π‘οΈ Azure Databricks Workspace is not deployed in a customer-managed virtual network (VNet)π’
- Contextual name: π‘οΈ Workspace is not deployed in a customer-managed virtual network (VNet)π’
- ID:
/ce/ca/azure/databricks/customer-managed-virtual-network - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Descriptionβ
Descriptionβ
Networking for Azure Databricks can be set up in a few different ways. Using a customer-managed Virtual Network (VNet) (also known as VNet Injection) ensures that compute clusters and control planes are securely isolated within the organizationβs network boundary. By default, Databricks creates a managed VNet, which provides limited control over network security policies, firewall configurations, and routing.
Rationaleβ
Using a customer-managed VNet ensures better control over network security and aligns with zero-trust architecture principles. It allows for:
- Restricted outbound internet access to prevent unauthorized data exfiltration.
- Integration with on-premises networks via VPN or ExpressRoute for hybrid connectivity.
- Fine-grained NSG policies to restrict access at the subnet level.
- Private Link for secure API access, avoiding public internet exposure.
Impactβ
- Requires additional configuration during Databricks workspace deployment.
- Might increase operational overhead for network maintenance.
... see more
Remediationβ
Remediationβ
Redeploy Azure Databricks into a Custom VNet with NSGsβ
This requires recreating the Databricks workspace using VNet injection.
Azure CLIβ
Create an NSG
az network nsg create \
--resource-group {{resource-group}} \
--name {{nsg-name}} \
--location {{location}}Create a custom Virtual Network and subnets
az network vnet create \
--resource-group {{resource-group}} \
--name {{vnet-name}} \
--address-prefix {{10.0.0.0/16}} \
--subnets "[{name:{{private-subnet-name}},address-prefix:{{subnet-prefix}}},{name:{{public-subnet-name}},address-prefix:{{subnet-prefix}} }]" \
--nsg {{nsg-name}}Deploy a new Databricks workspace using VNet injection
az databricks workspace create \
--resource-group {{resource-group}} \
--name {{workspace-name}} \
--location {{location}} \
--sku {{premium}} \
--vnet {{vnet-name}} \
--public-subnet {{public-subnet-name}} \... see more
policy.yamlβ
Linked Framework Sectionsβ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| πΌ CIS Azure v5.0.0 β πΌ 2.1.1 Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet) (Automated) | 1 | no data | |||
| πΌ Cloudaware Framework β πΌ Threat Protection | 48 | no data |