π Azure Privileged Role Assignments are not periodically reviewed π’
- Contextual name: π Privileged Role Assignments are not periodically reviewed π’
- ID:
/ce/ca/azure/subscription/privileged-role-assignments
- Located in: π Azure Subscription
Flagsβ
- π’ Impossible policy
- π’ Policy with categories
- π’ Policy with type
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Descriptionβ
Descriptionβ
Periodic review of privileged role assignments is performed to ensure that the privileged roles assigned to users are accurate and appropriate.
Rationaleβ
Privileged roles are crown jewel assets that can be used by malicious insiders, threat actors, and even through mistake to significantly damage an organization in numerous ways. These roles should be periodically reviewed to:
- identify lingering permissions assignment (e.g. an administrator has been terminated, the administrator account is being retained, but the permissions are no longer necessary and has not been properly addressed by process)
- detect lateral movement through privilege escalation (e.g. an account with administrative permission has been compromised and is elevating other accounts in an attempt to circumvent detection mechanisms)
Impactβ
Increased administrative effort to manage and remove role assignments appropriately.
Auditβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Subscriptions
.- Select a subscription.
... see more
Remediationβ
Remediationβ
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v4.0.0 β πΌ 6.3.4 Ensure that all 'privileged' role assignments are periodically reviewed (Manual) | 1 | |||
πΌ Cloudaware Framework β πΌ Role-Based Access Control (RBAC) Management | 13 |