Table of Contents

Azure IAM

Azure Administrator Roles (Entra ID Roles) vs. Azure Roles (Azure RBAC Roles)

Tenant/Root Managment Group Level Access

Microsoft Entra ID and Azure resources are secured independently from one another. That is, Microsoft Entra role assignments do not grant access to Azure resources, and Azure role assignments do not grant access to Microsoft Entra ID. However, if you are a Global Administrator in Microsoft Entra ID, you can assign yourself access to all Azure subscriptions and management groups in your directory. Use this capability if you don't have access to Azure subscription resources, such as virtual machines or storage accounts, and you want to use your Global Administrator privilege to gain access to those resources.

RBAC/Roles

Service Accounts

Microsoft’s guidance is to avoid using regular user accounts as service accounts when possible. Instead:

Security Principles

Managed Identity

Read-only Access

The following roles/permissions are good for doing security assessments.

Conditional Access

To Explore

Roles

From CIS Azure Foundations Benchmark:

The User Access Administrator role grants the ability to view all resources and manage access assignments at any subscription or management group level within the tenant. Due to its high privilege level, this role assignment should be removed immediately after completing the necessary changes at the root scope to minimize security risks.

Working With Roles

Get the Azure Roles assigned to a user.

Get-AzRoleAssignment -SigninName "Michael.Gupton@xyz.org" | select RoleDefinitionName, Scope
az role assignment list --assignee "Michael.Gupton@xyz.org"

Get Roles that have a permission

Get-AzRoleDefinition | Where-Object {
    $_.Actions -match "Microsoft.Authorization/policyAssignments"
}

Related