Skip to content

Can be used when testing a newly created custom role, to see if there are inadvertent permissions granted on known risky Azure Management APIs.

Notifications You must be signed in to change notification settings

swiftsolves-msft/RiskyAPIs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Analyze-CustomRoleDefinition

author: Nathan Swift

New Azure Portal UI experience for creating and editing custom roles is avaliable!

Can be used when testing a newly created custom role, to see if there are inadvertent permissions granted on known risky Azure management APIs.

Longer term goals include:

  • Community driven effort to build .csv or undefined template file you can import that defines risky APIs with some context, classification, and why
  • A documented scenario where triggered alert of a new custom role definition executes script.

Click Image Below to redirect to Azure Security Compass - @MarkSimos

About

Can be used when testing a newly created custom role, to see if there are inadvertent permissions granted on known risky Azure Management APIs.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published