Skip to content

zt_data_022 — Databricks workspace deploys worker VMs with public IPs

Summary

Severity: High · Pillar: Network · Chain role: AMPLIFIER

Description

Databricks workspaces created without 'noPublicIp'=true provision each driver and worker with a public IP address. Worker nodes then initiate outbound connections to the Databricks control plane from a public endpoint, and any misconfigured NSG/firewall leaves them reachable from the internet. Secure cluster connectivity (noPublicIp=true) keeps workers on private IPs only.

Mapping

Framework Control / Reference
NIST 800-53 SC-7
NIST 800-207 Tenet 5 - All resource authentication and authorization are dynamic and strictly enforced before access is allowed
CIS Azure
MITRE ATT&CK Technique T1190
MITRE ATT&CK Tactic Initial Access
Zero-Trust Tenet Tenet 5
Framework tags nist-800-207, argus-zt

Source

Rule defined at policies/azure/zt/data/zt_data_022.rego.

View on GitHub