Mitigating Privilege Escalations with Managed Identities
- Audit and remove privileges held by Service Principals
- Find active and eligible assigments for admin roles:
- Global Administrator
- Privileged Role Administrator
- Privileged Authentication Admin
- Find service principals that have
- RoleManagement.ReadWrite.Directory
- AppRoleAssignment.ReadWrite.All
- Audit privileges held by other principals
- Find users, groups, and service principals with admin roles:
- Application Administrator
- Cloud Application Administrator
- Directory Synchronization Account
- Hybrid Identity Administrator
- Partner Tier1 Support
- Partner Tier2 Support
- Audit explicit owners of service principals from step 1
- Audit service principals with MS Graph app roles:
- Application.ReadWrite.All
- ServicePrincipalEndpoint.ReadWrite.All
- Audit privileges held against automation accounts
- Owner
- Contributor
- Automation Contributor
- User Access Administrator
Detecting Automation Account RunBook Edits
- Produce logs when a service principal is granted elevated roles:
- Global Administrator
- Privileged Role Administrator
- Privileged Authentication Administrator
- Produce logs when RunBook Edits happen
- Creating a draft
- Publishing a draft
- Produce logs when a service principal is granted app roles:
- RoleManagement.ReadWrite.Directory
- AppRoleAssignment.ReadWrite.All