2.1.10 Ensure 'Allow Public Network Access' is set to 'Disabled'

Information

Disable public network access to prevent exposure to the internet and reduce the risk of unauthorized access. Use private endpoints to securely manage access within trusted networks.

Disabling public network access improves security by ensuring that Azure Databricks workspaces are not exposed on the public internet.

Solution

Remediate from Azure Portal

- Go to Azure Databricks.
- Click the name of a workspace.
- Under Settings click Networking.
- Under Network access, next to Allow Public Network Access, click the radio button next to Disabled.
- Click Save.
- Repeat steps 1-5 for each workspace requiring remediation.

Remediate from Azure CLI

For each workspace requiring remediation, run the following command to set publicNetworkAccess to Disabled :

az databricks workspace update --resource-group <resource-group> --name <workspace> --public-network-access Disabled

Remediate from PowerShell

For each workspace requiring remediation, run the following command to set PublicNetworkAccess to Disabled :

Update-AzDatabricksWorkspace -ResourceGroupName <resource-group> -Name <workspace> -PublicNetworkAccess Disabled

Impact:

NOTE: Prior to disabling public network access, it is strongly recommended that, for each workspace, either:

- virtual network integration is completed as described in "Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet)"

OR

- private endpoints/links are set up as described in "Ensure private endpoints are used to access Azure Databricks workspaces."

Disabling public network access restricts access to the service. This enhances security but will require the configuration of a virtual network and/or private endpoints for any services or users needing access within trusted networks.

Before public network access can be disabled, Azure Databricks workspaces must be deployed in a customer-managed virtual network (VNet injection)-refer to the recommendation Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet), and requiredNsgRules must be set to a value other than AllRules.

See Also

https://workbench.cisecurity.org/benchmarks/21611

Item Details

Category: ACCESS CONTROL, MEDIA PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|MP-2, CSCv7|14.6

Plugin: microsoft_azure

Control ID: 6788703456941eaa9f278728f6b2fe0328ce3ec634e42928bb4a02cc27c690c3