Skip to content

Commit fdf8003

Browse files
authored
Merge pull request #111884 from rolyon/rolyon-rbac-best-practices
[Azure RBAC] Best practices
2 parents 9a31cd0 + 7e04a27 commit fdf8003

File tree

7 files changed

+57
-45
lines changed

7 files changed

+57
-45
lines changed

.openpublishing.redirection.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33548,8 +33548,13 @@
3354833548
},
3354933549
{
3355033550
"source_path": "articles/active-directory/pim-azure-resource.md",
33551-
"redirect_url": "/azure/role-based-access-control/pim-azure-resource",
33552-
"redirect_document_id": true
33551+
"redirect_url": "/azure/role-based-access-control/best-practices",
33552+
"redirect_document_id": false
33553+
},
33554+
{
33555+
"source_path": "articles/role-based-access-control/pim-azure-resource.md",
33556+
"redirect_url": "/azure/role-based-access-control/best-practices",
33557+
"redirect_document_id": false
3355333558
},
3355433559
{
3355533560
"source_path": "articles/active-directory/role-based-access-control-resource-provider-operations.md",

articles/databox/data-box-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To restrict access to an order, you can:
4343
- Assign a role at an order level. The user only has those permissions as defined by the roles to interact with that specific Data Box order only and nothing else.
4444
- Assign a role at the resource group level, the user has access to all the Data Box orders within a resource group.
4545

46-
For more information on suggested RBAC use, see [Best practices for RBAC](../role-based-access-control/overview.md#best-practice-for-using-rbac).
46+
For more information on suggested RBAC use, see [Best practices for Azure RBAC](../role-based-access-control/best-practices.md).
4747

4848
## Track the order
4949

articles/role-based-access-control/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@
2828
href: tutorial-custom-role-cli.md
2929
- name: Concepts
3030
items:
31-
- name: PIM for Azure resources
32-
href: pim-azure-resource.md
31+
- name: Best practices
32+
href: best-practices.md
3333
- name: Conditional Access for Azure management
3434
href: conditional-access-azure-management.md
3535
- name: How-to guides
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: Best practices for Azure RBAC
3+
description: Best practices for using Azure role-based access control (Azure RBAC).
4+
services: active-directory
5+
documentationcenter: ''
6+
author: rolyon
7+
manager: mtillman
8+
ms.service: role-based-access-control
9+
ms.devlang: na
10+
ms.topic: conceptual
11+
ms.tgt_pltfrm: na
12+
ms.workload: identity
13+
ms.date: 04/17/2020
14+
ms.author: rolyon
15+
ms.reviewer: bagovind
16+
17+
#Customer intent: As a dev, devops, or it admin, I want to learn how to best use Azure RBAC.
18+
---
19+
20+
# Best practices for Azure RBAC
21+
22+
This article describes some best practices for using Azure role-based access control (Azure RBAC). These best practices are derived from our experience with Azure RBAC and the experiences of customers like yourself.
23+
24+
## Only grant the access users need
25+
26+
Using Azure RBAC, you can segregate duties within your team and grant only the amount of access to users that they need to perform their jobs. Instead of giving everybody unrestricted permissions in your Azure subscription or resources, you can allow only certain actions at a particular scope.
27+
28+
When planning your access control strategy, it's a best practice to grant users the least privilege to get their work done. The following diagram shows a suggested pattern for using RBAC.
29+
30+
![RBAC and least privilege](./media/best-practices/rbac-least-privilege.png)
31+
32+
For information about how to add role assignments, see [Add or remove role assignments](role-assignments-portal.md).
33+
34+
## Limit the number of subscription owners
35+
36+
You should have a maximum of 3 subscription owners to reduce the potential for breach by a compromised owner. This recommendation can be monitored in Azure Security Center. For other identity and access recommendations in Security Center, see [Security recommendations - a reference guide](../security-center/recommendations-reference.md).
37+
38+
## Use Azure AD Privileged Identity Management
39+
40+
To protect privileged accounts from malicious cyber-attacks, you can use Azure Active Directory Privileged Identity Management (PIM) to lower the exposure time of privileges and increase your visibility into their use through reports and alerts. PIM helps protect privileged accounts by providing just-in-time privileged access to Azure AD and Azure resources. Access can be time bound after which privileges are revoked automatically.
41+
42+
For more information, see [What is Azure AD Privileged Identity Management?](../active-directory/privileged-identity-management/pim-configure.md).
43+
44+
## Next steps
45+
46+
- [Troubleshoot Azure RBAC](troubleshooting.md)

articles/role-based-access-control/overview.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: overview
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 03/19/2020
15+
ms.date: 04/17/2020
1616
ms.author: rolyon
1717
ms.reviewer: bagovind
1818

@@ -34,14 +34,6 @@ Here are some examples of what you can do with RBAC:
3434
- Allow a user to manage all resources in a resource group, such as virtual machines, websites, and subnets
3535
- Allow an application to access all resources in a resource group
3636

37-
## Best practice for using RBAC
38-
39-
Using RBAC, you can segregate duties within your team and grant only the amount of access to users that they need to perform their jobs. Instead of giving everybody unrestricted permissions in your Azure subscription or resources, you can allow only certain actions at a particular scope.
40-
41-
When planning your access control strategy, it's a best practice to grant users the least privilege to get their work done. The following diagram shows a suggested pattern for using RBAC.
42-
43-
![RBAC and least privilege](./media/overview/rbac-least-privilege.png)
44-
4537
## How RBAC works
4638

4739
The way you control access to resources using RBAC is to create role assignments. This is a key concept to understand – it's how permissions are enforced. A role assignment consists of three elements: security principal, role definition, and scope.

articles/role-based-access-control/pim-azure-resource.md

Lines changed: 0 additions & 31 deletions
This file was deleted.

0 commit comments

Comments
 (0)