Back to controls

Ensure Service Bus namespaces disable public network access

Service Bus should not be directly reachable from public networks when private connectivity can be used.

Category

Controls

High

Applies to

Microsoft Azure

Coverage

null controls, 1 queries

Asset types

1 covered

Overview

Service Bus should not be directly reachable from public networks when private connectivity can be used.

Remediation guidance

Azure Remediation

Service-Wide (Recommended)

Use Azure Policy to require private endpoint connectivity and deny public network access for Service Bus.

Azure Portal (Asset-Level)

  1. Open Service Bus namespace.
  2. Go to Networking.
  3. Disable public network access.
  4. Configure Private Endpoint and approved networks.

Azure CLI (Asset-Level)

az servicebus namespace update --name <namespace-name> --resource-group <resource-group> --public-network-access Disabled

References

  • https://learn.microsoft.com/en-us/azure/service-bus-messaging/network-security

Query logic

These are the stored checks tied to this control.

Service Bus namespaces with public network enabled

Connectors

Microsoft Azure

Covered asset types

SBNamespace

Expected check: eq []

{ sbNamespaces(where: { publicNetworkAccess_NOT: "Disabled" }) { ...AssetFragment } }
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon