lacework-global-512
1.23 Ensure That No Custom Subscription Owner Roles Are Created (Automated)
Profile Applicability
• Level 1
Description
Subscription ownership should not include permission to create custom owner roles. The principle of least privilege should be followed and only necessary privileges should be assigned instead of allowing full administrative access.
Rationale
Classic subscription admin roles offer basic access management and include Account Administrator, Service Administrator, and Co-Administrators. It is recommended the least necessary permissions be given initially. Permissions can be added as needed by the account holder. This ensures the account holder cannot perform actions which were not intended.
Impact
Subscriptions will need to be handled by Administrators with permissions.
Audit
From Azure Portal
- From Azure Home select
Subscriptions
underNavigate
- From Azure Home select the Portal Menu
- Select in the left column
Access control (IAM)
- In the row select of filters
Role:
, then the# Displayed
- In the list of checkmarks deselect
Show all
to display no roles. - Search for
Owner
or select it if it already displayed to show only users with the Owner role - Audit this list for accounts with the Owner Role.
From Azure CLI
az role definition list
Check for entries with assignableScope
of /
or a subscription
, and an action of *
Verify the usage and impact of removing the role identified
From Azure PowerShell
Connect-AzAccount
Get-AzRoleDefinition |Where-Object {($_.IsCustom -eq $true) -and ($_.Name -like "Owner")}
Review output for each returned role's 'AssignableScopes' value for '/' or the current subscription, and 'Actions' containing the '*' wildcard character.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu
- Select
Subscriptions
underNavigate
- Select in the left column
Access control (IAM)
- In the row select of filters
Role:
, then the# Displayed
- In the list of checkmarks deselect 'Show all' to display no roles.
- Search for
Owner
or select it if it already displayed to show only users with the Owner role - To remove this permission from a user, select the checkbox under the Owner
- In the top row, select
Remove X
- Select
Yes
From Azure CLI
az role definition list
Check for entries with assignableScope
of /
or a subscription
, and an action of *
Verify the usage and impact of removing the role identified
az role definition delete --name "rolename"
References
https://docs.microsoft.com/en-us/azure/billing/billing-add-change-azure-subscription-administrator
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy#gs-2-define-enterprise-segmentation-strategy
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy#gs-6-define-identity-and-privileged-access-strategy
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-1-protect-and-limit-highly-privileged-users
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-5-automate-entitlement-management
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-2-restrict-administrative-access-to-business-critical-systems
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy#gs-2-define-enterprise-segmentation-strategy
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy#gs-6-define-identity-and-privileged-access-strategy
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-7-follow-just-enough-administration-least-privilege-principle