Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
Ensure that Azure Databricks Workspaces enables customer-managed key for root DBFS encryption
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
[//]: # "
PR Title
Be aware that we use the title to create changelog automatically and therefore only allow specific prefixes
- break: to indicate a breaking change, this supersedes any of the types
- feat: to indicate new features or checks
- fix: to indicate a bugfix or handling of edge cases of existing checks
- docs: to indicate an update to our documentation
- chore: to indicate adjustments to workflow files or dependency updates
- platform: to indicate a change needed for the platform
Additionally a scope is needs to be added to the prefix, which indicates the targeted framework, in doubt choose 'general'.
#
Allowed prefixs:
ansible|argo|arm|azure|bicep|bitbucket|circleci|cloudformation|dockerfile|github|gha|gitlab|helm|kubernetes|kustomize|openapi|sast|sca|secrets|serverless|terraform|general|graph|terraform_plan|terraform_json
#
ex.
feat(terraform): add CKV_AWS_123 to ensure that VPC Endpoint Service is configured for Manual Acceptance
"
Description
Ensure that Azure Databricks Workspaces enables customer-managed key for root DBFS encryption.
Fixes # (issue)
New policies
CKV2_AZURE_48
Description
This policy ensure that the root DBFS (Databricks File System) associated with Databricks Workspace is encrypted using a customer-managed key rather than the default Azure key.
Ensure that Azure Databricks Workspaces enables customer-managed key for root DBFS encryption
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
[//]: # "
PR Title
"
Description
Ensure that Azure Databricks Workspaces enables customer-managed key for root DBFS encryption.
Fixes # (issue)
New policies
CKV2_AZURE_48
Description
This policy ensure that the root DBFS (Databricks File System) associated with Databricks Workspace is encrypted using a customer-managed key rather than the default Azure key.
https://learn.microsoft.com/en-us/azure/databricks/security/keys/customer-managed-keys-dbfs/ https://github.com/Azure/azure-quickstart-templates/blob/master/quickstarts/microsoft.databricks/databricks-workspace-with-dbfs-root-customer-managed-keys/azuredeploy.json
Fix
Checklist: