Skip to main content

πŸ’Ό Role-Based Access Control (RBAC) Management

  • Contextual name: πŸ’Ό Role-Based Access Control (RBAC) Management
  • ID: /frameworks/cloudaware/identity-and-access-governance/rbac-management
  • Located in: πŸ’Ό Identity & Access Governance

Description​

Policies for identifying excessive or improperly configured access rights based on roles.

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (9)​

PolicyLogic CountFlags
πŸ“ AWS IAM Role unused 🟒1🟒 x6
πŸ“ AWS Support Role is not created 🟒1🟒 x6
πŸ“ Azure Subscription Custom Subscription Administrator Roles exist 🟒1🟒 x6
πŸ“ Azure Subscription Resource Lock Administrator Custom Role does not exist 🟒🟒 x3
πŸ“ Google IAM Roles related to KMS are not assigned to separate users 🟒1🟒 x6
πŸ“ Google IAM Service Account has admin privileges 🟒1🟒 x6
πŸ“ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level 🟒1🟒 x6
πŸ“ Google User has both Service Account Admin and Service Account User roles assigned 🟒1🟒 x6
πŸ“ Microsoft Entra ID Global Administrator Role assigned to more than 4 users 🟒🟒 x3