Control: 8.5 Ensure that 'Disk Network Access' is NOT set to 'Enable public access from all networks'
Description
Virtual Machine Disks and snapshots can be configured to allow access from different network resources.
The setting 'Enable public access from all networks' is, in many cases, an overly permissive setting on Virtual Machine Disks that presents atypical attack, data infiltration, and data exfiltration vectors. If a disk to network connection is required, the preferred setting is to 'Disable public access and enable private access.'
Remediation
From Azure Portal
Part A. Select the Virtual Machine to Remediate
- Using the search bar, search for and open the
Virtual Machines
service. - Click on the name of the Virtual Machine to be remediated.
Part B. Remediate each Virtual Machine Disk individually
- From the selected Virtual Machine resource window, expand the
Settings
menu item and clickDisks.
- For each disk, click the name of the disk to open the disk resource window.
- From the selected Disk resource window, expand the
Settings
menu item, and clickNetworking
.
Under Network access, select the radio button for either:
- Disable public access and enable private access
- Disable public and private access
Repeat Part B for each Disk attached to a VM.
Repeat Parts A and B to remediate all Disks in all VMs.
From Powershell
To disable PublicNetworkAccess
and to set a DenyAll
setting for the disk's NetworkAccessPolicy
for each managed disk, run the following command:
$disk = Get-AzDisk -ResourceGroupName ‘<resource group name>’ -DiskName ‘<disk name>’$disk.NetworkAccessPolicy = 'DenyAll'$disk.PublicNetworkAccess = 'Disabled'Update-AzDisk -ResourceGroup '<resource group name> -DiskName $disk.Name -Disk $disk
To disable PublicNetworkAccess
and to set an AllowPrivate
setting for the disk's NetworkAccessPolicy
for each managed disk, run the following command:
$disk = Get-AzDisk -ResourceGroupName ‘<resource group name>’ -DiskName ‘<disk name>’$disk.NetworkAccessPolicy = 'AllowPrivate'$disk.PublicNetworkAccess = 'Disabled'$disk.DiskAccessId = '/subscriptions/<subscription ID>/resourceGroups/<resource group name>/providers/Microsoft.Compute/diskAccesses/<private disk access name>Update-AzDisk -ResourceGroup '<resource group name> -DiskName $disk.Name -Disk $disk
From Azure CLI
To configure a disk to allow private access only, run the following command making sure you have the Disk Access ID
from a private disk access end point.
az disk update --name <managed disk name> --resource-group <resource group name> --network-access-policy AllowPrivate --disk-access <disk access ID>
To completely disable public and private access for a disk, run the following command (still in preview) for each disk:
az disk update --name <managed disk name> --resource-group <resource group name> --public-network-access Disabled --network-access-policy DenyAll
Default Value
By default, Disk Network access is set to Enable public access from all networks
.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v300_8_5
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v300_8_5 --share
SQL
This control uses a named query:
compute_disk_public_access_disabled