Security, Privacy, Compliance Flashcards
How does Azure Databricks ensure security?
Azure Databricks ensures security through features like Azure Active Directory integration for authentication, role-based access control, encryption of data at rest and in transit, network security configurations, and integration with Azure Key Vault for secure key management.
Name a compliance standard supported by Azure Databricks.
GDPR (General Data Protection Regulation). Azure Databricks assists in compliance with GDPR and other standards by providing features like audit logs, encryption, and data governance tools.
What types of analytics can be performed using Azure Databricks?
Azure Databricks supports various analytics including batch and streaming data processing, machine learning, AI-driven analytics, exploratory data analysis, and collaborative data science.
How can you control access to resources in Azure Databricks?
Access to resources in Azure Databricks can be controlled through Azure Active Directory-based authentication, role-based access control (RBAC), and network security configurations using virtual network peering and security groups.
Explain the integration of Azure Databricks with other Azure services.
Azure Databricks integrates seamlessly with various Azure services such as Azure Blob Storage, Azure SQL Data Warehouse, Azure Data Lake Storage, Azure Synapse Analytics, and Azure Machine Learning, enabling a comprehensive data processing and analytics ecosystem.
What is Azure Key Vault?
Azure Key Vault is a cloud service provided by Microsoft Azure that enables secure storage and management of keys, secrets, certificates, and sensitive information.
What types of sensitive data can be stored in Azure Key Vault?
Azure Key Vault can store cryptographic keys, secrets (such as passwords, connection strings, API keys), and digital certificates securely.
What are the key features of Azure Key Vault?
Key features include:
Secure storage and management of sensitive data
Centralized key management
Integration with Azure services and applications
Hardware Security Module (HSM) integration for enhanced security
Access control and permissions management
How does Azure Key Vault enhance security for applications and services?
Azure Key Vault helps in protecting sensitive information by providing a secure repository and allowing controlled access, reducing the risk of exposure to unauthorized users.
What types of applications or services can benefit from Azure Key Vault?
Any cloud-based application or service that requires secure storage and management of keys, secrets, or certificates can benefit from Azure Key Vault, including web applications, databases, virtual machines, and more.
How does Azure Key Vault integrate with Azure services?
Azure Key Vault integrates seamlessly with various Azure services, enabling applications and services to securely access keys, secrets, and certificates without storing them directly in code or configurations.
What is ADLS Gen2?
Azure Data Lake Storage Gen2 (ADLS Gen2) is a cloud-based storage service in Microsoft Azure designed for big data analytics, capable of handling large volumes of structured and unstructured data.
What are the primary features of ADLS Gen2?
Key features include:
Hierarchical namespace for organizing and managing data efficiently
Scalability to handle petabytes of data
Integration with Azure Blob Storage, providing features of both Blob Storage and Hadoop Distributed File System (HDFS)
Advanced security and compliance capabilities
Support for analytics and big data processing tools like Azure Databricks, HDInsight, and Azure Synapse Analytics (formerly Azure SQL Data Warehouse)
How does ADLS Gen2 differ from its predecessor, ADLS Gen1?
ADLS Gen2 combines the capabilities of Azure Blob Storage with the features of the first-generation Azure Data Lake Storage, offering a hierarchical namespace and improved performance, scalability, and security.
What is the significance of the hierarchical namespace in ADLS Gen2?
The hierarchical namespace organizes data into a file system-like structure, enhancing performance and efficiency for data management, access control, and analytics processing.