You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article describes some of the best practices for using Azure Active Directory role-based access control (Azure AD RBAC). These best practices are derived from our experience with Azure AD RBAC and the experiences of customers like yourself. We encourage you to also read our detailed security guidance at [Securing privileged access for hybrid and cloud deployments in Azure AD](security-planning.md).
21
21
22
-
## 1. Manage to least privilege
22
+
## 1. Apply principle of least privilege
23
23
24
24
When planning your access control strategy, it's a best practice to manage to least privilege. Least privilege means you grant your administrators exactly the permission they need to do their job. There are three aspects to consider when you assign a role to your administrators: a specific set of permissions, over a specific scope, for a specific period of time. Avoid assigning broader roles at broader scopes even if it initially seems more convenient to do so. By limiting roles and scopes, you limit what resources are at risk if the security principal is ever compromised. Azure AD RBAC supports over 65 [built-in roles](permissions-reference.md). There are Azure AD roles to manage directory objects like users, groups, and applications, and also to manage Microsoft 365 services like Exchange, SharePoint, and Intune. To better understand Azure AD built-in roles, see [Understand roles in Azure Active Directory](concept-understand-roles.md). If there isn't a built-in role that meets your need, you can create your own [custom roles](custom-create.md).
25
25
@@ -35,7 +35,7 @@ Follow these steps to help you find the right role.
35
35
36
36

37
37
38
-
1. Refer to the [Azure AD built-in roles](permissions-reference.md) documentation. Permissions associated with each role are listed together for better readability. To understand the structure and meaning of role permissions, see [How to understand role permissions](permissions-reference.md#how-to-understand-role-permissions).
38
+
1. Refer to the [Azure AD built-in roles](permissions-reference.md) documentation. Permissions associated with each role are listed together for better readability. To understand the structure and meaning of role permissions, see [How to understand role permissions](privileged-roles-permissions.md#how-to-understand-role-permissions).
39
39
40
40
1. Refer to the [Least privileged role by task](delegate-by-task.md) documentation.
41
41
@@ -61,27 +61,31 @@ For information about access reviews for roles, see [Create an access review of
61
61
62
62
## 5. Limit the number of Global Administrators to less than 5
63
63
64
-
As a best practice, Microsoft recommends that you assign the Global Administrator role to **fewer than five** people in your organization. Global Administrators hold keys to the kingdom, and it is in your best interest to keep the attack surface low. As stated previously, all of these accounts should be protected with multi-factor authentication.
64
+
As a best practice, Microsoft recommends that you assign the Global Administrator role to **fewer than five** people in your organization. Global Administrators essentially have unrestricted access, and it is in your best interest to keep the attack surface low. As stated previously, all of these accounts should be protected with multi-factor authentication.
65
65
66
66
By default, when a user signs up for a Microsoft cloud service, an Azure AD tenant is created and the user is made a member of the Global Administrators role. Users who are assigned the Global Administrator role can read and modify every administrative setting in your Azure AD organization. With a few exceptions, Global Administrators can also read and modify all configuration settings in your Microsoft 365 organization. Global Administrators also have the ability to elevate their access to read data.
67
67
68
68
Microsoft recommends that you keep two break glass accounts that are permanently assigned to the Global Administrator role. Make sure that these accounts don't require the same multi-factor authentication mechanism as your normal administrative accounts to sign in, as described in [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
69
69
70
-
## 6. Use groups for Azure AD role assignments and delegate the role assignment
70
+
## 6. Limit the number of privileged role assignments to less than 10
71
+
72
+
Some roles include privileged permissions, such as the ability to update credentials. Since these roles can potentially lead to elevation of privilege, you should limit the use of these privileged role assignments to **fewer than 10** in your organization. You can identity roles, permissions, and role assignments that are privileged by looking for the **PRIVILEGED** label. For more information, see [Privileged roles and permissions in Azure AD](privileged-roles-permissions.md).
73
+
74
+
## 7. Use groups for Azure AD role assignments and delegate the role assignment
71
75
72
76
If you have an external governance system that takes advantage of groups, then you should consider assigning roles to Azure AD groups, instead of individual users. You can also manage role-assignable groups in PIM to ensure that there are no standing owners or members in these privileged groups. For more information, see [Privileged Identity Management (PIM) for Groups (preview)](../privileged-identity-management/concept-pim-for-groups.md).
73
77
74
78
You can assign an owner to role-assignable groups. That owner decides who is added to or removed from the group, so indirectly, decides who gets the role assignment. In this way, a Global Administrator or Privileged Role Administrator can delegate role management on a per-role basis by using groups. For more information, see [Use Azure AD groups to manage role assignments](groups-concept.md).
75
79
76
-
## 7. Activate multiple roles at once using PIM for Groups
80
+
## 8. Activate multiple roles at once using PIM for Groups
77
81
78
82
It may be the case that an individual has five or six eligible assignments to Azure AD roles through PIM. They will have to activate each role individually, which can reduce productivity. Worse still, they can also have tens or hundreds of Azure resources assigned to them, which aggravates the problem.
79
83
80
84
In this case, you should use [Privileged Identity Management (PIM) for Groups (preview)](../privileged-identity-management/concept-pim-for-groups.md). Create a PIM for Groups and grant it permanent access to multiple roles (Azure AD and/or Azure). Make that user an eligible member or owner of this group. With just one activation, they will have access to all the linked resources.
81
85
82
86

83
87
84
-
## 8. Use cloud native accounts for Azure AD roles
88
+
## 9. Use cloud native accounts for Azure AD roles
85
89
86
90
Avoid using on-premises synced accounts for Azure AD role assignments. If your on-premises account is compromised, it can compromise your Azure AD resources as well.
|[Authentication Administrator](#authentication-administrator)| Yes for [some users](#who-can-perform-sensitive-actions)| Yes for [some users](#who-can-perform-sensitive-actions)| No | No | No | Yes for [some users](#who-can-perform-sensitive-actions)| Yes for [some users](#who-can-perform-sensitive-actions)|
20
-
|[Privileged Authentication Administrator](#privileged-authentication-administrator)| Yes for all users | Yes for all users | No | No | No | Yes for all users | Yes for all users |
21
-
|[Authentication Policy Administrator](#authentication-policy-administrator)| No | No | Yes | Yes | Yes | No | No |
22
-
|[User Administrator](#user-administrator)| No | No | No | No | No | Yes for [some users](#who-can-perform-sensitive-actions)| Yes for [some users](#who-can-perform-sensitive-actions)|
19
+
|[Authentication Administrator](../permissions-reference.md#authentication-administrator)| Yes for [some users](../privileged-roles-permissions.md#who-can-perform-sensitive-actions)| Yes for [some users](../privileged-roles-permissions.md#who-can-perform-sensitive-actions)| No | No | No | Yes for [some users](../privileged-roles-permissions.md#who-can-perform-sensitive-actions)| Yes for [some users](../privileged-roles-permissions.md#who-can-perform-sensitive-actions)|
20
+
|[Privileged Authentication Administrator](../permissions-reference.md#privileged-authentication-administrator)| Yes for all users | Yes for all users | No | No | No | Yes for all users | Yes for all users |
21
+
|[Authentication Policy Administrator](../permissions-reference.md#authentication-policy-administrator)| No | No | Yes | Yes | Yes | No | No |
22
+
|[User Administrator](../permissions-reference.md#user-administrator)| No | No | No | No | No | Yes for [some users](../privileged-roles-permissions.md#who-can-perform-sensitive-actions)| Yes for [some users](../privileged-roles-permissions.md#who-can-perform-sensitive-actions)|
0 commit comments