More Info:

Managed service identity in App Service makes the app more secure by eliminating secrets from the app, such as credentials in the connection strings. When registering with Azure Active Directory in the app service, the app will connect to other Azure services securely without the need of username and passwords.

Risk Level

Medium

Address

Security

Compliance Standards

SOC2, HIPAA, CISAZURE, CBP, HITRUST, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate the “Managed Service Identities Disabled” misconfiguration in Azure using the Azure console, please follow these steps:

  1. Open the Azure portal and navigate to the resource group containing the affected Azure service.

  2. Click on the affected Azure service, and then click on the “Access control (IAM)” menu option.

  3. Click on the “Add” button to add a new role assignment.

  4. In the “Add role assignment” blade, select “Contributor” as the role and then select the “Azure resource” option.

  5. In the “Select” box, search for the name of the affected Azure service and select it.

  6. Leave the “Assign access to” field as “Azure AD user, group, or service principal” and then click on the “Select” button.

  7. In the “Select” box, search for the name of the managed identity that needs to be enabled and select it.

  8. Click on the “Save” button to save the role assignment.

  9. Verify that the managed identity is now enabled by checking the “Managed identities” blade of the affected Azure service.

  10. Repeat this process for any other affected Azure services.

By following these steps, you can remediate the “Managed Service Identities Disabled” misconfiguration in Azure using the Azure console.

Additional Reading: