You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/includes/4-design-security-information-event-management-solutions.md
+64-2Lines changed: 64 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ Advantages to this strategy:
58
58
59
59
Disadvantages to this strategy:
60
60
61
-
- Running a query over a large number of workspaces is slow and can't scale above 100 workspaces. This means that you can create a central visualization and data analytics but it is slow if there are more than a few dozen workspaces. This situation is less acute if all workspaces are colocated on the same [dedicated cluster](/azure/azure-monitor/logs/logs-dedicated-clusters). See [here](/azure/azure-monitor/logs/cross-workspace-query) for more details on running queries across workspaces.
61
+
- Running a query over a large number of workspaces is slow and can't scale above 100 workspaces. This means that you can create a central visualization and data analytics but it's slow if there are more than a few dozen workspaces. This situation is less acute if all workspaces are colocated on the same [dedicated cluster](/azure/azure-monitor/logs/logs-dedicated-clusters). See [here](/azure/azure-monitor/logs/cross-workspace-query) for more details on running queries across workspaces.
62
62
- If customers aren't onboarded for Azure delegated resource management, service provider administrators must be provisioned in the customer directory. This requirement makes it more difficult for the service provider to manage many customer tenants at once.
63
63
- When running a query on a workspace, the workspace admins might have visibility to the full text of the query via [query audit](/azure/azure-monitor/logs/query-audit).
64
64
@@ -85,5 +85,67 @@ There are several options to implement logs in a central location:
85
85
-**Central workspace**: The service provider creates a workspace in its tenant and pulls data from the various workspaces using:
86
86
- A script that uses the [Query API](/azure/azure-monitor/logs/api/overview) with the [logs ingestion API](/azure/azure-monitor/logs/logs-ingestion-api-overview) to send the data from the tenant workspaces to the central workspace.
87
87
-[Azure Logic Apps](/azure/logic-apps/logic-apps-overview) to copy data to the central workspace.
88
-
-[Data export](/azure/azure-monitor/logs/logs-data-export) from the source workspace and re-ingestion to the central workspace. You can also create [summary rules](/azure/azure-monitor/logs/summary-rules) to export an aggregation of key data from the original workspaces into the central workspace.
88
+
-[Data export](/azure/azure-monitor/logs/logs-data-export) from the source workspace and reingestion to the central workspace. You can also create [summary rules](/azure/azure-monitor/logs/summary-rules) to export an aggregation of key data from the original workspaces into the central workspace.
89
89
-**Power BI**: The tenant workspaces export data to Power BI by using the integration between the [Log Analytics workspace and Power BI](/azure/azure-monitor/logs/log-powerbi).
90
+
91
+
## Manage access to workspaces
92
+
93
+
The factors that determine which data you can access in a Log Analytics workspace are:
94
+
95
+
- The settings on the workspace itself.
96
+
- Your access permissions to resources that send data to the workspace.
97
+
- The method used to access the workspace.
98
+
99
+
The factors that define the data you can access are described in the following table.
| Access mode | Method used to access the workspace. Defines the scope of the data available and the access control mode that's applied.
104
+
| Access control mode | Setting on the workspace that defines whether permissions are applied at the workspace or resource level. |
105
+
| Azure role-based access control (RBAC) | Permissions applied to individuals or groups of users for the workspace or resource sending data to the workspace. Defines what data you have access to. |
106
+
| Table-level Azure RBAC | Optional permissions that define specific data types in the workspace that you can access. |
107
+
108
+
**Access mode**. The access mode refers to how you access a Log Analytics workspace and defines the data you can access during the current session. The mode is determined according to the scope you select in Log Analytics.
109
+
110
+
There are two access modes:
111
+
112
+
- Workspace-context: You can view all logs in the workspace for which you have permission. Queries in this mode are scoped to all data in tables that you have access to in the workspace. This access mode is used when logs are accessed with the workspace as the scope.
