You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An attacker with the permission `Microsoft.Authorization/policyAssignments/write` or `Microsoft.Authorization/policyAssignments/delete` over a management group, subscription, or resource group can **modify or delete Azure policy assignments**, potentially **disabling security restrictions** that block specific operations.
87
+
88
+
This allows access to resources or functionalities that were previously protected by the policy.
An attacker with the permission `Microsoft.Authorization/policyDefinitions/write` can **modify Azure policy definitions**, changing the rules that control security restrictions across the environment.
123
+
124
+
For example, a policy that limits the allowed regions for creating resources can be modified to allow any region, or the policy effect can be changed to make it ineffective.
125
+
126
+
**Modify a policy definition:**
127
+
128
+
```bash
129
+
az policy definition update \
130
+
--name "<policyDefinitionName>" \
131
+
--rules @updated-policy-rules.json
132
+
```
133
+
134
+
**Verify the changes:**
135
+
136
+
```bash
137
+
az policy definition list --output table
138
+
139
+
az policy definition show --name "<policyDefinitionName>"
140
+
```
141
+
142
+
### Microsoft.Management/managementGroups/write
143
+
144
+
An attacker with the permission `Microsoft.Management/managementGroups/write` can **modify the hierarchical structure of management groups** or **create new management groups**, potentially evading restrictive policies applied at higher levels.
145
+
146
+
For example, an attacker can create a new management group without restrictive policies and then move subscriptions to it.
An attacker with the permission `Microsoft.Management/managementGroups/subscriptions/write` can **move subscriptions between management groups**, potentially **evading restrictive policies** by moving a subscription to a group with less restrictive or no policies.
177
+
178
+
**Move a subscription to a different management group:**
0 commit comments