Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
Azure
Loading policies...

Policy: Azure > Cosmos DB > Database Account > Public Network Access

Define the Public Network Access settings required for Azure > Cosmos DB > Database Account.

This policy determines whether public network access is permitted for Azure Cosmos DB Database Accounts. The policy can be set to Enabled, Disabled, or SecuredByPerimeter. When public network access is disabled, the database account can only be accessed through private endpoints, providing enhanced security by preventing public internet access to the service. When set to "Check: Disabled" or "Check: Enabled", the control will go to an alarm state if the database account's setting does not match the policy. When set to "Enforce: Disabled" or "Enforce: Enabled", the control will automatically configure the property to match the policy. Setting the policy to "Skip" will exclude the database account from this check.

Targets

This policy targets the following resource types:

  • Azure > Cosmos DB > Database Account

Controls

Setting this policy configures this control:

  • Azure > Cosmos DB > Database Account > Public Network Access

Policy Specification

Schema Type
string
Default
Skip
Valid Values [YAML]
  • Skip
    
  • Check: Enabled
    
  • Check: Disabled
    
  • Check: SecuredByPerimeter
    
  • Enforce: Enabled
    
  • Enforce: Disabled
    
  • Enforce: SecuredByPerimeter
    
Examples [YAML]
  • Check: Disabled
    

Category

  • Security

In Your Workspace

  • Policy Settings by Type report

Developers

    Category URI
    • tmod:@turbot/turbot#/control/categories/security
  • Policy Type URI
    • tmod:@turbot/azure-cosmosdb#/policy/types/databaseAccountPublicNetworkAccess
  • GraphQL
    • query policyType(id: "tmod:@turbot/azure-cosmosdb#/policy/types/databaseAccountPublicNetworkAccess") { … }
    • query policySettings(filter: "policyTypeId:'tmod:@turbot/azure-cosmosdb#/policy/types/databaseAccountPublicNetworkAccess'") { … }
    • query policyValues(filter: "policyTypeId:'tmod:@turbot/azure-cosmosdb#/policy/types/databaseAccountPublicNetworkAccess'") { … }
  • CLI
    • Get Policy Type
    • turbot graphql policy-type --id "tmod:@turbot/azure-cosmosdb#/policy/types/databaseAccountPublicNetworkAccess"
    • Get Policy Settings
    • turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cosmosdb#/policy/types/databaseAccountPublicNetworkAccess"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
50
Mods
205
Resource Types
3,574
Policies
1,936
Controls
103
Quick Actions
114
IAM