官术网_书友最值得收藏!

Managing the permissions of the workspace

Before we connect and store data in the workspace and enable Azure Sentinel to carry out analytics on the data, let's review the options to secure access to this new resource. Azure provides three main levels of access to resources:

  • Owner: Has the highest level of access to resources
  • Contributor: Can create and modify resources, but cannot grant or revoke access
  • Reader: Can view all resources

These permissions can be granted at four different levels:

  • Subscription: Highest level of access, applies to all resources within the subscription
  • Resource group: Applies to the specific resource group, which may contain multiple workspaces
  • Workspace: Applies only to the specific workspace
  • Table-level RBAC: Applies to individual tables within the log

    Table-Level RBAC

    While there is no user interface available to set permissions on individual tables within the log, you can create Azure custom roles to set these permissions. See https://docs.microsoft.com/en-us/azure/azure- monitor/platform/manage-access#table-level-rbac for more information on how to do this.

Permissions can be applied using built-in roles, or you can make a custom role for specific access if you need to be more granular. To make this simpler, there are several built-in user roles we recommend you use in order to manage access to Log Analytics for the purpose of using Azure Sentinel, and we recommend you apply these to the specific resource group used for Azure Sentinel:

  • Engineers developing new queries and data connectors:

    a) Azure Sentinel Contributor: Provides the ability to create and edit dashboards, analytics rules, and other Azure Sentinel resources

    b) Log Analytics Reader: Provides read-only visibility to all Azure resources and Azure Sentinel logs

  • Analysts running daily operations:

    a) Azure Sentinel Responder: Provides the ability to manage incidents, view data, workbooks, and other Azure Sentinel resources

    b) Log Analytics Reader: Provides read-only visibility to all Azure resources and Azure Sentinel logs

If additional permissions are required, keep to the idea of providing the minimal permissions and applying only the specific resources required. It may take some trial and error to get the right outcome, but it is a safer option than providing broad and excessive permissions. For further information, please take a look at the following article:

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/manage-access

主站蜘蛛池模板: 岳阳县| 祁连县| 五家渠市| 玉山县| 松原市| 金秀| 荥经县| 荔浦县| 当涂县| 寻甸| 天全县| 大安市| 望城县| 孙吴县| 大足县| 句容市| 芒康县| 鄄城县| 疏勒县| 拜泉县| 澄城县| 庆元县| 商水县| 集贤县| 杨浦区| 定襄县| 台山市| 黔西| 黑河市| 清远市| 高清| 楚雄市| 丹棱县| 永登县| 佛冈县| 浦江县| 新营市| 弥勒县| 扶余县| 城市| 法库县|