Skip to content

Commit 8fe8305

Browse files
Merge pull request #288735 from karengu0/new-oct-24-move-velma-docs
Keep old D4IoT content, create new firmware-analysis folder
2 parents 5173d2d + f87bf08 commit 8fe8305

27 files changed

+774
-0
lines changed
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
---
2+
title: Frequently asked questions about Firmware analysis
3+
description: Find answers to some of the common questions about Firmware Analysis. This article includes the file systems that are supported by Firmware Analysis, and links to the Azure CLI and Azure PowerShell commands.
4+
author: karengu0
5+
ms.author: karenguo
6+
ms.topic: conceptual
7+
ms.custom: devx-track-azurecli, devx-track-azurepowershell
8+
ms.date: 01/10/2024
9+
---
10+
11+
# Frequently asked questions about Firmware analysis
12+
This article addresses frequent questions about Firmware analysis.
13+
14+
[Firmware analysis](./overview-firmware-analysis.md) is a tool that analyzes firmware images and provides an understanding of security vulnerabilities in the firmware images.
15+
16+
## What types of firmware images does Firmware analysis support?
17+
Firmware analysis supports unencrypted images that contain file systems with embedded Linux operating systems. Firmware analysis supports the following file system formats:
18+
19+
* Android sparse image
20+
* bzip2 compressed data
21+
* CPIO ASCII archive, with CRC
22+
* CPIO ASCII archive, no CRC
23+
* CramFS filesystem
24+
* Flattened device tree blob (DTB)
25+
* EFI GUID partition table
26+
* EXT file system
27+
* POSIX tarball archive (GNU)
28+
* GPG signed data
29+
* gzip compressed data
30+
* ISO-9660 primary volume
31+
* JFFS2 filesystem, big endian
32+
* JFFS2 filesystem, little endian
33+
* LZ4 compressed data
34+
* LZMA compressed data
35+
* LZOP compressed file
36+
* DOS master boot record
37+
* RomFS filesystem
38+
* SquashFSv4 file system, little endian
39+
* POSIX tarball archive
40+
* UBI erase count header
41+
* UBI file system superblock node
42+
* xz compressed data
43+
* YAFFS filesystem, big endian
44+
* YAFFS filesystem, little endian
45+
* ZStandard compressed data
46+
* Zip archive
47+
48+
## Where are the Firmware analysis Azure CLI/PowerShell docs?
49+
You can find the documentation for our Azure CLI commands [here](/cli/azure/firmwareanalysis/firmware) and the documentation for our Azure PowerShell commands [here](/powershell/module/az.firmwareanalysis/?#firmwareanalysis).
50+
51+
You can also find the Quickstart for our Azure CLI [here](./quickstart-upload-firmware-using-azure-command-line-interface.md) and the Quickstart for our Azure PowerShell [here](./quickstart-upload-firmware-using-powershell.md). To run a Python script using the SDK to upload and analyze firmware images, visit [Quickstart: Upload firmware using Python](./quickstart-upload-firmware-using-python.md).
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Azure Role-Based Access Control for Firmware analysis
3+
description: Learn about how to use Azure Role-Based Access Control for Firmware Analysis.
4+
author: karengu0
5+
ms.author: karenguo
6+
ms.topic: conceptual
7+
ms.date: 01/10/2024
8+
---
9+
10+
# Overview of Azure Role-Based Access Control for Firmware analysis
11+
As a user of Firmware analysis, you may want to manage access to your firmware image analysis results. Azure Role-Based Access Control (RBAC) is an authorization system that enables you to control who has access to your analysis results, what permissions they have, and at what level of the resource hierarchy. This article explains how to store firmware analysis results in Azure, manage access permissions, and use RBAC to share these results within your organization and with third parties. To learn more about Azure RBAC, visit [What is Azure Role-Based Access Control (Azure RBAC)?](./../role-based-access-control/overview.md).
12+
13+
## Roles
14+
Roles are a collection of permissions packaged together. There are two types of roles:
15+
16+
* **Job function roles** give users permission to perform specific job functions or tasks, such as **Key Vault Contributor** or **Azure Kubernetes Service Cluster Monitoring User**.
17+
* **Privileged administrator roles** give elevated access privileges, such as **Owner**, **Contributor**, or **User Access Administrator**. To learn more about roles, visit [Azure built-in roles](./../role-based-access-control/built-in-roles.md).
18+
19+
In Firmware analysis, the most common roles are Owner, Contributor, Security Admin, and Firmware Analysis Admin. Learn more about [which roles you need for different permissions](./firmware-analysis-rbac.md#firmware-analysis-roles-scopes-and-capabilities), such as uploading firmware images or sharing firmware analysis results.
20+
21+
## Understanding the Representation of Firmware Images in the Azure Resource Hierarchy
22+
Azure organizes resources into resource hierarchies, which are in a top-down structure, and you can assign roles at each level of the hierarchy. The level at which you assign a role is the "scope," and lower scopes may inherit roles assigned at higher scopes. Learn more about the [levels of hierarchy and how to organize your resources in the hierarchy](/azure/cloud-adoption-framework/ready/azure-setup-guide/organize-resources).
23+
24+
When you onboard your subscription to Firmware analysis and select your resource group, the action automatically creates the **default** resource within your resource group.
