๐ก๏ธ Azure Databricks Workspace Allow Public Network Access is not disabled๐ข
- Contextual name: ๐ก๏ธ Databricks Workspace Allow Public Network Access is not disabled๐ข
- ID:
/ce/ca/azure/databricks/public-network-access - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Descriptionโ
Descriptionโ
Disable public network access to prevent exposure to the internet and reduce the risk of unauthorized access. Use private endpoints to securely manage access within trusted networks.
Rationaleโ
Disabling public network access improves security by ensuring that Azure Databricks workspaces are not exposed on the public internet.
Impactโ
NOTE: Prior to disabling public network access, it is strongly recommended that, for each workspace, either:
- virtual network integration is completed as described in "Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet)"
OR
- private endpoints/links are set up as described in "Ensure private endpoints are used to access Azure Databricks workspaces."
Disabling public network access restricts access to the service. This enhances security but will require the configuration of a virtual network and/or private endpoints for any services or users needing access within trusted networks.
Before public network access can be disabled, Azure Databricks workspaces must be deployed in a customer-managed virtual network (VNet injection)โrefer to the recommendation
Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet), andrequiredNsgRulesmust be set to a value other thanAllRules.... see more
Remediationโ
Remediationโ
From Azure Portalโ
- Go to
Azure Databricks.- Click the name of a workspace.
- Under
SettingsclickNetworking.- Under
Network access, next toAllow Public Network Access, click the radio button next toDisabled.- Click
Save.- Repeat steps 1-5 for each workspace requiring remediation.
From Azure CLIโ
For each workspace requiring remediation, run the following command to set
publicNetworkAccesstoDisabled:az databricks workspace update /
--resource-group {{resource-group}} /
--name {{workspace}} /
--public-network-access DisabledFrom PowerShellโ
For each workspace requiring remediation, run the following command to set
PublicNetworkAccesstoDisabled:Update-AzDatabricksWorkspace `
-ResourceGroupName {{resource-group}} `
-Name {{workspace}} `
-PublicNetworkAccess Disabled
policy.yamlโ
Linked Framework Sectionsโ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| ๐ผ CIS Azure v5.0.0 โ ๐ผ 2.1.10 Ensure 'Allow Public Network Access' is set to 'Disabled' (Automated) | 1 | no data | |||
| ๐ผ Cloudaware Framework โ ๐ผ Public and Anonymous Access | 110 | no data |