last sync: 2025-Apr-29 17:16:02 UTC

Azure Databricks Clusters should disable public IP

Azure BuiltIn Policy definition

Source Azure Portal
Display name Azure Databricks Clusters should disable public IP
Id 51c1490f-3319-459c-bbbc-7f391bbed753
Version 1.0.1
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.1
Built-in Versioning [Preview]
Category Azure Databricks
Microsoft Learn
Description Disabling public IP of clusters in Azure Databricks Workspaces improves security by ensuring that the clusters aren't exposed on the public internet. Learn more at: https://learn.microsoft.com/azure/databricks/security/secure-cluster-connectivity.
Cloud environments AzureCloud = true
AzureUSGovernment = true
AzureChinaCloud = unknown
Available in AzUSGov The Policy is available in AzureUSGovernment cloud. Version: '1.*.*'
Assessment(s) Assessments count: 1
Assessment Id: a85bc138-587d-4867-8faa-b2a814cfcf72
DisplayName: Azure Databricks Clusters should disable public IP
Description: Disabling public IP of clusters in Azure Databricks Workspaces improves security by ensuring that the clusters aren't exposed on the public internet. Learn more at: https://learn.microsoft.com/azure/databricks/security/secure-cluster-connectivity.
Remediation description: It is not currently possible to modify public IP settings for an Azure Databricks Workspace after provisioning it. To create a new workspace with public IP disabled on initial configuration: 1. Navigate to the Azure Portal. 2. Navigate to Azure Databricks. 3. Select the Create button. 4. In the Networking tab of the create flow, select Yes for the secure cluster connectivity. 5. Select the Review and Create button.
For more information see https://learn.microsoft.com/azure/databricks/security/secure-cluster-connectivity. If public IP for clusters is disabled, and if public network access has also been disabled on the workspace, users should consider the Azure Private Link documentation at: https://learn.microsoft.com/azure/databricks/administration-guide/cloud-configurations/azure/private-link.
Categories: Data
Severity: Medium
User impact: Low
Implementation effort: High
Threats: AccountBreach, DataExfiltration, DataSpillage, MaliciousInsider
preview: True
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Deny, Disabled
RBAC role(s) none
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.DataBricks/workspaces/parameters.enableNoPublicIp.value Microsoft.Databricks workspaces properties.parameters.enableNoPublicIp.value True False
Rule resource types IF (1)
Compliance
The following 3 compliance controls are associated with this Policy definition 'Azure Databricks Clusters should disable public IP' (51c1490f-3319-459c-bbbc-7f391bbed753)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v3.0 NS-2 Azure_Security_Benchmark_v3.0_NS-2 Microsoft cloud security benchmark NS-2 Network Security Secure cloud services with network controls Shared **Security Principle:** Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible. **Azure Guidance:** Deploy private endpoints for all Azure resources that support the Private Link feature, to establish a private access point for the resources. You should also disable or restrict public network access to services where feasible. For certain services, you also have the option to deploy VNet integration for the service where you can restrict the VNET to establish a private access point for the service. **Implementation and additional context:** Understand Azure Private Link: https://docs.microsoft.com/azure/private-link/private-link-overview n/a link 40
New_Zealand_ISM 10.8.35.C.01 New_Zealand_ISM_10.8.35.C.01 New_Zealand_ISM_10.8.35.C.01 10. Infrastructure 10.8.35.C.01 Security Architecture n/a Security architectures MUST apply the principles of separation and segregation. 31
U.07.1 - Isolated U.07.1 - Isolated 404 not found n/a n/a 62
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
Microsoft cloud security benchmark 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA BuiltIn true
New Zealand ISM 4f5b1359-4f8e-4d7c-9733-ea47fcde891e Regulatory Compliance GA BuiltIn unknown
NL BIO Cloud Theme 6ce73208-883e-490f-a2ac-44aac3b3687f Regulatory Compliance GA BuiltIn unknown
NL BIO Cloud Theme V2 d8b2ffbe-c6a8-4622-965d-4ade11d1d2ee Regulatory Compliance GA BuiltIn unknown
History
Date/Time (UTC ymd) (i) Change type Change detail
2023-05-22 17:43:18 change Patch (1.0.0 > 1.0.1)
2022-12-21 17:43:51 add 51c1490f-3319-459c-bbbc-7f391bbed753
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC