Description
Private endpoints limit network traffic to approved sources.
Rationaleβ
For sensitive data, private endpoints allow granular control of which services can communicate with Cosmos DB and ensure that this network traffic is private. You set this up on a case by case basis for each service you wish to be connected.
Impactβ
Only whitelisted services will have access to communicate with the Cosmos DB.
Auditβ
From Azure Portalβ
- Open the portal menu.
- Select the Azure Cosmos DB blade.
- Select the Azure Cosmos DB account.
- Select
Networking
. - Ensure
Public network access
is set toSelected networks
. - Ensure the listed networks are set appropriately.
- Select
Private access
. - Ensure a private endpoint exists and
Connection state is Approved
.
From Azure Policyβ
If referencing a digital copy of this Benchmark, clicking a Policy ID will open a link to the associated Policy definition in Azure.
- Policy ID: 58440f8a-10c5-4151-bdce-dfbaad4a20b7 - Name:
CosmosDB accounts should use private link
Default Valueβ
By default Cosmos DB does not have private endpoints enabled and its traffic is public to the network.
Referencesβ
- https://docs.microsoft.com/en-us/azure/cosmos-db/how-to-configure-private-endpoints
- https://docs.microsoft.com/en-us/azure/private-link/tutorial-private-endpoint-cosmosdb-portal
- https://docs.microsoft.com/en-us/cli/azure/cosmosdb/private-endpoint-connection?view=azure-cli-latest
- https://docs.microsoft.com/en-us/cli/azure/network/private-endpoint?view=azure-cli-latest#az-network-private-endpoint-create
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-network-security#ns-2-secure-cloud-native-services-with-network-controls