Skip to main content

๐Ÿ›ก๏ธ Azure Databricks Workspace does not use private endpoint connections๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Databricks Workspace does not use private endpoint connections๐ŸŸข
  • ID: /ce/ca/azure/databricks/private-endpoint-connection
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

This policy identifies Azure Databricks Workspaces that do not utilize private endpoints.

Private endpoints provide secure, private connectivity to Azure Databricks workspaces over an encrypted Azure Private Link. Each service receives an IP address from the associated Virtual Network (VNet), ensuring that network traffic between clients, services, and resources remains private and encrypted. Private endpoints also enable network segmentation, hybrid connectivity through VNet peering or VPN/ExpressRoute, and secure tunneling across public networks, reducing exposure to external threats.

Rationaleโ€‹

Using private endpoints for Azure Databricks workspaces ensures that all communication occurs over a private IP space within a customer-managed VNet, eliminating exposure to the public internet. This approach:

  • Minimizes the attack surface and supports Zero Trust principles.
  • Enables network segmentation and fine-grained access control.
  • Supports hybrid connectivity for accessing on-premises or remote resources securely.

... see more

Remediationโ€‹

Open File

Remediationโ€‹

From Azure Portalโ€‹

  1. Go to Azure Databricks.
  2. Click the name of a workspace.
  3. Under Settings, click Networking.
  4. Click Private endpoint connections.
  5. Click + Private endpoint.
  6. Under Project details, select a Subscription and a Resource group.
  7. Under Instance details, provide a Name, Network Interface Name, and select a Region.
  8. Click Next : Resource }}.
  9. Select a Target sub-resource.
  10. Click Next : Virtual Network }}.
  11. Under Networking, select a Virtual network and a Subnet.
  12. Optionally, configure Private IP configuration and Application security group.
  13. Click Next : DNS }}.
  14. Optionally, configure Private DNS integration.
  15. Click Next : Tags }}.
  16. Optionally, configure tags.
  17. Click Next : Review + create }}.
  18. Click Create.
  19. Repeat steps 1-18 for each workspace requiring remediation.

From Azure CLIโ€‹

For each workspace requiring remediation, run the following command to create a private endpoint connection:

az network private-endpoint create /

... [see more](remediation.md)

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ CIS Azure v5.0.0 โ†’ ๐Ÿ’ผ 2.1.11 Ensure private endpoints are used to access Azure Databricks workspaces (Automated)1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Secure Access67no data