Skip to main content
Version: 2.1.1-preview

MT.1056 - Ensure that no person has permanent access to all Azure subscriptions at the root scope

Overview

Ensure that no person has permanent access to Azure Subscriptions.

User Access Administrator is a role that allows an Administrator to perform everything on an Azure Subscription. Global Administrators can gain this permission on the Root Scope in Entra ID, in the properties of the Entra ID tenant. These permissions should only be used in case of emergency and should not be assigned permanently.

Ensure that no User Access Administrator permissions at the Root Scope are applied.

Remediation action:

To remove all Admins with Root Scope permissions, as a Global Admin:

  1. Navigate to Microsoft Azure Portal https://portal.azure.com.
  2. Search for Microsoft Entra ID and select Microsoft Entra ID.
  3. Expand the Manage menu and select Properties.
  4. On the Properties page, go to the Access management for Azure resources section.
  5. In the information bar, click Manage elevated access users.
  6. Select all User Access Administrators and click Remove.
  7. Also check other role assignments, as they need to be removed to pass the tests.

To remove the admins through CLI:

az role assignment delete --role "User Access Administrator" --assignee adminname@yourdomain.com --scope "/"

Test Metadata

FieldValue
Test IDMT.1056
SeverityHigh
SuiteMaester
CategoryPrivileged
PowerShell testTest-MtUserAccessAdmin
TagsAzure, MT.1056, Privileged

Source

  • Pester test: tests/Maester/Azure/UserAccessAdmin.Tests.ps1
  • PowerShell source: powershell/public/maester/azure/Test-MtUserAccessAdmin.ps1