Control: 1.23 Ensure That No Custom Subscription Administrator Roles Exist
Description
The principle of least privilege should be followed and only necessary privileges should be assigned instead of allowing full administrative access.
Classic subscription admin roles offer basic access management and include Account Administrator, Service Administrator, and Co-Administrators. It is recommended the least necessary permissions be given initially. Permissions can be added as needed by the account holder. This ensures the account holder cannot perform actions which were not intended.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Subscriptions
. - Select
Access control (IAM)
. - Select
Roles
. - Click
Type
and selectCustomRole
from the drop down menu. - Check the box next to each role which grants subscription administrator privileges.
- Select
Remove
. - Select
Yes
.
From Azure CLI
List custom roles:
az role definition list --custom-role-only True
Check for entries with assignableScope
of / or the subscription
, and an action of *
. To remove a violating role:
az role definition delete --name <role name>
Note that any role assignments must be removed before a custom role can be deleted. Ensure impact is assessed before deleting a custom role granting subscription administrator privileges.
Default Value
By default, no custom owner roles are created.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v200_1_23
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v200_1_23 --share
SQL
This control uses a named query:
iam_no_custom_subscription_owner_roles_created