π Azure Managed Disk Public Network Access is not disabled π’
- Contextual name: π Managed Disk Public Network Access is not disabled π’
- ID:
/ce/ca/azure/virtual-machine/disable-managed-disk-public-network-access
- Located in: π Azure Virtual Machines
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Internal
dec-x-b17c005c
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-b17c005c | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Virtual Machine Disks and snapshots can be configured to allow access from different network resources.
Rationaleβ
The setting
Enable public access from all networks
is, in many cases, an overly permissive setting on Virtual Machine Disks that presents atypical attack, data infiltration, and data exfiltration vectors. If a disk to network connection is required, the preferred setting is toDisable public access and enable private access
.Impactβ
The setting
Disable public access and enable private access
will require configuring a private link (URL in references below).The setting
Disable public and private access
is most secure and preferred where disk network access is not needed.Auditβ
From Azure Portalβ
Part A. Select the Virtual Machine to Evaluateβ
- Using the search bar, search for and open the
Virtual Machines
service.- Click on the name of the Virtual Machine to be audited.
Part B. Evaluate each Virtual Machine Disk individuallyβ
- From the selected Virtual Machine resource window, expand the
Settings
menu item and clickDisks
.... see more
Remediationβ
Remediationβ
From Azure Portalβ
Part A. Select the Virtual Machine to Remediateβ
- Using the search bar, search for and open the
Virtual Machines
service.- Click on the name of the Virtual Machine to be remediated.
Part B. Remediate each Virtual Machine Disk individuallyβ
- From the selected Virtual Machine resource window, expand the
Settings
menu item and clickDisks
.- For each disk, click the name of the disk to open the disk resource window.
- From the selected Disk resource window, expand the
Settings
menu item, and clickNetworking
.Under Network access, select the radio button for either:
- Disable public access and enable private access
- Disable public and private access
Repeat Part B for each Disk attached to a VM.
Repeat Parts A and B to remediate all Disks in all VMs.
From Azure CLIβ
To configure a disk to allow private access only, run the following command making sure you have the
Disk Access ID
from a private disk access end point:az disk update --name <managed disk name> --resource-group <resource group name> --network-access-policy AllowPrivate --disk-access <disk access ID>
... [see more](remediation.md)