To provide optimal access security and adhere to the Principle of Least Privilege (POLP), ensure there are no custom administrator roles created for your Microsoft Azure cloud subscriptions. POLP involves assigning only the necessary privileges instead of granting full administrative access.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Administrators with appropriate permissions are responsible for managing Azure account subscriptions. Classic subscription admin roles, such as Account Administrator, Service Administrator, and Co-Administrators, provide sufficient access management capabilities and should not required custom administrator privileges. Misconfigured custom IAM roles with subscription administrator privileges can provide broad and unrestricted access to your Azure subscriptions. By removing custom IAM roles that grant subscription administrator privileges in Azure cloud you can enhance security, reduce the risk of unauthorized access, comply with regulatory requirements, mitigate insider threats, and enforce the Principle of Least Privilege.
Audit
To determine if there are any custom subscription administrator roles in your Azure cloud account, perform the following actions:
Remediation / Resolution
To remove custom IAM roles that grant subscription administrator privileges, perform the following actions:
Ensure that any role assignments are removed from your non-compliant IAM role before the role can be deleted.References
- Azure Official Documentation
- Azure custom roles
- Azure classic subscription administrators
- Add or change Azure subscription administrators
- Security Control v3: Governance and strategy
- Azure Command Line Interface (CLI) Documentation
- az role definition list
- az role definition delete