[New Rule] Microsoft Entra ID Elevated Access to User Access Administrator#4742
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
|
@terrancedejesus Is this action similar to AWS Administrator Access policy where the user is granted admin access across multiple resources? Or is this admin access being granted individually for each resource? |
Great question. It differs a little from AWS. For MSFT cloud, Azure and Entra ID admins are separate in where their privileges apply. Global Administrator in Entra ID, does not inherently give access as admin to resources in Azure, this requires the User Administrator Access role. Therefore, IAM admins can only administer IAM-related resources in the tenant. However, they can temporarily gain the user Administrator Access role via a simple toggle in Entra ID. If a spearphishing campaign successfully compromises a global admin in Entra ID and is able to login to the portal, they can then gain the User Administrator Access role to then access Azure resources as admin. |
imays11
left a comment
There was a problem hiding this comment.
Got it, thanks for explaining! nice rule
Pull Request
Issue link(s):
Summary - What I changed
Adds coverage for
Microsoft Entra ID Elevated Access to User Access Administrator. Please see original community issue request for more details.How To Test
Checklist
bug,enhancement,schema,maintenance,Rule: New,Rule: Deprecation,Rule: Tuning,Hunt: New, orHunt: Tuningso guidelines can be generatedmeta:rapid-mergelabel if planning to merge within 24 hoursContributor checklist