last sync: 2024-May-27 19:38:21 UTC

Service Bus Namespaces should disable public network access

Azure BuiltIn Policy definition

Source Azure Portal
Display name Service Bus Namespaces should disable public network access
Id cbd11fd3-3002-4907-b6c8-579f0e700e13
Version 1.1.0
Details on versioning
Category Service Bus
Microsoft Learn
Description Azure Service Bus should have public network access disabled. Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can limit exposure of your resources by creating private endpoints instead. Learn more at: https://docs.microsoft.com/azure/service-bus-messaging/private-link-service
Mode All
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Deny, Disabled
RBAC role(s) none
Rule aliases IF (2)
Alias Namespace ResourceType DefaultPath Modifiable
Microsoft.ServiceBus/namespaces/networkRuleSets/publicNetworkAccess Microsoft.ServiceBus namespaces/networkrulesets properties.publicNetworkAccess false
Microsoft.ServiceBus/namespaces/publicNetworkAccess Microsoft.ServiceBus namespaces properties.publicNetworkAccess true
Rule resource types IF (2)
Microsoft.ServiceBus/namespaces
Microsoft.ServiceBus/namespaces/networkRuleSets
Compliance Not a Compliance control
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
[Preview]: Control the use of Service Bus in a Virtual Enclave 8fcdb3f1-1369-426d-9917-81edfee903ab VirtualEnclaves Preview BuiltIn
Audit Public Network Access f1535064-3294-48fa-94e2-6e83095a5c08 SDN GA BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2023-01-13 18:06:06 change Minor (1.0.0 > 1.1.0)
2022-08-09 17:24:03 add cbd11fd3-3002-4907-b6c8-579f0e700e13
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC