Security Architecture
Overview
Security Model
Defense in Depth
┌─────────────────────────────────────────────────────────────┐
│ Layer 1: Network Security │
│ - VPC isolation (10.100.0.0/16) │
│ - Private subnets for compute │
│ - NAT Gateway for outbound traffic │
│ - Security groups restricting access │
└─────────────────────────────────────────────────────────────┘
↓
┌─────────────────────────────────────────────────────────────┐
│ Layer 2: Authentication & Authorization │
│ - GitHub OIDC for CI/CD (no long-lived secrets) │
│ - Service Principal per environment │
│ - OAuth 2.0 for user access │
│ - Unity Catalog permissions (catalog/schema/table) │
└─────────────────────────────────────────────────────────────┘
↓
┌─────────────────────────────────────────────────────────────┐
│ Layer 3: Data Governance │
│ - Unity Catalog centralized governance │
│ - Row-level security (future) │
│ - Column-level masking (future) │
│ - Audit logging (all access tracked) │
└─────────────────────────────────────────────────────────────┘
↓
┌─────────────────────────────────────────────────────────────┐
│ Layer 4: Data Encryption │
│ - At rest: S3 encryption (AES-256) │
│ - In transit: TLS 1.2+ │
│ - Secrets: AWS SSM Parameter Store (encrypted) │
└─────────────────────────────────────────────────────────────┘Unity Catalog Permissions
Service Principal Permissions Summary
Data Isolation Guarantees
Environment Isolation
From → To
Dev
Staging
Prod
Sandbox Isolation
Audit Logging
What is Logged
Accessing Audit Logs
Audit Log Retention
Compliance Considerations
Current Compliance Status
Planned Compliance (Early 2026)
GDPR Implementation
Data Residency
Secret Management
GitHub Secrets
Databricks Secrets
AWS SSM Parameter Store
Access Control Matrix
Production Environment
Principal Type
Principal Name
Catalogs
Permissions
Use Case
Staging Environment
Principal Type
Principal Name
Catalogs
Permissions
Use Case
Dev Environment
Principal Type
Principal Name
Catalogs
Permissions
Use Case
Network Security
VPC Configuration
Network Isolation
Threat Model
Threats and Mitigations
Threat
Mitigation
Status
Incident Response
Security Best Practices
For Developers
For Administrators
Related Documentation
This Repository
Cross-Repository Documentation
Last updated