π Azure Databricks network security groups are not configured π’
- Contextual name: π Databricks network security groups are not configured π’
- ID:
/ce/ca/azure/databricks/network-security-groups-for-subnets
- Located in: π Azure Databricks
Flagsβ
- π’ Impossible policy
- π’ Policy with categories
- π’ Policy with type
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Descriptionβ
Descriptionβ
Network Security Groups (NSGs) should be implemented to control inbound and outbound traffic to Azure Databricks subnets, ensuring only authorized communication. NSGs should be configured with deny rules to block unwanted traffic and restrict communication to essential sources only.
Rationaleβ
Impactβ
- NSGs require periodic maintenance to ensure rule accuracy.
- Misconfigured NSGs could inadvertently block required traffic.
Auditβ
From Azure Portalβ
- Navigate to Virtual Networks > Subnets, and review NSG assignments.
From Azure CLIβ
az network nsg list --query "[].{Name:name, Rules:securityRules}"
From PowerShellβ
Get-AzNetworkSecurityGroup -ResourceGroupName <resource-group-name>
Default Valueβ
By default, Databricks subnets do not have NSGs assigned.
Referencesβ
Remediationβ
Remediationβ
From Azure Portalβ
- Assign NSG to Databricks subnets under Networking > NSG Settings.
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v4.0.0 β πΌ 3.1.2 Ensure that network security groups are configured for Databricks subnets (Manual) | 1 | |||
πΌ Cloudaware Framework β πΌ Secure Access | 53 |