Post

Manage access to landing zones

Discover key concepts like principals, roles, permissions, and scope and the use of Privileged Identity Management.

Introduction

Access to landing zones can be managed using Azure RBAC (Role-Based Access Control). The way you control access to resources by using Azure RBAC is through role assignments, which can be broken down into the following:

Role assignment = Principal (Who) + Permission (What) + Scope (Where)

Principal

A principal is an object representing a user, group, service principal, or managed identity that requests access to Azure resources.

Role

A role definition is a collection of permissions, commonly referred to as a role. A role definition specifies the actions that can be performed, such as read, write, and delete. Roles can range from high-level, like Owner, to specific, like Developer.

Permissions

For permissions, the scope refers to the set of resources the permissions apply to. When assigning a role, actions can be restricted by defining the scope. Example below:

PermissionDescription
Cost Management ContributorCan view costs and manage cost configuration (e.g., budgets and alerts)
OwnerProvides full access to manage all resources and assign RBAC roles
ReaderCan view all resources but cannot make changes
ContributorProvides full access to manage all resources, but not assign RBAC roles
Key Vault AdministratorGrants access to Key Vault and objects within it (keys, secrets, certificates)

Group

A group is a principal that requests access to Azure resources. The group should include all members who need access to their landing zone(s) in Azure.

You can use role groups to differentiate between permanent (static) access and available PIM (Privileged Identity Management) assignments. PIM provides time-based and approval-based role activation to reduce the risk of unnecessary access permissions to Azure resources.

Access Management

Example of landing zone access with security groups:

Corp and OnlineRolePermissions
OwnerCost Management ContributorSG-Owner
Admin[PIM]: Owner [Permanent]: ReaderSG-Admin
Developer[PIM]: Contributor [PIM]: Key Vault Administrator [Permanent]: ReaderSG-Developer
This post is licensed under CC BY 4.0 by the author.