Source | Azure Portal | ||||||||||||||||||||||||||||||||||||||||||||
Display name | Azure Databricks Workspaces should disable public network access | ||||||||||||||||||||||||||||||||||||||||||||
Id | 0e7849de-b939-4c50-ab48-fc6b0f5eeba2 | ||||||||||||||||||||||||||||||||||||||||||||
Version | 1.0.1 Details on versioning |
||||||||||||||||||||||||||||||||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.1 Built-in Versioning [Preview] |
||||||||||||||||||||||||||||||||||||||||||||
Category | Azure Databricks Microsoft Learn |
||||||||||||||||||||||||||||||||||||||||||||
Description | Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can control exposure of your resources by creating private endpoints instead. Learn more at: https://learn.microsoft.com/azure/databricks/administration-guide/cloud-configurations/azure/private-link. | ||||||||||||||||||||||||||||||||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||||||||||||||||||||||||||||||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.*.*' | ||||||||||||||||||||||||||||||||||||||||||||
Assessment(s) |
Assessments count: 1 Assessment Id: 9f6b22c2-61e5-4c4b-ab83-f5a88387bff4 DisplayName: Azure Databricks Workspaces should disable public network access Description: Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can control exposure of your resources by creating private endpoints instead. Learn more at: https://learn.microsoft.com/azure/databricks/administration-guide/cloud-configurations/azure/private-link. Remediation description: It is not currently possible to modify public IP settings for an Azure Databricks Workspace after provisioning it. To create a new workspace with public network access disabled on initial configuration: 1. Navigate to the Azure Portal. 2. Navigate to Azure Databricks. 3. Select the Create button. 4. In the Networking tab of the create flow, select Yes for both the secure cluster connectivity and virtual network options. 5. Select the Review and Create button. For more information see https://learn.microsoft.com/azure/databricks/security/network/. Categories: Data Severity: Medium User impact: Low Implementation effort: High Threats: AccountBreach, DataExfiltration, DataSpillage, MaliciousInsider preview: True |
||||||||||||||||||||||||||||||||||||||||||||
Mode | Indexed | ||||||||||||||||||||||||||||||||||||||||||||
Type | BuiltIn | ||||||||||||||||||||||||||||||||||||||||||||
Preview | False | ||||||||||||||||||||||||||||||||||||||||||||
Deprecated | False | ||||||||||||||||||||||||||||||||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||||||||||||||||||||||||||||||||
RBAC role(s) | none | ||||||||||||||||||||||||||||||||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||||||||||||||||||||||||||||||||
Rule resource types | IF (1) |
||||||||||||||||||||||||||||||||||||||||||||
Compliance |
The following 3 compliance controls are associated with this Policy definition 'Azure Databricks Workspaces should disable public network access' (0e7849de-b939-4c50-ab48-fc6b0f5eeba2)
| ||||||||||||||||||||||||||||||||||||||||||||
Initiatives usage |
|
||||||||||||||||||||||||||||||||||||||||||||
History |
|
||||||||||||||||||||||||||||||||||||||||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||||||||||||||||||||||||||||||||||||||||
JSON |
|