Databricks resources deployed to a pre-provisioned VNET Databricks traffic isolated from regular network traffic Prevent data exfiltration Internal traffic between cluster nodes internal and encrypted Access to Databricks control plane limited and controlled