π‘οΈ Azure Key Vault Role Based Access Control is not enabledπ’
- Contextual name: π‘οΈ Role Based Access Control is not enabledπ’
- ID:
/ce/ca/azure/key-vault/role-based-access-control - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
- π Azure Key Vault
- π Azure Key Vault - object.extracts.yaml
- π§ͺ test-data.json
Similar Policiesβ
- Internal:
dec-x-c8041456
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-c8041456 | 1 |
Descriptionβ
Descriptionβ
The recommended way to access Key Vaults is to use the Azure Role-Based Access Control (RBAC) permissions model.
Azure RBAC is an authorization system built on Azure Resource Manager that provides fine-grained access management of Azure resources. It allows users to manage key, secret, and certificate permissions. This provides one place to manage permissions across all Key Vaults.
Rationaleβ
The RBAC permissions model for Key Vaults enables much finer-grained access control for secrets, keys, certificates, and more than the vault access policy. This permits the use of privileged identity management over these roles, securing Key Vaults with JIT access management.
Impactβ
Implementation needs to be properly designed from the ground up, as this is a fundamental change to the way Key Vaults are accessed and managed. Changing permissions can result in service disruption while permissions are re-applied. To minimize downtime, map current groups and users to their corresponding permission needs.
Auditβ
... see more
Remediationβ
Remediationβ
From Azure Portalβ
Key Vaults can be configured to use
Azure role-based access controlat creation.For existing Key Vaults:
- In the Azure portal, open the portal menu in the upper-left corner.
- Select
Key Vaults.- Select a Key Vault to configure.
- Select
Access configuration.- Set the permission model radio button to
Azure role-based access control, taking note of the warning message.- Click
Save.- Select
Access Control (IAM).- Select the
Role Assignmentstab.- Reapply permissions as needed for groups or users.
From Azure CLIβ
To enable RBAC Authorization for each Key Vault, run the following Azure CLI command:
az keyvault update \
--resource-group {{resource-group-name}} \
--name {{key-vault-name}} \
--enable-rbac-authorization trueFrom PowerShellβ
To enable RBAC authorization on each Key Vault, run the following PowerShell command:
Update-AzKeyVault `
-ResourceGroupName {{resource-group-name}} `
-VaultName {{key-vault-name}} `
-EnableRbacAuthorization $True
... [see more](remediation.md)