last sync: 2025-Oct-31 18:22:59 UTC

Azure Purview accounts should use private link

Azure BuiltIn Policy definition

Source Azure Portal
Display name Azure Purview accounts should use private link
Id 9259053b-ddb8-40ab-842a-0aef19d0ade4
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.0
Built-in Versioning [Preview]
Category Azure Purview
Microsoft Learn
Description Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Azure Purview accounts instead of the entire service, you'll also be protected against data leakage risks. Learn more at: https://aka.ms/purview-private-link.
Cloud environments AzureCloud = true
AzureUSGovernment = unknown
AzureChinaCloud = unknown
Available in AzUSGov Unknown, no evidence if Policy definition is/not available in AzureUSGovernment
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Disabled
RBAC role(s) none
Rule aliases IF (2)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Purview/accounts/privateEndpointConnections[*] Microsoft.Purview accounts properties.privateEndpointConnections[*] True False
Microsoft.Purview/accounts/privateEndpointConnections[*].privateLinkServiceConnectionState.status Microsoft.Purview accounts properties.privateEndpointConnections[*].properties.privateLinkServiceConnectionState.status True False
Rule resource types IF (1)
Compliance
The following 1 compliance controls are associated with this Policy definition 'Azure Purview accounts should use private link' (9259053b-ddb8-40ab-842a-0aef19d0ade4)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v3.0 NS-2 Azure_Security_Benchmark_v3.0_NS-2 Microsoft cloud security benchmark NS-2 Network Security NS-2 Secure cloud services with network controls Shared **Security Principle:** Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible. **Azure Guidance:** Deploy private endpoints for all Azure resources that support the Private Link feature, to establish a private access point for the resources. You should also disable or restrict public network access to services where feasible. For certain services, you also have the option to deploy VNet integration for the service where you can restrict the VNET to establish a private access point for the service. **Implementation and additional context:** Understand Azure Private Link: https://docs.microsoft.com/azure/private-link/private-link-overview n/a link 126
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
[Preview]: Microsoft cloud security benchmark v2 e3ec7e09-768c-4b64-882c-fcada3772047 Security Center Preview BuiltIn unknown
Evaluate Private Link Usage Across All Supported Azure Resources 7379ef4c-89b0-48b6-a5cc-fd3a75eaef93 SDN GA BuiltIn unknown
History
Date/Time (UTC ymd) (i) Change type Change detail
2022-01-07 18:14:35 add 9259053b-ddb8-40ab-842a-0aef19d0ade4
JSON compare n/a
JSON
api-version=2021-06-01
EPAC