|
2 | 2 |
|
3 | 3 | {{#include ../../banners/hacktricks-training.md}} |
4 | 4 |
|
5 | | -To start a white box hardening review of some Entra ID tenats you need to ask for **Global Reader role on each tenant**. Moreover, to perform a hardening review of different Azure subscriptions you would need at least the **Reader permissions over all the subscriptions**. |
| 5 | +To start a white box hardening review of some Entra ID tenats you need to ask for **`Global Reader` role on each tenant**. Moreover, to perform a hardening review of different Azure subscriptions you would need at least the **`Reader`role over all the subscriptions**. |
6 | 6 |
|
7 | 7 | Note that if those roles aren't enough to access all the info you need, you could also ask the client for roles with the permissions you need. Just try to **minimize the amount of not read-only permissions you ask for!** |
8 | 8 |
|
| 9 | +Another option is to ask for **`Security Reader` role** instead of `Reader` if the client complaints to reduce the granted privileges. However, this increases the possibility of the pentester asking for more read roles later as the `Reader` role grants `"*/read"` while the `Security Reader` role grants: |
| 10 | + |
| 11 | +```json |
| 12 | +"actions": [ |
| 13 | + "Microsoft.Authorization/*/read", |
| 14 | + "Microsoft.Insights/alertRules/read", |
| 15 | + "Microsoft.operationalInsights/workspaces/*/read", |
| 16 | + "Microsoft.Resources/deployments/*/read", |
| 17 | + "Microsoft.Resources/subscriptions/resourceGroups/read", |
| 18 | + "Microsoft.Security/*/read", |
| 19 | + "Microsoft.IoTSecurity/*/read", |
| 20 | + "Microsoft.Support/*/read", |
| 21 | + "Microsoft.Security/iotDefenderSettings/packageDownloads/action", |
| 22 | + "Microsoft.Security/iotDefenderSettings/downloadManagerActivation/action", |
| 23 | + "Microsoft.Security/iotSensors/downloadResetPassword/action", |
| 24 | + "Microsoft.IoTSecurity/defenderSettings/packageDownloads/action", |
| 25 | + "Microsoft.IoTSecurity/defenderSettings/downloadManagerActivation/action", |
| 26 | + "Microsoft.Management/managementGroups/read" |
| 27 | +] |
| 28 | +``` |
| 29 | + |
9 | 30 | {{#include ../../banners/hacktricks-training.md}} |
10 | 31 |
|
0 commit comments