Module 5ba - Identity, Governance, Privacy and Compliance - Build a Cloud Governance Strategy, RBAC Flashcards
What is a Role Assignment?
The process of attaching a Role Definition to an ENTITY at a particular SCOPE for the purpose of GRANTING access.
What are the four (4) types of Users/Accounts that would be assigned a Role?
- Observers (the “read-only” people)
- Users (who manage Resources)
- Admins (obvious)
- Automated Processes (like our TestOps “AutomationUser”)
Describe how Azure Roles-Based Access Control (RBAC) works when applying to individuals
When a Role is applied to user, they get all the perms associated to that Role
Describe how Azure Roles-Based Access Control (RBAC) works when applying to a Resource Group
When a Role is applied to a Resource Group scope, any provisioned Resources in that Group are accessible to Users of that Role, at the level in which that Role allows access
Hint: Similar to where you’d apply Policies or Tags, but non-exclusive
What is a Scope?
A Resource or Set of Resources that Roles-based Access is applied to. It can be any of the following:
- A management group (a collection of subscriptions)
- A single Subscription
- A Resource Group
- A Single Resource
When would you use Azure RBAC?
When you need to control Resource access at a granular level, depending org structure, security compliance requirements, etc.
Examples:
- a user to manage VMs in a subscription and another to manage whole AVNs
- a DB Admin Group to manage SQL DBs in a subscription
- a user to manage all Resources in a Resource Group
- an app to access all resources in a Resource Group
How is RBAC enforced?
When any action passes through the Azure Resource Manager and is initiated against an Azure Resource
RBAC can enforce perms at the app or data levels (T/F)
False. you have to apply security to your own applications yourself! AZURE RBAC is for AZURE lol
RBAC uses an ALLOW Model. What does that mean?
When you’re assigned a Role, RBAC ALLOWS you to perform certain actions.
Where do you manage RBAC permissions?
In Access Control (IAM) in Azure Portal. Details pages in Azure Portal have an Access Control. Here you grant or remove access.
Hint: NOT Scope
To what entities do you apply RBAC to?
USER ACCOUNTS
- An individual User (Account)
- A group (of User Accounts)
- Special identity types (principles and managed identities like the ones you have to auto-apply RBAC to when Policy Assignment causes deployment on ‘deployIfNotExists’ or Policy Assignment touches a Resource outside the target Scope)
When you grant access at a Parent Scope, those permissions are inherited to Child Scopes. So when you grant the following:
Role: Owner
Scope: Management Group
Assigned to: User
How does that Role apply to the User?
The User has “Owner” permissions for ALL subscriptions within his/her Management Group
When you grant access at a Parent Scope, those permissions are inherited to Child Scopes. So when you grant the following:
Role: Reader
Scope: Subscription
Assigned to: Group
How does that Role apply to the Group?
Any user who’s part of that Group can only read/view Resources within the specified Subscription
When you grant access at a Parent Scope, those permissions are inherited to Child Scopes. So when you grant the following:
Role: Contributor
Scope: Resource Group
Assigned to: Application
How does that Role apply to the Application?
That app can manage Resources found in that Resource Group, but no other Resource Groups within the Subscription
What are the four (4) Built-In General Roles? And the two other general ones?
Built-In General Roles
Contributor: Full access to manage all resources within the assigned Scope, but does NOT allow you to assign Roles in Azure RBAC or manage assignments in Azure Blueprints
Owner: Grants full access to manage all resources within the assigned Scope, with ability to assign Roles in Azure RBAC
Reader: Read-Only access to all resources in the assigned Scope
User Access Administrator: Lets you manage user access to Azure Resources
Two Other General Roles
Resource-Specific: Access to a specific Resource only
Custom: Build a custom Role