Source | Azure Portal | ||||||||||||||||||||||||||||||||||||||||||||
Display name | Azure Databricks Clusters should disable public IP | ||||||||||||||||||||||||||||||||||||||||||||
Id | 51c1490f-3319-459c-bbbc-7f391bbed753 | ||||||||||||||||||||||||||||||||||||||||||||
Version | 1.0.1 Details on versioning |
||||||||||||||||||||||||||||||||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.1 Built-in Versioning [Preview] |
||||||||||||||||||||||||||||||||||||||||||||
Category | Azure Databricks Microsoft Learn |
||||||||||||||||||||||||||||||||||||||||||||
Description | Disabling public IP of clusters in Azure Databricks Workspaces improves security by ensuring that the clusters aren't exposed on the public internet. Learn more at: https://learn.microsoft.com/azure/databricks/security/secure-cluster-connectivity. | ||||||||||||||||||||||||||||||||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||||||||||||||||||||||||||||||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.*.*' | ||||||||||||||||||||||||||||||||||||||||||||
Assessment(s) |
Assessments count: 1 Assessment Id: a85bc138-587d-4867-8faa-b2a814cfcf72 DisplayName: Azure Databricks Clusters should disable public IP Description: Disabling public IP of clusters in Azure Databricks Workspaces improves security by ensuring that the clusters aren't exposed on the public internet. Learn more at: https://learn.microsoft.com/azure/databricks/security/secure-cluster-connectivity. Remediation description: It is not currently possible to modify public IP settings for an Azure Databricks Workspace after provisioning it. To create a new workspace with public IP disabled on initial configuration: 1. Navigate to the Azure Portal. 2. Navigate to Azure Databricks. 3. Select the Create button. 4. In the Networking tab of the create flow, select Yes for the secure cluster connectivity. 5. Select the Review and Create button. For more information see https://learn.microsoft.com/azure/databricks/security/secure-cluster-connectivity. If public IP for clusters is disabled, and if public network access has also been disabled on the workspace, users should consider the Azure Private Link documentation at: https://learn.microsoft.com/azure/databricks/administration-guide/cloud-configurations/azure/private-link. Categories: Data Severity: Medium User impact: Low Implementation effort: High Threats: AccountBreach, DataExfiltration, DataSpillage, MaliciousInsider preview: True |
||||||||||||||||||||||||||||||||||||||||||||
Mode | Indexed | ||||||||||||||||||||||||||||||||||||||||||||
Type | BuiltIn | ||||||||||||||||||||||||||||||||||||||||||||
Preview | False | ||||||||||||||||||||||||||||||||||||||||||||
Deprecated | False | ||||||||||||||||||||||||||||||||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||||||||||||||||||||||||||||||||
RBAC role(s) | none | ||||||||||||||||||||||||||||||||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||||||||||||||||||||||||||||||||
Rule resource types | IF (1) |
||||||||||||||||||||||||||||||||||||||||||||
Compliance |
The following 3 compliance controls are associated with this Policy definition 'Azure Databricks Clusters should disable public IP' (51c1490f-3319-459c-bbbc-7f391bbed753)
| ||||||||||||||||||||||||||||||||||||||||||||
Initiatives usage |
|
||||||||||||||||||||||||||||||||||||||||||||
History |
|
||||||||||||||||||||||||||||||||||||||||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||||||||||||||||||||||||||||||||||||||||
JSON |
|