As we figured out last week, Azure Role-Based Access Control (RBAC) is a very important thing, when it comes to the Management of Microsoft Azure. But there is another important feature you should know to keep control: Azure Policy
Problems with RBAC
Remember the function of RBAC, where Security Principal, Role and Scope meet each other and define you final set of rights:
If you think about this, you will figure out that you still may have an issue. If a user has the right to create VMs … he can create any VM he wants, in any region he wants. And as we know, VMs in Azure can cost 80$ a month or for the larger sizes go up to 200.000$ a month. So you may wish to have a solution for this.
Another problem is that you can control what a user can do, but not really how a resource looks like. So people with the right role can create Storage accounts, but nobody is forcing to set https as required. Admins with the respective role can create VMs but they may forget to add a backup. Also you cannot define how the „inside-configuration“ of a VM looks like. Network Admins may create a Public IP, but assign it to internal systems by accident.
These are things you cannot solve with roles, scopes or security principals … this is the moment when you start to love Azure Policy capabilities…
What is Azure Policy?!
Azure policy is the default allow and explicit deny system in Azure. It focuses on the resource properties of a resource, like:
location
prizing tier
tags
naming
related services like backup and monitoring
in-guest configuration
…
So it is the perfect addition to RBAC … as RBAC gives you explicit access … Policy defines the configurations you can to and which one are not allowed.
So very common Policies are:
Enable Monitoring
Allowed Locations
Allowed VM Sizes
Enable Security Center
Apply specific Tags
…
How are Azure Policies created?!
If you want to manage your Azure Policies you can do this via the Azure Portal, via CLI or PowerShell or even via CI/CD or Blueprints. So you can see there are multiple options. As this is a basic article, let’s try the easy way through the portal.
You can find the „Policy“ view in the Azure Portal. Here you can see a compliance overview across all your subscriptions and resources. There are some default policies like the „ASC Default“ which are set by and for Azure Security Center.
Azure Policy works with Definitions and Assignments. Definitions can be grouped together to Initiatives. To make it simple:
Policy Definitions – represents a specific policy which defines what is allowed or not allowed
Policy Initiatives – group of policies that makes assigning policies to certain scopes easier
Policy Assignments – is the way to apply a policy or initiative to a chosen scope. here you will set your parameters for the specific assignment.
Policy Definition work with an if-then approach and look like:
Also this week there were many news around Microsoft Azure! Here as always the overview for you: Azure Machine Learning – Public Preview for September Preview: Save Azure Backup Recovery Services Agent (MARS) passphrase to Azure Key Vault Preview: Cross Region Restore (CRR) for Recovery Services Agent (MARS) using Azure Backup Generally available: Azure Ultra…
Also this week there were many news around Microsoft Azure! Here as always the overview for you: Azure Load Testing now supports uploading large files as ZIP Move Azure Load Testing resources across resource groups and subscriptions Generally available: Azure Premium SSD v2 Disk Storage is now available in more regions Public Preview: Azure Container…
Also this week there were many news around Microsoft Azure! Here as always the overview for you: Generally Available: Azure Monitor VM Insights using Azure Monitor Agent Azure Firewall Single-Click Upgrade and Downgrade is now in general availability Azure Firewall: Explicit Proxy is now in public preview Public Preview: Azure Log Alerts support for Azure…
Also this week there were many news around Microsoft Azure! Here as always the overview for you: Quick create Azure Front Door endpoints for Azure Storage accounts General Availability: AzAcSnap 9 — Azure Application Consistent Snapshot tool updates Update type on your application insights troubleshooting guides by 31 March 2024 Public preview: Rate-limit rules for…
Also this week there were many news around Microsoft Azure! Here as always the overview for you: Public Preview: Custom NFSv4.1 ID Domain in Azure NetApp Files Public Preview: Azure Elastic SAN Updates: Private endpoints & shared volumes Generally Available: SDK type bindings in Azure Functions Generally Available: Kubernetes 1.27 support in AKS Generally available:…
Datenschutz & Cookies: Diese Website verwendet Cookies. Wenn du die Website weiterhin nutzt, stimmst du der Verwendung von Cookies zu.
Weitere Informationen, beispielsweise zur Kontrolle von Cookies, findest du hier:
Cookie-Richtlinie
Leave a comment