π Azure Subscription Custom Subscription Administrator Roles exist π’
- Contextual name: π Custom Subscription Administrator Roles exist π’
- ID:
/ce/ca/azure/subscription/custom-subscription-administrator-roles-exist
- Located in: π Azure Subscription
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
The principle of least privilege should be followed and only necessary privileges should be assigned instead of allowing full administrative access.
Rationaleβ
Custom roles in Azure with administrative access can obfuscate the permissions granted and introduce complexity and blind spots to the management of privileged identities. For less mature security programs without regular identity audits, the creation of Custom roles should be avoided entirely. For more mature security programs with regular identity audits, Custom Roles should be audited for use and assignment, used minimally, and the principle of least privilege should be observed when granting permissions.
Impactβ
Subscriptions will need to be handled by Administrators with permissions.
Auditβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Subscriptions
.- Select a subscription.
- Select
Access control (IAM)
.- Select
Roles
.- Click
Type
and selectCustom role
from the drop-down menu.- Select
View
next to a role.... see more
Remediationβ
Remediationβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Subscriptions
.- Select a subscription.
- Select
Access control (IAM)
.- Select
Roles
.- Click
Type
and selectCustom role
from the drop-down menu.- Check the box next to each role which grants subscription administrator privileges.
- Select
Delete
.- Select
Yes
.From Azure CLIβ
List custom roles:
az role definition list --custom-role-only True
Check for entries with
assignableScope
of thesubscription
, and an action of*
.To remove a violating role:
az role definition delete --name <role name>
Note that any role assignments must be removed before a custom role can be deleted. Ensure impact is assessed before deleting a custom role granting subscription administrator privileges.
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v2.1.0 β πΌ 1.22 Ensure That No Custom Subscription Administrator Roles Exist - Level 1 (Automated) | 1 | |||
πΌ CIS Azure v3.0.0 β πΌ 2.23 Ensure That No Custom Subscription Administrator Roles Exist (Automated) | 1 | |||
πΌ Cloudaware Framework β πΌ Role-Based Access Control (RBAC) Management | 9 |