
Answer-first summary for fast verification
Answer: Deploy role-based access control (RBAC) utilizing dynamic views to automatically adjust data visibility based on user roles, coupled with systematic audits of access patterns and logs to detect and rectify any compliance deviations in real-time.
Option C stands out as the best practice for several reasons. RBAC with dynamic views ensures that users only access data pertinent to their roles, adhering to the principle of least privilege. This method is scalable and adaptable to changing access needs without significant overhead. Regular audits of access logs not only facilitate compliance with data protection regulations but also enable the timely detection and remediation of unauthorized access, making it a comprehensive solution for data governance in a Databricks environment.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
In a Databricks environment, ensuring data governance is critical for compliance with data protection regulations and securing sensitive information. You are tasked with implementing a solution that not only controls data access but also adheres to the principles of least privilege and regular compliance audits. Considering the need for scalability, cost-effectiveness, and the ability to quickly adapt to changing data access requirements, which of the following approaches would BEST meet these objectives? Choose one option.
A
Provide all users with unrestricted access to the entire dataset and rely on periodic manual reviews to revoke unnecessary access, ensuring compliance through retrospective adjustments.
B
Develop a comprehensive single view for all data consumers and apply static data masking techniques to hide sensitive information, assuming that this one-size-fits-all approach will simplify access control.
C
Deploy role-based access control (RBAC) utilizing dynamic views to automatically adjust data visibility based on user roles, coupled with systematic audits of access patterns and logs to detect and rectify any compliance deviations in real-time.
D
Encrypt all data at rest and in transit, distributing decryption keys exclusively to a select group of administrators, under the assumption that encryption alone suffices for compliance and access control.