last sync: 2024-Jul-26 18:17:39 UTC

Azure Machine Learning Computes should be in a virtual network

Azure BuiltIn Policy definition

Source Azure Portal
Display name Azure Machine Learning Computes should be in a virtual network
Id 7804b5c7-01dc-4723-969b-ae300cc07ff1
Version 1.0.1
Details on versioning
Category Machine Learning
Microsoft Learn
Description Azure Virtual Networks provide enhanced security and isolation for your Azure Machine Learning Compute Clusters and Instances, as well as subnets, access control policies, and other features to further restrict access. When a compute is configured with a virtual network, it is not publicly addressable and can only be accessed from virtual machines and applications within the virtual network.
Mode All
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Disabled
RBAC role(s) none
Rule aliases IF (2)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.MachineLearningServices/workspaces/computes/computeType Microsoft.MachineLearningServices workspaces/computes properties.computeType True False
Microsoft.MachineLearningServices/workspaces/computes/subnet.id Microsoft.MachineLearningServices workspaces/computes properties.properties.subnet.id True False
Rule resource types IF (1)
Microsoft.MachineLearningServices/workspaces/computes
Compliance
The following 2 compliance controls are associated with this Policy definition 'Azure Machine Learning Computes should be in a virtual network' (7804b5c7-01dc-4723-969b-ae300cc07ff1)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v3.0 NS-2 Azure_Security_Benchmark_v3.0_NS-2 Microsoft cloud security benchmark NS-2 Network Security Secure cloud services with network controls Shared **Security Principle:** Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible. **Azure Guidance:** Deploy private endpoints for all Azure resources that support the Private Link feature, to establish a private access point for the resources. You should also disable or restrict public network access to services where feasible. For certain services, you also have the option to deploy VNet integration for the service where you can restrict the VNET to establish a private access point for the service. **Implementation and additional context:** Understand Azure Private Link: https://docs.microsoft.com/azure/private-link/private-link-overview n/a link 39
U.07.1 - Isolated U.07.1 - Isolated 404 not found n/a n/a 56
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
Microsoft cloud security benchmark 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA BuiltIn
NL BIO Cloud Theme 6ce73208-883e-490f-a2ac-44aac3b3687f Regulatory Compliance GA BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2023-05-22 17:43:18 change Patch (1.0.0 > 1.0.1)
2021-10-08 15:47:40 add 7804b5c7-01dc-4723-969b-ae300cc07ff1
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC