🛡️ Azure disabled User Accounts have read, write, or owner permissions🟢⚪
- Contextual name: 🛡️ Disabled User Accounts have read, write, or owner permissions🟢⚪
- ID:
/ce/ca/azure/subscription/disabled-user-accounts-permissions - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Description
Description
Ensure that any roles granting read, write, or owner permissions are removed from disabled Azure user accounts.
While an automated assessment procedure exists for this recommendation, the assessment status remains manual. Removing role assignments from disabled user accounts depends on the context and requirements of each organization and environment.
Rationale
Disabled accounts should not retain access to resources, as this poses a security risk. Removing role assignments mitigates potential unauthorized access and enforces the principle of least privilege.
Impact
Ensure disabled accounts are not relied on for break glass or automated processes before removing roles to avoid service disruption.
Audit
From Azure Portal
- Go to
Microsoft Entra ID.- Under
Manage, clickUsers.- Click
Add filter.- Click
Account enabled.- Click the toggle switch to set the value to
No.- Click
Apply.- Click the
Display nameof a disabled user account.- Click
Azure role assignments.- Ensure that no read, write, or owner roles are assigned to the user account.
... see more
Remediation
Remediation
From Azure Portal
- Go to
Microsoft Entra ID.- Under
Manage, clickUsers.- Click
Add filter.- Click
Account enabled.- Click the toggle switch to set the value to
No.- Click
Apply.- Click the
Display nameof a disabled user account with read, write, or owner roles assigned.- Click
Azure role assignments.- Click the name of a read, write, or owner role.
- Click
Assignments.- Click
Removein the row for the disabled user account.- Click
Yes.- Repeat steps 7-12 for disabled user accounts requiring remediation.
From PowerShell
For each account requiring remediation, run the following command to remove an assigned role:
Remove-AzRoleAssignment -ObjectId $user.ObjectId -RoleDefinitionName <role-definition-name>
policy.yaml
Linked Framework Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v5.0.0 → 💼 5.3.5 Ensure disabled user accounts do not have read, write, or owner permissions (Manual) | 1 | no data | |||
| 💼 Cloudaware Framework → 💼 Threat Protection | 49 | no data |