turbot/steampipe-mod-azure-compliance

Control: 2.1.10 Ensure 'Allow Public Network Access' is set to 'Disabled'

Description

Disable public network access to prevent exposure to the internet and reduce the risk of unauthorized access. Use private endpoints to securely manage access within trusted networks.

Disabling public network access improves security by ensuring that Azure Databricks workspaces are not exposed on the public internet.

Remediation

Remediate from Azure Portal

  1. Go to Azure Databricks.
  2. Click the name of a workspace.
  3. Under Settings click Networking.
  4. Under Network access, next to Allow Public Network Access, click the radio button next to Disabled.
  5. Click Save.
  6. Repeat steps 1-5 for each workspace requiring remediation.

Remediate from Azure CLI

For each workspace requiring remediation, run the following command to set publicNetworkAccess to Disabled:

az databricks workspace update --resource-group <resource-group> --name <workspace> --public-network-access Disabled

Remediate from PowerShell

For each workspace requiring remediation, run the following command to set PublicNetworkAccess to Disabled:

Update-AzDatabricksWorkspace -ResourceGroupName <resource-group> -Name <workspace> -PublicNetworkAccess Disabled

Default Value:

Allow Public Network Access is set to Enabled by default.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v500_2_1_10

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v500_2_1_10 --share

SQL

This control uses a named query:

select
id as resource,
'info' as status,
'Manual verification required.' as reason,
display_name as subscription
from
azure_subscription;

Tags