Disabling public network access improves security by ensuring that Azure Web PubSub service isn't exposed on the public internet. Creating private endpoints can limit exposure of Azure Web PubSub service. Learn more at: https://aka.ms/awps/networkacls.
The following 2 compliance controls are associated with this Policy definition 'Azure Web PubSub Service should disable public network access' (bf45113f-264e-4a87-88f9-29ac8a0aca6a)
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
**Security Principle:**
Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible.
**Azure Guidance:**
Deploy private endpoints for all Azure resources that support the Private Link feature, to establish a private access point for the resources. You should also disable or restrict public network access to services where feasible.
For certain services, you also have the option to deploy VNet integration for the service where you can restrict the VNET to establish a private access point for the service.
**Implementation and additional context:**
Understand Azure Private Link:
https://docs.microsoft.com/azure/private-link/private-link-overview
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
displayName: "Azure Web PubSub Service should disable public network access",
policyType: "BuiltIn",
mode: "Indexed",
description: "Disabling public network access improves security by ensuring that Azure Web PubSub service isn't exposed on the public internet. Creating private endpoints can limit exposure of Azure Web PubSub service. Learn more at: https://aka.ms/awps/networkacls.",