Loading...

Confidential VM option for Azure Databricks Preview

Confidential VM option for Azure Databricks Preview

Azure Databricks & Azure Confidential Computing are excited to announce the Public Preview of Azure Databricks support for Azure Confidential Computing options for data plane.

 

Feature Overview  

Azure Databricks now supports using Confidential computing VM options while creating clusters. This new feature emphasizes our commitment to cloud security. With this new feature, now you can run your Azure Databricks workload securely & confidentially on Azure. Azure confidential computing generally attracts customers in highly regulated industries & regions but is equally applicable to any business that is looking to run their analytics, machine learning and other workloads in a privacy preserving way. 

 

Security Benefits

 

Saketms_0-1684802768191.png

Azure already encrypts data at rest and in transit, and confidential computing helps protect data in use, including the cryptographic keys.  Azure confidential computing helps customers prevent unauthorized access to data in use, including from the cloud operator, by processing data in a hardware-based and attested Trusted Execution Environment (TEE). 

 

ACC Technology & Offerings

 

Please start here to understand the technology behind Azure Confidential Computing in depth and also learn about the GA and in-preview offerings.

Azure confidential computing | Microsoft Learn

 

Supported VM Types for Confidential Databricks Data Plane

Please read this article to find out the DC* & EC* series VM types supported in the new feature release.

Azure Confidential virtual machine options on AMD processors | Microsoft Learn

 

Current Limitations

The feature release allows adding Confidential VM options while creating clusters in the customer Data plane only. More confidential features will be coming soon.

 

Configuring Confidential VMs on Azure Databricks

When creating a data plane cluster, select one of the confidential VM options as discussed here. By selecting a confidential VM as the compute option, you would be able to run your workloads in a privacy preserving way & confidential manner. Confidential VMs are available currently in East US, West US, North EU, West EU, with additional regions to be added later. 

How to create a Confidential Data plane cluster - https://aka.ms/ADB-ACC-demo

 

Databricks PubPrev.png 

 

Note: To migrate existing clusters to Confidential compute, simply edit the cluster and select the VM type as discussed above.

 

Published on:

Learn more
Azure Confidential Computing Blog articles
Azure Confidential Computing Blog articles

Azure Confidential Computing Blog articles

Share post:

Related posts

Retirement of Global Personal Access Tokens in Azure DevOps

In the new year, we’ll be retiring the Global Personal Access Token (PAT) type in Azure DevOps. Global PATs allow users to authenticate across...

1 day ago

Azure Cosmos DB vNext Emulator: Query and Observability Enhancements

The Azure Cosmos DB Linux-based vNext emulator (preview) is a local version of the Azure Cosmos DB service that runs as a Docker container on ...

2 days ago

Azure Cosmos DB : Becoming a Search-Native Database

For years, “Database” and “Search systems” (think Elastic Search) lived in separate worlds. While both Databases and Search Systems oper...

3 days ago

Announcing Azure DevOps Server General Availability

We’re thrilled to announce that Azure DevOps Server is now generally available (GA)! This release marks the transition from the Release Candid...

4 days ago

Blue-green deployment in Azure Container Apps using Azure Developer CLI

Learn how to implement blue-green deployment in Azure Container Apps using Azure Developer CLI (azd) revision-based deployment strategy. The p...

4 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy