Databricks resources deployed to a pre-provisioned VNET
Databricks traffic isolated from regular network traffic
Prevent data exfiltration
Internal traffic between cluster nodes internal and encrypted
Access to Databricks control plane limited and controlled