2.1.9 Ensure 'No Public IP' is set to 'Enabled'

Information

Enable secure cluster connectivity (also known as no public IP) on Azure Databricks workspaces to ensure that clusters do not have public IP addresses and communicate with the control plane over a secure connection.

Enabling secure cluster connectivity limits exposure to the public internet, improving security and reducing the risk of external attacks.

Solution

Remediate from Azure Portal

- Go to Azure Databricks.
- Click the name of a workspace.
- Under Settings, click Networking.
- Under Network access, next to Deploy Azure Databricks workspace with Secure Cluster Connectivity (No Public IP), click the radio button next to Enabled.
- Click Save.
- Repeat steps 1-5 for each workspace requiring remediation.

Remediate from Azure CLI

For each workspace requiring remediation, run the following command to set enableNoPublicIp to true :

az databricks workspace update --resource-group <resource-group> --name <workspace> --enable-no-public-ip true

Remediate from PowerShell

For each workspace requiring remediation, run the following command to set EnableNoPublicIP to True :

Update-AzDatabricksWorkspace -ResourceGroupName <resource-group> -Name <workspace> -EnableNoPublicIP

Impact:

Enabling secure cluster connectivity requires careful network configuration. Before secure cluster connectivity can be enabled, Azure Databricks workspaces must be deployed in a customer-managed virtual network (VNet injection)-refer to the recommendation Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet).

See Also

https://workbench.cisecurity.org/benchmarks/21611

Item Details

Category: ACCESS CONTROL, MEDIA PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|MP-2, CSCv7|14.6

Plugin: microsoft_azure

Control ID: c5886bfee87a6484c0572c5ef60756eb4d420e983655489037f678455f5d0002