last sync: 2024-Sep-18 17:50:24 UTC

Public network access on Azure Data Explorer should be disabled

Azure BuiltIn Policy definition

Source Azure Portal
Display name Public network access on Azure Data Explorer should be disabled
Id 43bc7be6-5e69-4b0d-a2bb-e815557ca673
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.0
Built-in Versioning [Preview]
Category Azure Data Explorer
Microsoft Learn
Description Disabling the public network access property improves security by ensuring Azure Data Explorer can only be accessed from a private endpoint. This configuration denies all logins that match IP or virtual network based firewall rules.
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Deny, Disabled
RBAC role(s) none
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Kusto/clusters/publicNetworkAccess Microsoft.Kusto clusters properties.publicNetworkAccess True True
Rule resource types IF (1)
Microsoft.Kusto/clusters
Compliance
The following 1 compliance controls are associated with this Policy definition 'Public network access on Azure Data Explorer should be disabled' (43bc7be6-5e69-4b0d-a2bb-e815557ca673)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
mp.com.1 Secure perimeter mp.com.1 Secure perimeter 404 not found n/a n/a 49
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
Public network access should be disabled for PaaS services Deny-PublicPaaSEndpoints Network GA ALZ
Spain ENS 175daf90-21e1-4fec-b745-7b4c909aa94c Regulatory Compliance GA BuiltIn
History
Date/Time (UTC ymd) (i) Change type Change detail
2023-02-27 19:03:54 add 43bc7be6-5e69-4b0d-a2bb-e815557ca673
JSON compare n/a
JSON
api-version=2021-06-01
EPAC