Ensure that the use of the 'User Access Administrator' role is limited within your Microsoft Azure cloud account in order to minimize security risks and promote the Principle of Least Privilege (i.e., providing users and applications the minimal amount of access required to perform their tasks).
Restricting the use of the 'User Access Administrator' role in Azure cloud is essential to minimize the risk of excessive permissions. This role grants the ability to manage access for all Azure resources, making it highly privileged. Limiting its use reduces the potential for accidental or malicious misuse, enhances security, and aligns with the Principle of Least Privilege (POLP).
Audit
To check the User Access Administrator role usage within your Azure cloud account, perform the following operations:
Remediation / Resolution
To restrict the User Access Administrator role usage within your Azure cloud account, perform the following operations:
References
- Azure Official Documentation
- https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
- https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az role assignment list
- az role assignment delete
- az role assignment create