Skip to main content

๐Ÿ›ก๏ธ Azure Databricks Workspace Allow Public Network Access is not disabled๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Databricks Workspace Allow Public Network Access is not disabled๐ŸŸข
  • ID: /ce/ca/azure/databricks/public-network-access
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

Disable public network access to prevent exposure to the internet and reduce the risk of unauthorized access. Use private endpoints to securely manage access within trusted networks.

Rationaleโ€‹

Disabling public network access improves security by ensuring that Azure Databricks workspaces are not exposed on the public internet.

Impactโ€‹

NOTE: Prior to disabling public network access, it is strongly recommended that, for each workspace, either:

  • virtual network integration is completed as described in "Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet)"

OR

  • private endpoints/links are set up as described in "Ensure private endpoints are used to access Azure Databricks workspaces."

Disabling public network access restricts access to the service. This enhances security but will require the configuration of a virtual network and/or private endpoints for any services or users needing access within trusted networks.

Before public network access can be disabled, Azure Databricks workspaces must be deployed in a customer-managed virtual network (VNet injection)โ€”refer to the recommendation Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet), and requiredNsgRules must be set to a value other than AllRules.

... see more

Remediationโ€‹

Open File

Remediationโ€‹

From Azure Portalโ€‹

  1. Go to Azure Databricks.
  2. Click the name of a workspace.
  3. Under Settings click Networking.
  4. Under Network access, next to Allow Public Network Access, click the radio button next to Disabled.
  5. Click Save.
  6. Repeat steps 1-5 for each workspace requiring remediation.

From Azure CLIโ€‹

For each workspace requiring remediation, run the following command to set publicNetworkAccess to Disabled:

az databricks workspace update /
--resource-group {{resource-group}} /
--name {{workspace}} /
--public-network-access Disabled

From PowerShellโ€‹

For each workspace requiring remediation, run the following command to set PublicNetworkAccess to Disabled:

Update-AzDatabricksWorkspace `
-ResourceGroupName {{resource-group}} `
-Name {{workspace}} `
-PublicNetworkAccess Disabled

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ CIS Azure v5.0.0 โ†’ ๐Ÿ’ผ 2.1.10 Ensure 'Allow Public Network Access' is set to 'Disabled' (Automated)1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Public and Anonymous Access110no data