Ensure that your functions managed with Microsoft Azure Function App don't have privileged administrative permissions in order to promote the Principle of Least Privilege (POLP) and provide your functions the minimal amount of access required to perform their tasks.
optimisation
efficiency
excellence
In Azure cloud, user-assigned managed identities encompass a broader range of roles including privileged administrator roles. Privileged administrator roles incorporate positions that provide elevated access privileges, such as the capability to oversee Azure resources or delegate roles to other users. User-assigned identities for Azure functions should not have admin privileges to minimize security risks. Granting admin rights can lead to unintended access, data breaches, and misuse. Limiting permissions to the minimum necessary for the function's operation follows the Principle of Least Privilege, enhancing overall security by reducing the attack surface and potential damage from unauthorized access.
Audit
To determine if your Azure functions are configured with admin privileges, perform the following operations:
Remediation / Resolution
To ensure that your functions managed with Microsoft Azure Function App are not configured with admin privileges, perform the following operations:
References
- Azure Official Documentation
- What are managed identities for Azure resources?
- Azure roles, Microsoft Entra roles, and classic subscription administrator roles
- Azure built-in roles
- Assign Azure roles using the Azure portal
- Assign Azure roles using Azure CLI
- Azure Command Line Interface (CLI) Documentation
- az functionapp list
- az functionapp show
- az role assignment list
- az role assignment delete
- az role assignment create