- Learn Azure Sentinel
- Richard Diver Gary Bushey Jason S. Rader
- 364字
- 2021-06-30 15:08:17
Managing the permissions of the workspace
Before we connect and store data in the workspace and enable Azure Sentinel to carry out analytics on the data, let's review the options to secure access to this new resource. Azure provides three main levels of access to resources:
- Owner: Has the highest level of access to resources
- Contributor: Can create and modify resources, but cannot grant or revoke access
- Reader: Can view all resources
These permissions can be granted at four different levels:
- Subscription: Highest level of access, applies to all resources within the subscription
- Resource group: Applies to the specific resource group, which may contain multiple workspaces
- Workspace: Applies only to the specific workspace
- Table-level RBAC: Applies to individual tables within the log
Table-Level RBAC
While there is no user interface available to set permissions on individual tables within the log, you can create Azure custom roles to set these permissions. See https://docs.microsoft.com/en-us/azure/azure- monitor/platform/manage-access#table-level-rbac for more information on how to do this.
Permissions can be applied using built-in roles, or you can make a custom role for specific access if you need to be more granular. To make this simpler, there are several built-in user roles we recommend you use in order to manage access to Log Analytics for the purpose of using Azure Sentinel, and we recommend you apply these to the specific resource group used for Azure Sentinel:
- Engineers developing new queries and data connectors:
a) Azure Sentinel Contributor: Provides the ability to create and edit dashboards, analytics rules, and other Azure Sentinel resources
b) Log Analytics Reader: Provides read-only visibility to all Azure resources and Azure Sentinel logs
- Analysts running daily operations:
a) Azure Sentinel Responder: Provides the ability to manage incidents, view data, workbooks, and other Azure Sentinel resources
b) Log Analytics Reader: Provides read-only visibility to all Azure resources and Azure Sentinel logs
If additional permissions are required, keep to the idea of providing the minimal permissions and applying only the specific resources required. It may take some trial and error to get the right outcome, but it is a safer option than providing broad and excessive permissions. For further information, please take a look at the following article:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/manage-access
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 信息系統安全檢測與風險評估
- Mastering Kali Linux for Advanced Penetration Testing
- 安全實戰之滲透測試
- 安全技術運營:方法與實踐
- 網絡安全技術與實訓(第4版)(微課版)
- 網絡安全設計、配置與管理大全
- 互聯網企業安全高級指南
- 實用黑客攻防技術
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- Mastering Metasploit
- 功能型密碼算法設計與分析
- 數字銀行安全體系構建
- Manga Studio 5 Beginner's Guide
- 網絡空間安全體系