Privileged access
PA-1: Separate and limit highly privileged/administrative users
Feature: Local Admin Accounts
Description: Service has the concept of a local administrative account.
Feature notes: Avoid the usage of local authentication methods or accounts, these should be disabled wherever possible. Instead use Azure AD to authenticate where possible.
Configuration Guidance: If not required for routine administrative operations, disable or restrict any local admin accounts for only emergency use.
PA-7: Follow just enough administration (least privilege) principle
Feature: Azure RBAC for Data Plane
Description: Azure Role-Based Access Control (Azure RBAC) can be used to managed access to service's data plane actions.
Configuration Guidance: Use Azure role-based access control (Azure RBAC) for controlling access to Azure API Management. Azure API Management relies on Azure role-based access control to enable fine-grained access management for API Management services and entities (for example, APIs and policies).
PA-8: Determine access process for cloud provider support
Feature: Customer Lockbox
Description: Customer Lockbox can be used for Microsoft support access.
Configuration Guidance: In support scenarios where Microsoft needs to access your data, use Customer Lockbox to review, then approve or reject each of Microsoft's data access requests.
Comments
Post a Comment