last sync: 2024-Jul-26 18:17:39 UTC

Configure Azure SQL Server to disable public network access

Azure BuiltIn Policy definition

Source Azure Portal
Display name Configure Azure SQL Server to disable public network access
Id 28b0b1e5-17ba-4963-a7a4-5a1ab4400a0b
Version 1.0.0
Details on versioning
Category SQL
Microsoft Learn
Description Disabling the public network access property shuts down public connectivity such that Azure SQL Server can only be accessed from a private endpoint. This configuration disables the public network access for all databases under the Azure SQL Server.
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Modify
Allowed
Modify, Disabled
RBAC role(s)
Role Name Role Id
SQL Server Contributor 6d8ee4ec-f05a-4a1d-8b00-a9b17e38b437
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Sql/servers/publicNetworkAccess Microsoft.Sql servers properties.publicNetworkAccess True True
THEN-Operations (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Sql/servers/publicNetworkAccess Microsoft.Sql servers properties.publicNetworkAccess True True
Rule resource types IF (1)
Microsoft.Sql/servers
Compliance
The following 2 compliance controls are associated with this Policy definition 'Configure Azure SQL Server to disable public network access' (28b0b1e5-17ba-4963-a7a4-5a1ab4400a0b)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
RMiT_v1.0 10.33 RMiT_v1.0_10.33 RMiT 10.33 Network Resilience Network Resilience - 10.33 Shared n/a A financial institution must design a reliable, scalable and secure enterprise network that is able to support its business activities, including future growth plans. link 27
RMiT_v1.0 11.15 RMiT_v1.0_11.15 RMiT 11.15 Data Loss Prevention (DLP) Data Loss Prevention (DLP) - 11.15 Shared n/a A financial institution must design internal control procedures and implement appropriate technology in all applications and access points to enforce DLP policies and trigger any policy violations. The technology deployed must cover the following: (a) data in-use - data being processed by IT resources; (b) data in-motion - data being transmitted on the network; and (c) data at-rest - data stored in storage mediums such as servers, backup media and databases. link 14
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
[Preview]: Control the use of Microsoft SQL in a Virtual Enclave 0fbe78a5-1722-4f1b-83a5-89c14151fa60 VirtualEnclaves Preview BuiltIn
Enforce recommended guardrails for SQL and SQL Managed Instance Enforce-Guardrails-SQL SQL GA ALZ
RMIT Malaysia 97a6d4f1-3bed-4cf4-ac5b-0e444c0408d6 Regulatory Compliance GA BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-03-02 15:11:40 add 28b0b1e5-17ba-4963-a7a4-5a1ab4400a0b
JSON compare n/a
JSON
api-version=2021-06-01
EPAC