Skip to content

Commit 6db7c33

Browse files
committed
Initial draft of best practices
1 parent 3c37352 commit 6db7c33

File tree

4 files changed

+23
-4
lines changed

4 files changed

+23
-4
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33548,7 +33548,12 @@
3354833548
},
3354933549
{
3355033550
"source_path": "articles/active-directory/pim-azure-resource.md",
33551-
"redirect_url": "/azure/role-based-access-control/pim-azure-resource",
33551+
"redirect_url": "/azure/role-based-access-control/best-practices",
33552+
"redirect_document_id": false
33553+
},
33554+
{
33555+
"source_path": "articles/role-based-access-control/pim-azure-resource.md",
33556+
"redirect_url": "/azure/role-based-access-control/best-practices",
3355233557
"redirect_document_id": true
3355333558
},
3355433559
{

articles/role-based-access-control/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@
2828
href: tutorial-custom-role-cli.md
2929
- name: Concepts
3030
items:
31-
- name: PIM for Azure resources
32-
href: pim-azure-resource.md
31+
- name: Best practices
32+
href: best-practices.md
3333
- name: Conditional Access for Azure management
3434
href: conditional-access-azure-management.md
3535
- name: How-to guides

articles/role-based-access-control/best-practices.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,20 @@ Using Azure RBAC, you can segregate duties within your team and grant only the a
2727

2828
When planning your access control strategy, it's a best practice to grant users the least privilege to get their work done. The following diagram shows a suggested pattern for using RBAC.
2929

30-
![RBAC and least privilege](./media/overview/rbac-least-privilege.png)
30+
![RBAC and least privilege](./media/best-practices/rbac-least-privilege.png)
31+
32+
For information about how to add role assignments, see [Add or remove role assignments](role-assignments-portal.md).
33+
34+
## Limit the number of subscription owners
35+
36+
You should have a maximum of 3 subscription owners to reduce the potential for breach by a compromised owner. This recommendation can be monitored in Azure Security Center. For other identity and access recommendations, see [Security recommendations - a reference guide](../security-center/recommendations-reference.md).
37+
38+
## Use Azure AD Privileged Identity Management
39+
40+
To protect privileged accounts from malicious cyber-attacks, you can use Azure Active Directory Privileged Identity Management (PIM) to lower the exposure time of privileges and increase your visibility into their use through reports and alerts. PIM helps protect privileged accounts by providing just-in-time privileged access to Azure AD and Azure resources. Access can be time bound after which privileges are revoked automatically.
41+
42+
For more information, see [What is Azure AD Privileged Identity Management?](../active-directory/privileged-identity-management/pim-configure.md).
3143

3244
## Next steps
45+
46+
- [Troubleshoot Azure RBAC](troubleshooting.md)

0 commit comments

Comments
 (0)