Mods

Policy: Azure > CIS v4.0 > 02 - Common Reference Recommendations > 02.02 - Networking > 02.02.01 - Virtual Networks (VNets) > 02.02.01.01 - Ensure public network access is Disabled

Configures auditing against a CIS Benchmark item.

Level: 1

Disabling public network access for Azure services reduces the attack surface by ensuring that resources can only be accessed from authorized private networks.

This is a cross-cutting control that applies to multiple Azure services including Cognitive Services, Container Registry, Data Factory, Key Vault, MariaDB, MySQL, PostgreSQL, Search Services, SQL Database, and Storage Accounts.

Targets

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Controls

Setting this policy configures this control:

Policy Specification

Schema Type
string
Default
Per Azure > CIS v4.0 > 02 - Common Reference Recommendations > 2.2.1 - Virtual Networks
Valid Values [YAML]
  • >-
      Per Azure > CIS v4.0 > 02 - Common Reference Recommendations > 2.2.1 - Virtual
      Networks
    
  • Skip
    
  • Check: Benchmark using attestation
    

Category

In Your Workspace

Developers