What is RBAC Baseline in Azure Landing Zone?
- In simple terms, an RBAC
baseline is the default set of access roles and assignments
that you apply across your Azure environment to ensure least privilege
and role separation from day one.
- It’s not “every possible role” →
it’s a starting point (baseline) that enforces good access hygiene
for the Landing Zone.
- It defines who can do what,
where, and at which scope (Management Group, Subscription, Resource
Group).
RBAC
Baseline Structure (CAF-aligned)
The baseline
is typically built around role separation at 3 levels:
1. Platform
Roles (manage the Landing Zone itself)
- Platform Owner → Full control over the platform
layer (network hub, security, identity integration).
- Platform Contributor → Deploy/manage infra, but no
rights to IAM.
- Platform Reader → Audit and monitor only.
2. Workload/Application
Roles (for business apps in spokes)
- App Owner → Control over app resources in
their own RG/spoke only.
- App Contributor → Can deploy/manage, but no IAM
rights.
- App Reader → Read-only access for
troubleshooting/monitoring.
3. Security
& Governance Roles
- Security Reader → Read security configurations
across all scopes.
- Security Operator → Can manage security
configurations (e.g., Defender settings).
- Policy Contributor → Can assign/update Azure
Policies.
- Billing Reader / Cost Management
Contributor →
For finance/cost teams.
Scope |
Role |
Who
gets it |
Tenant Root
MG |
Global
Administrator (Entra ID) |
Central IT
only |
Management
Groups |
Owner/Contributor
(limited) |
Platform
team |
Subscriptions
(Platform) |
Owner |
Cloud
Platform Team |
Subscriptions
(Workload) |
Contributor |
App Teams |
Resource
Groups |
Owner/Contributor |
App
Owners/Developers (only in their RG) |
All scopes |
Reader |
Security/Compliance
team for visibility |
Cost
Management |
Billing
Reader / Cost Management Contributor |
Finance/Procurement |
Guiding
Principles to Follow
- Least Privilege → Nobody gets more rights than
they need (no “Owner” for developers).
- Role Separation → Platform vs App vs Security
teams must be separated.
- Scoped Access → Assign roles at smallest
scope possible (RG > Subscription > MG).
- Break-Glass Accounts → Keep 1–2 emergency Owner
accounts at tenant root, protected with MFA/PIM.
- Use PIM (Privileged Identity
Management) →
For all elevated roles (Owner, Contributor).
- Standardize Assignments → Enforce via Azure Policy
(e.g., deny assignments outside of MG/Subscription).
- Use Groups not Users → Assign RBAC to Entra ID
groups (Cloud-Platform-Admins, App-Team1-Contributors, etc.), not
directly to users.
Example:
RBAC Baseline in a Landing Zone
- Platform Subscription:
- Platform-Admins → Owner
- Platform-Ops → Contributor
- Security-Ops → Security Reader
- Workload Subscription (e.g., HR
App):
- HR-App-Team → Contributor (only
in HR RG)
- Security-Team → Reader (all RGs)
- Finance-Team → Cost Management
Reader
Conclusion:
An RBAC Baseline ensures secure, governed, and segregated access
in your Landing Zone from day one. It avoids the “everyone is Owner everywhere”
chaos, and lays the foundation for policy-based governance and PIM
enforcement.
No comments:
Post a Comment