Skip to main content

๐Ÿ›ก๏ธ Azure Databricks Workspace network security groups are not configured๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Databricks Workspace network security groups are not configured๐ŸŸข
  • ID: /ce/ca/azure/databricks/network-security-groups-for-subnets
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

Network Security Groups (NSGs) should be applied to Azure Databricks subnets to control both inbound and outbound network traffic and ensure that only authorized communication is permitted. NSGs operate on a rule-based model that supports explicit allow and deny rules, followed by an implicit deny rule at the end of the rule set. As a result, any traffic not explicitly allowed is automatically blocked.

To promote secure and predictable network behavior, NSGs should include explicit deny rules for known unwanted or non-essential traffic in addition to the default implicit deny. This enhances visibility into blocked traffic, improves auditability, and supports enforcement of the principle of least privilege, thereby reducing the risk of unauthorized access to Databricks resources.

Rationaleโ€‹

Implementing NSGs with clearly defined allow and deny rules provides transparency and precise control over permitted and restricted network traffic. Although Azure NSGs implicitly deny traffic that is not explicitly allowed, defining explicit deny rules for known malicious or unnecessary sources improves readability of the security configuration, simplifies troubleshooting, and supports regulatory and compliance audits. This layered defense approach strengthens the overall security posture of Azure Databricks environments by limiting communication strictly to required endpoints.

... see more

Remediationโ€‹

Open File

Remediationโ€‹

Assign an NSG to an Existing Databricks Subnetโ€‹

Azure CLIโ€‹
  1. Create an NSG (if one does not already exist)

    az network nsg create \
    --resource-group {{resource-group}} \
    --name {{nsg-name}} \
    --location {{location}}
  2. Associate the NSG with the Databricks subnet

    az network vnet subnet update \
    --resource-group {{resource-group}} \
    --vnet-name {{vnet-name}} \
    --name {{databricks-subnet-name}} \
    --network-security-group {{nsg-name}}

Repeat this step for both the private and public Databricks subnets, if applicable.

From PowerShellโ€‹
$sampleRule = New-AzNetworkSecurityRuleConfig `
-Name {{rdp-rule}}`
-Description "Allow RDP" `
-Access Allow `
-Protocol Tcp `
-Direction Inbound `
-Priority 100 `
-SourceAddressPrefix Internet `
-SourcePortRange * `
-DestinationAddressPrefix * `
-DestinationPortRange 3389

$nsg = New-AzNetworkSecurityGroup `
-Name "{{nsg-name}}" `
-ResourceGroupName "{{resource-group}}" `

... [see more](remediation.md)

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ CIS Azure v5.0.0 โ†’ ๐Ÿ’ผ 2.1.2 Ensure that network security groups are configured for Databricks subnets (Automated)1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Secure Access68no data