diff --git a/ScoutSuite/providers/azure/rules/findings/rbac-custom-subscription-owner-role-not-allowed.json b/ScoutSuite/providers/azure/rules/findings/rbac-custom-subscription-owner-role-not-allowed.json index a3f48a601..c504544bc 100644 --- a/ScoutSuite/providers/azure/rules/findings/rbac-custom-subscription-owner-role-not-allowed.json +++ b/ScoutSuite/providers/azure/rules/findings/rbac-custom-subscription-owner-role-not-allowed.json @@ -1,5 +1,5 @@ { - "description": "Custom Subscription Owner Role Not Allowed", + "description": "Role Allows Creation of Custom Owner Role", "rationale": "Classic subscription admin roles offer basic access management and include Account Administrator, Service Administrator, and Co-Administrators. It is recommended the least necessary permissions be given initially. Permissions can be added as needed by the account holder. This ensures the account holder cannot perform actions which were not intended.", "remediation": "From Azure Command Line Interface 2.0:
  1. az role definition list
  2. Check for entries with assignableScope of / or a subscription, and an action of *
  3. Verify the usage and impact of removing the role identified:
  4. az role definition delete --name \"rolename\"
", "compliance": [ @@ -25,4 +25,4 @@ ] ], "id_suffix": "custom_subscription_owner_role" -} \ No newline at end of file +}