Back to controls

Ensure Azure Container Registry public network access is disabled

Container registries should use private endpoints where possible to minimize internet exposure.

Category

Controls

High

Applies to

Microsoft Azure

Coverage

null controls, 1 queries

Asset types

1 covered

Overview

Container registries should use private endpoints where possible to minimize internet exposure.

Remediation guidance

Azure Remediation

Service-Wide (Recommended)

Use Azure Policy to enforce private endpoint patterns and restrict public network access.

Azure Portal (Asset-Level)

  1. Open Container Registry.
  2. Go to Networking.
  3. Set public network access to Disabled.
  4. Configure Private Endpoint connectivity.

Azure CLI (Asset-Level)

az acr update --name <acr-name> --resource-group <resource-group> --public-network-enabled false

References

  • https://learn.microsoft.com/en-us/azure/container-registry/container-registry-private-link

Query logic

These are the stored checks tied to this control.

Container registries with public network enabled

Connectors

Microsoft Azure

Covered asset types

ContainerRegistry

Expected check: eq []

{ containerRegistries(where: { OR: [ { publicNetworkAccess_NOT: "Disabled" }, { networkRuleBypassOptions_INCLUDES: "AzureServices" } ] }) { ...AssetFragment } }
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon