🛡️ Azure Subscription Resource Lock Administrator Custom Role does not exist🟢⚪
- Contextual name: 🛡️ Resource Lock Administrator Custom Role does not exist🟢⚪
- ID:
/ce/ca/azure/subscription/resource-lock-administrator-custom-role - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Similar Policies
- Cloud Conformity: Resource Locking Administrator Role
Description
Description
Resource locking is a powerful protection mechanism that can prevent inadvertent modification/deletion of resources within Azure subscriptions/Resource Groups and is a recommended NIST configuration.
Rationale
Given the resource lock functionality is outside of standard Role Based Access Control(RBAC),s it would be prudent to create a resource lock administrator role to prevent inadvertent unlocking of resources.
Impact
By adding this role, specific permissions may be granted for managing just resource locks rather than needing to provide the wide Owner or User Access Administrator role, reducing the risk of the user being able to do unintentional damage.
Audit
From Azure Portal
- In the Azure portal, open a subscription or resource group where you want to view assigned roles.
- Select
Access control (IAM).- Select
Roles.- Click
Type : All.- Click to view the drop-down menu.
- Select
Custom role.- Click
Viewin theDetailscolumn of a custom role.- Review the role permissions.
... see more
Remediation
Remediation
From Azure Portal
- In the Azure portal, open a subscription or resource group where you want the custom role to be assigned.
- Select
Access control (IAM).- Click
Add.- Select
Add custom role.- In the
Custom Role Namefield enterResource Lock Administrator.- In the
Descriptionfield enterCan Administer Resource Locks.- For
Baseline permissionsselectStart from scratch- Select
Next.- Click
Add permissions.- In the
Search for a permissionbox, typeMicrosoft.Authorization/locks.- Click on the result.
- Check the box next to
Permission.- Click
Add.- Click
Review + create.- Click
Create.- Click
OK.- Click
+ Add.- Click
Add role assignment.- In the
Search by role name, description, permission, or IDbox, typeResource Lock Administrator.- Select the role.
- Click
Next.- Click
+ Select members.- Select appropriate members.
- Click
Select.- Click
Review + assign.- Click
Review + assignagain.- Repeat steps 1-26 for each subscription or resource group requiring remediation.
... see more
policy.yaml
Linked Framework Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v5.0.0 → 💼 5.24 Ensure that a custom role is assigned permissions for administering resource locks (Manual) | 1 | no data | |||
| 💼 Cloudaware Framework → 💼 Role-Based Access Control (RBAC) Management | 18 | no data |