More Info:

Roles which have suspicious accesss

Risk Level

High

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the issue of roles having suspicious access in Azure IAM (Identity and Access Management) using the Azure console, follow these steps:

  1. Sign in to the Azure portal (https://portal.azure.com) using your Azure account credentials.

  2. In the Azure portal, navigate to the Azure Active Directory (AAD) service. You can find it by searching for “Azure Active Directory” in the search bar at the top.

  3. In the Azure Active Directory dashboard, select “Roles and administrators” from the left-hand menu.

  4. On the Roles and administrators page, you will see a list of built-in roles and custom roles defined in your Azure AD tenant. Review the roles and identify any suspicious roles that have unauthorized or excessive access permissions.

  5. Click on the suspicious role to view its details and permissions.

  6. In the role details page, review the assigned users, groups, or applications to identify any unauthorized assignments. Remove any inappropriate assignments by selecting the assignment and clicking on the “Remove” button.

  7. If the suspicious role is a custom role, you may need to modify its permissions to limit access. Click on the “Permissions” tab and review the permissions assigned to the role. Remove any unnecessary or excessive permissions by selecting them and clicking on the “Remove” button.

  8. Once you have removed unauthorized assignments and modified permissions if required, click on the “Save” button to apply the changes.

  9. Repeat steps 5 to 8 for all suspicious roles identified in your Azure AD tenant.

  10. After remediation, it is recommended to monitor the roles and access permissions regularly to ensure ongoing security. Consider implementing Azure AD Privileged Identity Management (PIM) to enforce just-in-time access and periodic access reviews for critical roles.

By following these steps, you can remediate the issue of roles having suspicious access in Azure IAM using the Azure console.