官术网_书友最值得收藏!

Managing the permissions of the workspace

Before we connect and store data in the workspace and enable Azure Sentinel to carry out analytics on the data, let's review the options to secure access to this new resource. Azure provides three main levels of access to resources:

  • Owner: Has the highest level of access to resources
  • Contributor: Can create and modify resources, but cannot grant or revoke access
  • Reader: Can view all resources

These permissions can be granted at four different levels:

  • Subscription: Highest level of access, applies to all resources within the subscription
  • Resource group: Applies to the specific resource group, which may contain multiple workspaces
  • Workspace: Applies only to the specific workspace
  • Table-level RBAC: Applies to individual tables within the log

    Table-Level RBAC

    While there is no user interface available to set permissions on individual tables within the log, you can create Azure custom roles to set these permissions. See https://docs.microsoft.com/en-us/azure/azure- monitor/platform/manage-access#table-level-rbac for more information on how to do this.

Permissions can be applied using built-in roles, or you can make a custom role for specific access if you need to be more granular. To make this simpler, there are several built-in user roles we recommend you use in order to manage access to Log Analytics for the purpose of using Azure Sentinel, and we recommend you apply these to the specific resource group used for Azure Sentinel:

  • Engineers developing new queries and data connectors:

    a) Azure Sentinel Contributor: Provides the ability to create and edit dashboards, analytics rules, and other Azure Sentinel resources

    b) Log Analytics Reader: Provides read-only visibility to all Azure resources and Azure Sentinel logs

  • Analysts running daily operations:

    a) Azure Sentinel Responder: Provides the ability to manage incidents, view data, workbooks, and other Azure Sentinel resources

    b) Log Analytics Reader: Provides read-only visibility to all Azure resources and Azure Sentinel logs

If additional permissions are required, keep to the idea of providing the minimal permissions and applying only the specific resources required. It may take some trial and error to get the right outcome, but it is a safer option than providing broad and excessive permissions. For further information, please take a look at the following article:

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/manage-access

主站蜘蛛池模板: 宾阳县| 玛曲县| 宁乡县| 襄城县| 鹤壁市| 石狮市| 安新县| 广西| 泸州市| 隆回县| 龙口市| 灵璧县| 汉中市| 老河口市| 河池市| 突泉县| 绥江县| 福清市| 定西市| 博客| 武穴市| 新郑市| 阿图什市| 商河县| 仁怀市| 乐亭县| 读书| 崇礼县| 北川| 庆城县| 关岭| 敦化市| 马关县| 禄丰县| 新晃| 海晏县| 新巴尔虎右旗| 延边| 盈江县| 扶沟县| 东乡县|