Skip to main content

💼 Role-Based Access Control (RBAC) Management

  • ID: /frameworks/cloudaware/identity-and-access-governance/rbac-management

Description

Policies for identifying excessive or improperly configured access rights based on roles.

Similar

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (14)

PolicyLogic CountFlagsCompliance
🛡️ AWS EKS Cluster has node IAM role with AmazonEKS_CNI_Policy attached🔴🟢1🔴 x1, 🟢 x6no data
🛡️ AWS EKS Cluster IAM OIDC provider is not created🟢1🟢 x6no data
🛡️ AWS IAM Role unused🟢1🟢 x6no data
🛡️ AWS Support Role is not created🟢1🟢 x6no data
🛡️ Azure Privileged Role Assignments are not periodically reviewed🟢⚪🟢 x2, ⚪ x1no data
🛡️ Azure Subscription Custom Subscription Administrator Roles exist🟢1🟢 x6no data
🛡️ Azure Subscription Resource Lock Administrator Custom Role does not exist🟢⚪🟢 x2, ⚪ x1no data
🛡️ Azure User Access Administrator Role has assignments🟢1🟢 x6no data
🛡️ Google IAM Roles related to KMS are not assigned to separate users🟢1🟢 x6no data
🛡️ Google IAM Service Account has admin privileges🟢1🟢 x6no data
🛡️ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level🟢1🟢 x6no data
🛡️ Google Resource Manager Organization has a Redis IAM role assigned🟢1🟢 x6no data
🛡️ Google User has both Service Account Admin and Service Account User roles assigned🟢1🟢 x6no data
🛡️ Microsoft Entra ID Global Administrator Role assigned to more than 4 users🟢⚪🟢 x2, ⚪ x1no data