Microsoft Entra ID and Azure resources are secured independently from one another. That is, Microsoft Entra role assignments do not grant access to Azure resources, and Azure role assignments do not grant access to Microsoft Entra ID. However, if you are a Global Administrator in Microsoft Entra ID, you can assign yourself access to all Azure subscriptions and management groups in your directory. Use this capability if you don't have access to Azure subscription resources, such as virtual machines or storage accounts, and you want to use your Global Administrator privilege to gain access to those resources.
Microsoft.Storage/storageAccounts/listKeys/action.Microsoft.KeyVault/vaults/keys/get/actionMicrosoft’s guidance is to avoid using regular user accounts as service accounts when possible. Instead:
The following roles/permissions are good for doing security assessments.
Microsoft.Network/networkInterfaces/effectiveRouteTable/action, this permission allows the effective routes for a NIC to be listedFrom CIS Azure Foundations Benchmark:
The User Access Administrator role grants the ability to view all resources and manage access assignments at any subscription or management group level within the tenant. Due to its high privilege level, this role assignment should be removed immediately after completing the necessary changes at the root scope to minimize security risks.
Get the Azure Roles assigned to a user.
Get-AzRoleAssignment -SigninName "Michael.Gupton@xyz.org" | select RoleDefinitionName, Scope
az role assignment list --assignee "Michael.Gupton@xyz.org"
Get-AzRoleDefinition | Where-Object {
$_.Actions -match "Microsoft.Authorization/policyAssignments"
}