Control: 2.1.11 Ensure private endpoints are used to access Azure Databricks workspaces
Description
Use private endpoints for Azure Databricks workspaces to allow clients and services to securely access data located over a network via an encrypted Private Link. To do this, the private endpoint uses an IP address from the VNet for each service. Network traffic between disparate services securely traverses encrypted over the VNet. This VNet can also link addressing space, extending your network and accessing resources on it. Similarly, it can be a tunnel through public networks to connect remote infrastructures together. This creates further security through segmenting network traffic and preventing outside sources from accessing it.
Using private endpoints for Azure Databricks workspaces ensures that all communication between clients, services, and data sources occurs over a secure, private IP space within an Azure Virtual Network (VNet). This approach eliminates exposure to the public internet, significantly reducing the attack surface and aligning with Zero Trust principles. Additionally, integrating Databricks with a VNet enables network segmentation, fine-grained access control, and hybrid connectivity through VNet peering or VPN/ExpressRoute.
Remediation
Remediate from Azure Portal
- Go to
Azure Databricks. - Click the name of a workspace.
- Under
Settings, clickNetworking. - Click
Private endpoint connections. - Click
+ Private endpoint. - Under
Project details,select aSubscriptionand aResource group. - Under
Instance details,provide aName,Network Interface Name, and select aRegion. - Click
Next : Resource >. - Select a
Target sub-resource. - Click
Next : Virtual Network >. - Under
Networking, select aVirtual networkand aSubnet. - Optionally, configure
Private IP configurationandApplication security group. - Click
Next : DNS >. - Optionally, configure
Private DNS integration. - Click
Next : Tags >. - Optionally, configure tags.
- Click
Next : Review + create >. - Click
Create. - Repeat steps 1-18 for each workspace requiring remediation
Remediate from Azure CLI
For each workspace requiring remediation, run the following command to create a private endpoint connection:
az network private-endpoint create --resource-group <resource-group> --name <private-endpoint> --location <location> --vnet-name <virtual-network> --subnet <subnet> --private-connection-resource-id <workspace> --connectionname <private-endpoint-connection> --group-id <browser_authentication|databricks_ui_api>
Default Value:
Private endpoints are not configured for Azure Databricks workspaces by default.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v500_2_1_11Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v500_2_1_11 --shareSQL
This control uses a named query:
select id as resource, 'info' as status, 'Manual verification required.' as reason, display_name as subscriptionfrom azure_subscription;