Description
Network Security Groups (NSGs) should be implemented to control inbound and outbound traffic to Azure Databricks subnets, ensuring only authorized communication. NSGs should be configured with deny rules to block unwanted traffic and restrict communication to essential sources only.
Rationaleβ
Impactβ
- NSGs require periodic maintenance to ensure rule accuracy.
- Misconfigured NSGs could inadvertently block required traffic.
Auditβ
From Azure Portalβ
- Navigate to Virtual Networks > Subnets, and review NSG assignments.
From Azure CLIβ
az network nsg list --query "[].{Name:name, Rules:securityRules}"
From PowerShellβ
Get-AzNetworkSecurityGroup -ResourceGroupName <resource-group-name>
Default Valueβ
By default, Databricks subnets do not have NSGs assigned.