last sync: 2024-Jul-26 18:17:39 UTC

Private endpoint connections on Batch accounts should be enabled

Azure BuiltIn Policy definition

Source Azure Portal
Display name Private endpoint connections on Batch accounts should be enabled
Id 009a0c92-f5b4-4776-9b66-4ed2b4775563
Version 1.0.0
Details on versioning
Category Batch
Microsoft Learn
Description Private endpoint connections allow secure communication by enabling private connectivity to Batch accounts without a need for public IP addresses at the source or destination. Learn more about private endpoints in Batch at https://docs.microsoft.com/azure/batch/private-connectivity.
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
RBAC role(s) none
Rule aliases THEN-ExistenceCondition (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Batch/batchAccounts/privateEndpointConnections/privateLinkServiceConnectionState.status Microsoft.Batch batchAccounts/privateEndpointConnections properties.privateLinkServiceConnectionState.status True False
Rule resource types IF (1)
Microsoft.Batch/batchAccounts
Compliance
The following 2 compliance controls are associated with this Policy definition 'Private endpoint connections on Batch accounts should be enabled' (009a0c92-f5b4-4776-9b66-4ed2b4775563)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
NZ_ISM_v3.5 INF-9 NZ_ISM_v3.5_INF-9 NZISM Security Benchmark INF-9 Infrastructure 10.8.35 Security Architecture Customer n/a It is important that the principles of separation and segregation as well as the system classification are incorporated into the overall security architecture to maximise design and operational efficiency and to provide and support essential security to the network design. link 17
NZISM_Security_Benchmark_v1.1 INF-9 NZISM_Security_Benchmark_v1.1_INF-9 NZISM Security Benchmark INF-9 Infrastructure 10.8.35 Security Architecture Customer Security architectures MUST apply the principles of separation and segregation. It is important that the principles of separation and segregation as well as the system classification are incorporated into the overall security architecture to maximise design and operational efficiency and to provide and support essential security to the network design. link 16
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
[Deprecated]: New Zealand ISM Restricted d1a462af-7e6d-4901-98ac-61570b4ed22a Regulatory Compliance Deprecated BuiltIn
[Deprecated]: New Zealand ISM Restricted v3.5 93d2179e-3068-c82f-2428-d614ae836a04 Regulatory Compliance Deprecated BuiltIn
Evaluate Private Link Usage Across All Supported Azure Resources 7379ef4c-89b0-48b6-a5cc-fd3a75eaef93 SDN GA BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-02-23 16:24:42 add 009a0c92-f5b4-4776-9b66-4ed2b4775563
JSON compare n/a
JSON
api-version=2021-06-01
EPAC