Skip to content

Commit 3641663

Browse files
committed
Addressing Acrolinx suggestions
1 parent e2a6c3c commit 3641663

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/virtual-machines/image-builder-best-practices.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ ms.custom: references_regions
1717
This article describes best practices to be followed while using Azure VM Image Builder (AIB).
1818

1919
- To prevent image templates from being accidentally deleted, use resource locks at the image template resource level. For more information, see [Protect your Azure resources with a lock](../azure-resource-manager/management/lock-resources.md).
20-
- Make sure your image tempaltes are setup for disaster recovery by following [reliability recommendation for AIB](../reliability/reliability-image-builder.md?toc=/azure/virtual-machines/toc.json&bc=/azure/virtual-machines/breadcrumb/toc.json).
20+
- Make sure your image templates are set up for disaster recovery by following [reliability recommendation for AIB](../reliability/reliability-image-builder.md?toc=/azure/virtual-machines/toc.json&bc=/azure/virtual-machines/breadcrumb/toc.json).
2121
- Set up AIB [triggers](image-builder-triggers-how-to.md) to automatically rebuild your images and keep them updated.
2222
- Enable [VM Boot Optimization](vm-boot-optimization.md) in AIB to improve the create time for your VMs.
23-
- Follow the [principle of least privilege](https://learn.microsoft.com/en-us/entra/identity-platform/secure-least-privileged-access) for your AIB resources:
24-
- **Image Template**: A prinicpal that has access to your image template will be able to run, delete, or tamper with it. This, in turn, will allow the principal to change the images created by that image template.
25-
- **Staging Resource Group**: AIB uses a staging resource group in your subscription to customize your VM image. You must consider this resource group as sensitive and restrict access to this resource group only to required principals. Since the process of customizing your image takes place in this resource group, a principal with access to the resource group will be able to compromise the image building process - for example, by injecting malware into the image. AIB also delegates priveleges associated with the Template identity and Build VM identity to resources in this resource group. Hence, a principal with access to the resource group will be able to get access to these identities. Further, AIB maintains a copy of your customizer artifacts in this resource group. Hence, a principal with access to the resource group will be able to inspect these copies.
26-
- **Template Identity**: A principal with access to your template identity will be able to access all resources that the identity has permissions for including your customizer artifacts (for example, shell and PowerShell scripts), your distribution targets (for example, an Azure Compute Gallery image version), and your Virtual Network. Hence, you must provided only the minimum required priveleges to this identity.
27-
- **Build VM Identity**: A principal with access to your build VM identity will be able to access all resources that the identity has permissions for including any artifacts and Virtual Network that you may be using from within the Build VM using this identity. Hence, you must provided only the minimum required priveleges to this identity.
23+
- Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) for your AIB resources.
24+
- **Image Template**: A principal that has access to your image template is able to run, delete, or tamper with it. Having this access, in turn, allows the principal to change the images created by that image template.
25+
- **Staging Resource Group**: AIB uses a staging resource group in your subscription to customize your VM image. You must consider this resource group as sensitive and restrict access to this resource group only to required principals. Since the process of customizing your image takes place in this resource group, a principal with access to the resource group is able to compromise the image building process - for example, by injecting malware into the image. AIB also delegates privileges associated with the Template identity and Build VM identity to resources in this resource group. Hence, a principal with access to the resource group is able to get access to these identities. Further, AIB maintains a copy of your customizer artifacts in this resource group. Hence, a principal with access to the resource group is able to inspect these copies.
26+
- **Template Identity**: A principal with access to your template identity is able to access all resources that the identity has permissions for. This includes your customizer artifacts (for example, shell and PowerShell scripts), your distribution targets (for example, an Azure Compute Gallery image version), and your Virtual Network. Hence, you must provide only the minimum required privileges to this identity.
27+
- **Build VM Identity**: A principal with access to your build VM identity is able to access all resources that the identity has permissions for. This includes any artifacts and Virtual Network that you might be using from within the Build VM using this identity. Hence, you must provide only the minimum required privileges to this identity.

0 commit comments

Comments
 (0)