3.1.2 Ensure that network security groups are configured for Databricks subnets

Information

Network Security Groups (NSGs) should be implemented to control inbound and outbound traffic to Azure Databricks subnets, ensuring only authorized communication. NSGs should be configured with deny rules to block unwanted traffic and restrict communication to essential sources only.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Remediate from Azure Portal

- Assign NSG to Databricks subnets under Networking > NSG Settings.

Impact:

- NSGs require periodic maintenance to ensure rule accuracy.
- Misconfigured NSGs could inadvertently block required traffic.

See Also

https://workbench.cisecurity.org/benchmarks/19304

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CA-9, 800-53|SC-7, 800-53|SC-7(5), CSCv7|9.4

Plugin: microsoft_azure

Control ID: e25a3cc806918068eaed9b463bb336abbfc4db96be919bf185e40d18899fa295