Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
Ensure Databricks Workspace data plane to control plane communication happens over private link.
[//]: # "
PR Title
Be aware that we use the title to create changelog automatically and therefore only allow specific prefixes
- break: to indicate a breaking change, this supersedes any of the types
- feat: to indicate new features or checks
- fix: to indicate a bugfix or handling of edge cases of existing checks
- docs: to indicate an update to our documentation
- chore: to indicate adjustments to workflow files or dependency updates
- platform: to indicate a change needed for the platform
Additionally a scope is needs to be added to the prefix, which indicates the targeted framework, in doubt choose 'general'.
#
Allowed prefixs:
ansible|argo|arm|azure|bicep|bitbucket|circleci|cloudformation|dockerfile|github|gha|gitlab|helm|kubernetes|kustomize|openapi|sast|sca|secrets|serverless|terraform|general|graph|terraform_plan|terraform_json
#
ex.
feat(terraform): add CKV_AWS_123 to ensure that VPC Endpoint Service is configured for Manual Acceptance
"
Description
Ensure Databricks Workspace data plane to control plane communication happens over private link.
New/Edited policies (Delete if not relevant)
CKV_AZURE_158 - Adding ARM policy (also updating Terraform policy description)
Description
Private Link provides private connectivity from Azure VNets and on-premises networks to Azure services without exposing the traffic to the public network.
Ensure Databricks Workspace data plane to control plane communication happens over private link.
[//]: # "
PR Title
"
Description
Ensure Databricks Workspace data plane to control plane communication happens over private link.
New/Edited policies (Delete if not relevant)
CKV_AZURE_158 - Adding ARM policy (also updating Terraform policy description)
Description
Private Link provides private connectivity from Azure VNets and on-premises networks to Azure services without exposing the traffic to the public network.
https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/private-link
Fix
How does someone fix the issue in code and/or in runtime?
Checklist: