
Explanation:
A: Incorrect
While cloud-provider encryption at rest (e.g., SSE-KMS) and TLS for transit are baseline requirements and are enabled by default in Databricks, this option stops at coarse-grained (table-level) access control in Unity Catalog. It completely lacks dynamic row-level filtering and column-level masking/dynamic masking — features explicitly required for fine-grained protection of PII/PHI under GDPR/HIPAA/PCI-DSS. This would almost certainly fail compliance audits that demand need-to-know access at the record/field level.
B: Partially correct but insufficient
Using Unity Catalog's row filters and column masks (especially via ABAC in public preview or GA features) is excellent for dynamic, policy-driven protection without duplicating data. However, limiting CMK to only "the most sensitive catalogs" leaves gaps in other areas (e.g., workspace-level objects, notebooks, logs, or less-sensitive-but-still-regulated catalogs). Relying on default platform-managed keys and transit encryption is acceptable for many use cases but falls short of the "strict" multi-regulation scenario that often mandates customer control over key lifecycle (e.g., immediate revocation capability).
C: Correct
This is the most comprehensive defense-in-depth approach aligned with Databricks best practices and exam expectations at the Professional level:
D: Incorrect / anti-pattern
Client-side / application-level column encryption (via UDFs) before writing to Delta breaks many Delta Lake benefits:
Ultimate access to all questions.
No comments yet.
In a Databricks Lakehouse architecture governed by Unity Catalog, your organization must comply with multiple overlapping regulations (including GDPR, HIPAA, and PCI-DSS) for a workload that processes highly sensitive PII and PHI across bronze, silver, and gold layers. All data resides in Delta Lake tables, with strict requirements for encryption of data at rest and in transit, fine-grained access controls (including dynamic row-level filtering and column-level masking), auditability, and minimal performance impact on large-scale analytical and ML workloads.
You are designing the security architecture and must select the most complete and production-ready approach that balances regulatory coverage, centralized governance, scalability, operational manageability, and cost.
Which of the following strategies BEST satisfies these requirements?
A
Rely primarily on the cloud provider's default server-side encryption for data at rest (SSE-S3 / SSE-KMS / ADE), enforce TLS 1.2+ for all network traffic, and implement table-level privileges in Unity Catalog without row/column-level controls.
B
Use Unity Catalog column-level dynamic data masking functions combined with row filters (via ABAC policies where possible), enable customer-managed keys (CMK) only for the most sensitive catalogs, and accept default platform-managed encryption for workspace objects and transit traffic.
C
Implement a defense-in-depth model that includes:
D
Apply column-level encryption directly in Delta tables using client-side encryption logic (e.g., AES via Python UDFs or third-party libraries) before writing data, combined with Unity Catalog table privileges, while relying on cloud-provider transit encryption only.