Control: 3.1.2 Ensure that network security groups are configured for Databricks subnets
Description
Network Security Groups (NSGs) should be implemented to control inbound and outbound traffic to Azure Databricks subnets, ensuring only authorized communication. NSGs should be configured with deny rules to block unwanted traffic and restrict communication to essential sources only.
Remediation
From Azure Portal
- Assign NSG to Databricks subnets under Networking > NSG Settings.
Default Value
By default, Databricks subnets do not have NSGs assigned.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v400_3_1_2
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v400_3_1_2 --share
SQL
This control uses a named query:
select id as resource, 'info' as status, 'Manual verification required.' as reason, display_name as subscriptionfrom azure_subscription;