113
+
114
+
- Resource-context: When you access the workspace for a particular resource, resource group, or subscription, such as when you select Logs from a resource menu in the Azure portal, you can view logs for only resources in all tables that you have access to. Queries in this mode are scoped to only data associated with that resource. This mode also enables granular Azure RBAC. Workspaces use a resource-context log model where every log record emitted by an Azure resource is automatically associated with this resource.
115
+
116
+
**Access control mode**. The access control mode is a setting on each workspace that defines how permissions are determined for the workspace.
117
+
118
+
- Require workspace permissions. This control mode doesn't allow granular Azure RBAC. To access the workspace, the user must be granted permissions to the workspace or to specific tables.
119
+
120
+
- Use resource or workspace permissions. This control mode allows granular Azure RBAC.
121
+
122
+
**Azure RBAC**. Access to a workspace is managed by using Azure RBAC. You grant access to the Log Analytics workspace by using Azure permissions. To learn more, see [Workspace permissions](/azure/azure-monitor/logs/manage-access?tabs=portal#workspace-permissions)
123
+
124
+
**Table-level Azure RBAC**. Table-level access settings let you grant specific users or groups read-only permission to data in a table. Users with table-level read access can read data from the specified table in both the workspace and the resource context. To learn more, see [Manage table-level read access in a Log Analytics workspace](/azure/azure-monitor/logs/manage-table-access).
125
+
126
+
#### Manage access to Microsoft Sentinel data by resource
127
+
128
+
Typically, users who have access to a Log Analytics workspace enabled for Microsoft Sentinel also have access to all the workspace data, including security content. Administrators can use Azure roles to configure access to specific features in Microsoft Sentinel, depending on the access requirements in their team.
129
+
130
+
However, you may have some users who need to access only specific data in your workspace, but shouldn't have access to the entire Microsoft Sentinel environment. For example, you may want to provide a nonsecurity operations (non-SOC) team with access to the Windows event data for the servers they own.
131
+
132
+
In such cases, we recommend that you configure your role-based access control (RBAC) based on the resources that are allowed to your users, instead of providing them with access to the workspace or specific Microsoft Sentinel features. This method is also known as setting up **resource-context RBAC**.
133
+
134
+
The following table highlights the scenarios where resource-context RBAC is most helpful. Note the differences in access requirements between SOC teams and non-SOC teams.
135
+
136
+
| Requirement type |SOC team |Non-SOC team |
137
+
|---------|---------|---------|
138
+
|**Permissions**| The entire workspace | Specific resources only |
139
+
|**Data access**| All data in the workspace | Only data for resources that the team is authorized to access |
140
+
|**Experience**| The full Microsoft Sentinel experience, possibly limited by the [roles and permissions](/azure/sentinel/roles) assigned to the user | Log queries and Workbooks only |
141
+
142
+
The following image shows a simplified version of a workspace architecture where security and operations teams need access to different sets of data, and resource-context RBAC is used to provide the required permissions.
143
+
144
+
:::image type="content" source="../media/resource-context-rbac-sample.png" lightbox="../media/resource-context-rbac-sample.png" alt-text="A diagram of a simplified version of a workspace architecture where security and operations teams need access to different sets of data, and resource-context RBAC is used to provide the required permissions.":::
145
+
146
+
In this image:
147
+
148
+
- The Log Analytics workspace enabled for Microsoft Sentinel is placed in a separate subscription to better isolate permissions from the subscription that the applications teams use to host their workloads.
149
+
- The applications teams are granted access to their respective resource groups, where they can manage their resources.
150
+
151
+
This separate subscription and resource-context RBAC allows these teams to view logs generated by any resources they have access to, even when the logs are stored in a workspace where they don't have direct access. The applications teams can access their logs via the Logs area of the Azure portal, to show logs for a specific resource, or via Azure Monitor, to show all of the logs they can access at the same time.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/index.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ metadata:
5
5
prefetch-feature-rollout: true
6
6
title: Design solutions for security operations
7
7
description: "You learn techniques to design security operations capabilities including logging, auditing, Security Information and Event Management (SIEM), Security Orchestration and Automated Response (SOAR), and security workflows."
0 commit comments