Skip to content

Commit ef27afb

Browse files
Merge pull request #260212 from rolyon/rolyon-rbac-roles-defender-storage-data-scanner
[Azure RBAC] Defender for Storage Data Scanner role
2 parents 4ea6c8a + a6d5cc2 commit ef27afb

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,7 @@ The following table provides a brief description of each built-in role. Click th
6969
> | [Data Box Contributor](#data-box-contributor) | Lets you manage everything under Data Box Service except giving access to others. | add466c9-e687-43fc-8d98-dfcf8d720be5 |
7070
> | [Data Box Reader](#data-box-reader) | Lets you manage Data Box Service except creating order or editing order details and giving access to others. | 028f4ed7-e2a9-465e-a8f4-9c0ffdfdc027 |
7171
> | [Data Lake Analytics Developer](#data-lake-analytics-developer) | Lets you submit, monitor, and manage your own jobs but not create or delete Data Lake Analytics accounts. | 47b7735b-770e-4598-a7da-8b91488b4c88 |
72+
> | [Defender for Storage Data Scanner](#defender-for-storage-data-scanner) | Grants access to read blobs and update index tags. This role is used by the data scanner of Defender for Storage. | 1e7ca9b1-60d1-4db8-a914-f2ca1ff27c40 |
7273
> | [Elastic SAN Owner](#elastic-san-owner) | Allows for full access to all resources under Azure Elastic SAN including changing network security policies to unblock data path access | 80dcbedb-47ef-405d-95bd-188a1b4ac406 |
7374
> | [Elastic SAN Reader](#elastic-san-reader) | Allows for control path read access to Azure Elastic SAN | af6a70f8-3c9f-4105-acf1-d719e9fca4ca |
7475
> | [Elastic SAN Volume Group Owner](#elastic-san-volume-group-owner) | Allows for full access to a volume group in Azure Elastic SAN including changing network security policies to unblock data path access | a8281131-f312-4f34-8d98-ae12be9f0d23 |
@@ -3040,6 +3041,51 @@ Lets you submit, monitor, and manage your own jobs but not create or delete Data
30403041
}
30413042
```
30423043

3044+
### Defender for Storage Data Scanner
3045+
3046+
Grants access to read blobs and update index tags. This role is used by the data scanner of Defender for Storage.
3047+
3048+
> [!div class="mx-tableFixed"]
3049+
> | Actions | Description |
3050+
> | --- | --- |
3051+
> | [Microsoft.Storage](resource-provider-operations.md#microsoftstorage)/storageAccounts/blobServices/containers/read | Returns list of containers |
3052+
> | **NotActions** | |
3053+
> | *none* | |
3054+
> | **DataActions** | |
3055+
> | [Microsoft.Storage](resource-provider-operations.md#microsoftstorage)/storageAccounts/blobServices/containers/blobs/read | Returns a blob or a list of blobs |
3056+
> | [Microsoft.Storage](resource-provider-operations.md#microsoftstorage)/storageAccounts/blobServices/containers/blobs/tags/write | Returns the result of writing blob tags |
3057+
> | [Microsoft.Storage](resource-provider-operations.md#microsoftstorage)/storageAccounts/blobServices/containers/blobs/tags/read | Returns the result of reading blob tags |
3058+
> | **NotDataActions** | |
3059+
> | *none* | |
3060+
3061+
```json
3062+
{
3063+
"assignableScopes": [
3064+
"/"
3065+
],
3066+
"description": "Grants access to read blobs and update index tags. This role is used by the data scanner of Defender for Storage.",
3067+
"id": "/providers/Microsoft.Authorization/roleDefinitions/1e7ca9b1-60d1-4db8-a914-f2ca1ff27c40",
3068+
"name": "1e7ca9b1-60d1-4db8-a914-f2ca1ff27c40",
3069+
"permissions": [
3070+
{
3071+
"actions": [
3072+
"Microsoft.Storage/storageAccounts/blobServices/containers/read"
3073+
],
3074+
"notActions": [],
3075+
"dataActions": [
3076+
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read",
3077+
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write",
3078+
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/read"
3079+
],
3080+
"notDataActions": []
3081+
}
3082+
],
3083+
"roleName": "Defender for Storage Data Scanner",
3084+
"roleType": "BuiltInRole",
3085+
"type": "Microsoft.Authorization/roleDefinitions"
3086+
}
3087+
```
3088+
30433089
### Elastic SAN Owner
30443090

30453091
Allows for full access to all resources under Azure Elastic SAN including changing network security policies to unblock data path access

0 commit comments

Comments
 (0)