🛡️ Azure Subscription Custom Subscription Administrator Roles exist🟢
- Contextual name: 🛡️ Custom Subscription Administrator Roles exist🟢
- ID:
/ce/ca/azure/subscription/custom-subscription-administrator-roles-exist - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- Cloud Conformity: Subscription Administrator Custom Role
Description
Description
The principle of least privilege should be followed and only necessary privileges should be assigned instead of allowing full administrative access.
Rationale
Custom roles in Azure with administrative access can obfuscate the permissions granted and introduce complexity and blind spots to the management of privileged identities. For less mature security programs without regular identity audits, the creation of Custom roles should be avoided entirely. For more mature security programs with regular identity audits, Custom Roles should be audited for use and assignment, used minimally, and the principle of least privilege should be observed when granting permissions.
Impact
Subscriptions will need to be handled by Administrators with permissions.
Audit
This policy marks an Azure Subscription as
INCOMPLIANTif it has a Custom Role that grants administrative privileges at the subscription level. This is detected by the wildcard ("*") action in the role’sPermissions Jsonalongside a /subscriptions/ entry in itsAssignable Scopes Json.... see more
Remediation
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Subscriptions.- Select a subscription.
- Select
Access control (IAM).- Select
Roles.- Click
Typeand selectCustom rolefrom the drop-down menu.- Check the box next to each role which grants subscription administrator privileges.
- Select
Delete.- Select
Yes.From Azure CLI
List custom roles:
az role definition list --custom-role-only TrueCheck for entries with
assignableScopeof thesubscription, and an action of*.To remove a violating role:
az role definition delete --name <role name>Note that any role assignments must be removed before a custom role can be deleted. Ensure impact is assessed before deleting a custom role granting subscription administrator privileges.
policy.yaml
Linked Framework Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v2.1.0 → 💼 1.22 Ensure That No Custom Subscription Administrator Roles Exist - Level 1 (Automated) | 1 | no data | |||
| 💼 CIS Azure v3.0.0 → 💼 2.23 Ensure That No Custom Subscription Administrator Roles Exist (Automated) | 1 | no data | |||
| 💼 CIS Azure v4.0.0 → 💼 6.23 Ensure that no custom subscription administrator roles exist (Automated) | 1 | no data | |||
| 💼 Cloudaware Framework → 💼 Role-Based Access Control (RBAC) Management | 14 | no data |