That’s how most authorization failures start in Databricks. Not with a hack. Not with lost passwords. But with loose access control rules that nobody reviewed. Databricks Authorization and Access Control decide who can see what, who can run what, and who can change what. Get it wrong, and your data platform becomes a liability.
Databricks comes with fine-grained access control, but too often the defaults stay untouched. Permissions pile up. Groups grow messy. Users keep privileges long after they need them. Security drifts. The fix isn’t complicated, but it must be deliberate: clear role definitions, strict access boundaries, and consistent auditing.
The foundation is Unity Catalog for centralized governance. It brings data-level access control to tables, views, and files across workspaces. Every permission granted can be tied to a user group, service principal, or identity provider mapping. This allows you to enforce least privilege — the principle that no account gets more power than it needs.
Clusters and jobs must be locked down, too. Permissions here control who can attach notebooks, run code, or manage configurations. Dangling admin rights on a shared cluster are one of the fastest ways for privilege escalation inside Databricks. Limit who can create clusters, and audit who owns automated jobs.