|
| 1 | +--- |
| 2 | +title: Best practices for Azure RBAC |
| 3 | +description: Best practices for using Azure role-based access control (Azure RBAC). |
| 4 | +services: active-directory |
| 5 | +documentationcenter: '' |
| 6 | +author: rolyon |
| 7 | +manager: mtillman |
| 8 | +ms.service: role-based-access-control |
| 9 | +ms.devlang: na |
| 10 | +ms.topic: conceptual |
| 11 | +ms.tgt_pltfrm: na |
| 12 | +ms.workload: identity |
| 13 | +ms.date: 04/17/2020 |
| 14 | +ms.author: rolyon |
| 15 | +ms.reviewer: bagovind |
| 16 | + |
| 17 | +#Customer intent: As a dev, devops, or it admin, I want to learn how to best use Azure RBAC. |
| 18 | +--- |
| 19 | + |
| 20 | +# Best practices for Azure RBAC |
| 21 | + |
| 22 | +This article describes some best practices for using Azure role-based access control (Azure RBAC). These best practices are derived from our experience with Azure RBAC and the experiences of customers like yourself. |
| 23 | + |
| 24 | +## Only grant the access users need |
| 25 | + |
| 26 | +Using Azure RBAC, you can segregate duties within your team and grant only the amount of access to users that they need to perform their jobs. Instead of giving everybody unrestricted permissions in your Azure subscription or resources, you can allow only certain actions at a particular scope. |
| 27 | + |
| 28 | +When planning your access control strategy, it's a best practice to grant users the least privilege to get their work done. The following diagram shows a suggested pattern for using RBAC. |
| 29 | + |
| 30 | + |
| 31 | + |
| 32 | +For information about how to add role assignments, see [Add or remove role assignments](role-assignments-portal.md). |
| 33 | + |
| 34 | +## Limit the number of subscription owners |
| 35 | + |
| 36 | +You should have a maximum of 3 subscription owners to reduce the potential for breach by a compromised owner. This recommendation can be monitored in Azure Security Center. For other identity and access recommendations in Security Center, see [Security recommendations - a reference guide](../security-center/recommendations-reference.md). |
| 37 | + |
| 38 | +## Use Azure AD Privileged Identity Management |
| 39 | + |
| 40 | +To protect privileged accounts from malicious cyber-attacks, you can use Azure Active Directory Privileged Identity Management (PIM) to lower the exposure time of privileges and increase your visibility into their use through reports and alerts. PIM helps protect privileged accounts by providing just-in-time privileged access to Azure AD and Azure resources. Access can be time bound after which privileges are revoked automatically. |
| 41 | + |
| 42 | +For more information, see [What is Azure AD Privileged Identity Management?](../active-directory/privileged-identity-management/pim-configure.md). |
| 43 | + |
| 44 | +## Next steps |
| 45 | + |
| 46 | +- [Troubleshoot Azure RBAC](troubleshooting.md) |
0 commit comments