Skip to main content

๐Ÿ›ก๏ธ Azure Databricks Workspace Secure Cluster Connectivity is not enabled๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Databricks Workspace Secure Cluster Connectivity is not enabled๐ŸŸข
  • ID: /ce/ca/azure/databricks/no-public-ip
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

Enable secure cluster connectivity (also known as no public IP) on Azure Databricks workspaces to ensure that clusters do not have public IP addresses and communicate with the control plane over a secure connection.

Rationaleโ€‹

Enabling secure cluster connectivity limits exposure to the public internet, improving security and reducing the risk of external attacks.

Impactโ€‹

Enabling secure cluster connectivity requires careful network configuration. Before secure cluster connectivity can be enabled, Azure Databricks workspaces must be deployed in a customer-managed virtual network (VNet injection), refer to the policy Azure Databricks Workspace is not deployed in a customer-managed virtual network (VNet).

Auditโ€‹

This policy flags an Azure Databricks Workspace as INCOMPLAINT if the Parameters JSON field does not contain the enableNoPublicIp parameter set to true.

Default Valueโ€‹

No Public IP is set to Enabled by default.

Referencesโ€‹

  1. https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/secure-cluster-connectivity

... see more

Remediationโ€‹

Open File

Remediationโ€‹

From Azure Portalโ€‹

  1. Go to Azure Databricks.
  2. Click the name of a workspace.
  3. Under Settings, click Networking.
  4. Under Network access, next to Deploy Azure Databricks workspace with Secure Cluster Connectivity (No Public IP), click the radio button next to Enabled.
  5. Click Save.
  6. Repeat steps 1-5 for each workspace requiring remediation.

From Azure CLIโ€‹

For each workspace requiring remediation, run the following command to set enableNoPublicIp to true:

az databricks workspace update /
--resource-group {{resource-group}} /
--name {{workspace}} /
--enable-no-public-ip true

From PowerShellโ€‹

For each workspace requiring remediation, run the following command to set EnableNoPublicIP to True:

Update-AzDatabricksWorkspace `
-ResourceGroupName {{resource-group}} `
-Name {{workspace}} `
-EnableNoPublicIP

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ CIS Azure v5.0.0 โ†’ ๐Ÿ’ผ 2.1.9 Ensure 'No Public IP' is set to 'Enabled' (Automated)1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Public and Anonymous Access110no data