Immuta Guides

Databricks

Databricks

Protecting Sensitive Healthcare Data in Databricks

See how Immuta simplifies, scales, and audits access controls in Databricks for sensitive healthcare and life sciences data sets.

Databricks

Policy-As-Code for Databricks Tables

Learn how policy becomes code for Databricks tables using the full functionality of Immuta’s policy creation and implementation capabilities.

Databricks

Immuta + Databricks Overview

See how Immuta natively integrates with Databricks to deliver seamless data discovery, security, and monitoring, complete with attribute-based access control, dynamic data masking, and built-in purpose restrictions.

Databricks

How to Use Immuta’s Integration with Databricks Unity Catalog

Immuta is the first Data Security Platform to natively and fully integrate with Databricks Unity Catalog to secure workloads on the Databricks Data Intelligence Platform. This means you can secure your data at scale on Databricks and unlock more value from your data. See how it works in this demo.

Databricks

Databricks Data Security & Access Control with Immuta

See how Immuta integrates with Databricks to provide an easy-to-use, automated solution to scale data security for Databricks. Immuta Solutions Architect Sam Carroll walks through how to automate data discovery, access control, and governance over sensitive data across Lakehouse architectures.

Databricks

How to Implement Databricks Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams using Databricks as the primary platform for ETL and data science must have a tool that enables dynamic data masking across Databricks and any other platform in their data stack. This article will walk through how Immuta delivers on this...

Databricks

How to Enforce Policy-As-Code for Databricks Tables

Data security is the responsibility of everyone in the organization. From ETL developers to business users and data consumers, anyone who relies on data shares a responsibility to use it appropriately. However, with several different systems and, in many cases, silos, it can often be difficult to effectively put this...

Databricks

How to Enforce Databricks Row-Level Security & Cell-Level Security

Implementing row- and cell-level security by hand can be a pain, whether that means maintaining an ETL pipeline to transform raw data into “clean” data that is viewable by analysts, or maintaining a system of GRANTs on views implementing the policies for an organization. This also does not factor in...

Databricks

How to Anonymize Data with Databricks Access Control

Organizations with large workforces are increasingly analyzing employee data using cloud data platforms such as Databricks in order to optimize performance, engagement, and results. This trend necessitates a new approach to Databricks access control. In this article, we’ll walk data engineering and operations teams through how to dynamically enforce k-anonymization on a...

Ready to get started?