25+
26+
Navigate to your resource group and select **Show hidden types** to show the **default** resource. The **default** resource has the **Microsoft.IoTFirmwareDefense.workspaces** type.
27+
28+
:::image type="content" source="media/firmware-analysis-rbac/default-workspace.png" alt-text="Screenshot of the toggle button 'Show hidden types' that reveals a resource named 'default'." lightbox="media/firmware-analysis-rbac/default-workspace.png":::
29+
30+
Although the **default** workspace resource isn't something that you'll regularly interact with, each firmware image that you upload will be represented as a resource and stored here.
31+
32+
You can use RBAC at each level of the hierarchy, including at the hidden **default Firmware Analysis Workspace** resource level.
33+
34+
Here's the resource hierarchy of Firmware Analysis:
35+
36+
:::image type="content" source="media/firmware-analysis-rbac/resource-hierarchy.png" alt-text="Diagram that shows the resource hierarchy of firmware images of Firmware Analysis." lightbox="media/firmware-analysis-rbac/resource-hierarchy.png":::
37+
38+
## Apply Azure RBAC
39+
40+
> [!Note]
41+
> To begin using Firmware analysis, the user that onboards the subscription onto Firmware analysis ***must be*** an Owner, Contributor, Firmware Analysis Admin, or Security Admin at the subscription level. Follow the tutorial at [Analyze a firmware image with Firmware analysis](./tutorial-analyze-firmware.md#onboard-your-subscription-to-use-firmware-analysis) to onboard your subscription. Once you've onboarded your subscription, a user only needs to be a Firmware Analysis Admin to use Firmware Analysis.
42+
>
43+
44+
As a user of Firmware analysis, you may need to perform certain actions for your organization, such as uploading firmware images or sharing analysis results.
45+
46+
Actions like these involve Role-Based Access Control (RBAC). To effectively use RBAC for Firmware analysis, you must know what your role assignment is, and at what scope. Knowing this information will inform you about what permissions you have, and thus whether you can complete certain actions. To check your role assignment, refer to [Check access for a user to a single Azure resource - Azure RBAC](./../role-based-access-control/check-access.md). Next, see the following table to check what roles and scopes are necessary for certain actions.
47+
48+
### Common roles in Firmware analysis
49+
50+
This table categorizes each role and provides a brief description of their permissions:
51+
52+
**Role** | **Category** | **Description**
53+
---|---|---
54+
**Owner** | Privileged administrator role | Grants full access to manage all resources, including the ability to assign roles in Azure RBAC.
55+
**Contributor** | Privileged administrator role | Grants full access to manage all resources, but doesn't allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries.
56+
**Security Admin** | Job function role | Allows the user to upload and analyze firmware images, add/assign security initiatives, and edit the security policy. [Learn more](/azure/defender-for-cloud/permissions).
57+
**Firmware Analysis Admin** | Job function role | Allows the user to upload and analyze firmware images. The user has no access beyond firmware analysis (can't access other resources in the subscription, create or delete resources, or invite other users).
58+
59+
## Firmware analysis roles, scopes, and capabilities
60+
61+
The following table summarizes what roles you need to perform certain actions. These roles and permissions apply at the Subscription and Resource Group levels, unless otherwise stated.
62+
63+
**Action** | **Role required**
64+
:---|:---
65+
Analyze firmware | Owner, Contributor, Security Admin, or Firmware Analysis Admin
66+
Invite third party users to see firmware analysis results | Owner
67+
Invite users to the Subscription | Owner at the **Subscription** level (Owner at the Resource Group level **cannot** invite users to the Subscription)
68+
69+
## Uploading Firmware images
70+
To upload firmware images:
71+
72+
* Confirm that you have sufficient permission in [Firmware Analysis Roles, Scopes, and Capabilities](#firmware-analysis-roles-scopes-and-capabilities).
73+
* [Upload a firmware image for analysis](./tutorial-analyze-firmware.md#upload-a-firmware-image-for-analysis).
74+
75+
## Invite third parties to interact with your firmware analysis results
76+
You might want to invite someone to interact solely with your firmware analysis results, without allowing access to other parts of your organization (like other resource groups within your subscription). To allow this type of access, invite the user as a Firmware Analysis Admin at the Resource Group level.
77+
78+
To invite a third party, follow the [Assign Azure roles to external guest users using the Azure portal](./../role-based-access-control/role-assignments-external-users.md#invite-an-external-user-to-your-directory) tutorial.
79+
80+
* In step 3, navigate to your resource group.
81+
* In step 7, select the **Firmware Analysis Admin** role.
82+
83+
> [!Note]
84+
> If you received an email to join an organization, be sure to check your Junk folder for the invitation email if you don't see it in your inbox.
85+
>
910 KB
Loading
88.5 KB
Loading
20.2 KB
Loading
967 KB
Loading
1.5 MB
Loading
796 KB
Loading
137 KB
Loading
1.1 MB
Loading

0 commit comments

Comments
 (0)