022 10:07:05 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25620#M17855</guid>
      <dc:creator>Hubert-Dudek</dc:creator>
      <dc:date>2022-05-21T10:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25621#M17856</link>
      <description>&lt;P&gt;Hello Hubert, I've got the same use case. My central IT is currently deploying Azure Policies over Azure subscriptions to ensure that all Storage Account have public access restricted and Access Key disabled. However, because of the Databricks backend Storage Accounts which cannot be customize at creation the policy is not fulfil..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You referred to upcoming changes, are they now available and might them help me to solve this situation ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Léo&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 15:46:34 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25621#M17856</guid>
      <dc:creator>Osirus</dc:creator>
      <dc:date>2022-10-06T15:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25622#M17857</link>
      <description>&lt;P&gt;Hello @Hubert Dudek​,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any insights on this matter ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Léo&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 11:48:47 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25622#M17857</guid>
      <dc:creator>Osirus</dc:creator>
      <dc:date>2022-10-13T11:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25623#M17858</link>
      <description>&lt;P&gt;Hi, maybe the easiest is to ask Azure databricks support/sales representative for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the new private link feature, here is detailed documentation &lt;A href="https://learn.microsoft.com/en-us/azure/databricks/administration-guide/cloud-configurations/azure/private-link" target="test_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/administration-guide/cloud-configurations/azure/private-link&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 15:09:27 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25623#M17858</guid>
      <dc:creator>Hubert-Dudek</dc:creator>
      <dc:date>2022-10-13T15:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25624#M17859</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for information I've asked Microsoft Support, there's any other security recommandations than those listed in the official documentation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/dbfs/dbfs-root" alt="https://learn.microsoft.com/en-us/azure/databricks/dbfs/dbfs-root" target="_blank"&gt;Recommendations for working with DBFS root - Azure Databricks | Microsoft Learn&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Léo&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 09:50:29 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/25624#M17859</guid>
      <dc:creator>Osirus</dc:creator>
      <dc:date>2022-11-04T09:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/58328#M31104</link>
      <description>&lt;P&gt;How can we secure the storage account in the managed resource group which holds the DBFS with restricted network access, since access from all networks is blocked by our Azure storage account policy?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 13:13:47 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/58328#M31104</guid>
      <dc:creator>Odee79</dc:creator>
      <dc:date>2024-01-24T13:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: network security for DBFS storage account</title>
      <link>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/62204#M31920</link>
      <description>&lt;P&gt;Hi, is this currenly possible?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 10:08:12 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/network-security-for-dbfs-storage-account/m-p/62204#M31920</guid>
      <dc:creator>vpuntanen</dc:creator>
      <dc:date>2024-02-28T10:08:12Z</dc:date>
    </item>
  </channel>
</rss>

