-
Notifications
You must be signed in to change notification settings - Fork 568
[User Guide] Module Permissions
This module is primarily designed to build your resource hierarchy, manage policies and set permissions.
As such, you can think of this as being the primary point of governance for your deployment to Azure.
By design, the Azure platform (not our module) will automatically assign Owner
permissions to the creator of any Management Group.
This permission will be inherited by all child resources, including Management Groups, Subscriptions, Resource Groups and Resources.
To get started with the module for deploying "core resources", you only need access to a single Subscription (for the Azure RM Provider to authenticate with Azure).
No specific permissions are needed unless your Tenant has been configured to Require permissions for creating new management groups.
If enabled, the module requires the Microsoft.Management/managementGroups/write
operation on the root management group to create new child management groups.
This operation is included in the recommended roles listed below so doesn't require additional configuration.
You also need to consider permissions needed for Moving management groups and subscriptions into the Azure landing zone resource hierarchy, as summarized below:
- Management group write and Role Assignment write permissions on the child subscription or management group.
- Built-in role example Owner
- Management group write access on the target parent management group.
- Built-in role example: Owner, Contributor, Management Group Contributor
- Management group write access on the existing parent management group.
- Built-in role example: Owner, Contributor, Management Group Contributor
All Subscriptions will inherit Owner
permissions from the Management Group hierarchy for the identity used to run Terraform.
As the requirement for Role Assignment write permissions effectively gives this identity permissions to assign any other permissions, we do not recommend altering this configuration.
In most cases, we advise running this module within a secure CI/CD pipeline and monitoring the Activity Log for suspicious activity (using suitable SIEM tooling) to mitigate the risks associated with high privileged identities.
To enable access to newly created Subscriptions whilst maintaining a security boundary from other parts of your hierarchy, consider provisioning a dedicated Management Group under the Tenant Root Group
and configuring this as the default Management Group.
This Management Group should not be managed by this module, and should be configured with the required permissions for the identity deploying this module to access it.
By granting Terraform access to this Management Group, Terraform will be able to on-board new Subscriptions into the Azure landing zone hierarchy without needing additional permissions on the Tenant Root Group
.
For brownfield environments, you may also wish to manually move existing Subscriptions into a custom default Management Group (as above) to enable on-boarding into the module, but always check the impact this will have on any existing policy and access control settings.
For more information around this scenario, please refer to our guidance on transitioning existing Azure environments to an Azure landing zone.
In a standard deployment, the permissions necessary to deploy Connectivity resources should be in place through the Core resources configuration.
If you have implemented a custom "least privilege" permissions model, you may need to consider the additional permissions needed to deploy Connectivity resources in the Connectivity Subscription.
To ensure you have sufficient coverage of the resource types deployed by this module, we recommend assigning the Network Contributor
role.
Although the module should inherit the necessary permissions through the Core resources configuration, please note that the sequencing of resource creation assumes these permissions are already in place on the target Subscription. Initial deployment may fail if the target Subscription hasn't already been moved into the target Management Group.
You may also need to add these permissions if running dedicated pipelines for Core resources, Connectivity resources, and Management resources.
In a standard deployment, the permissions necessary to deploy Management resources should be in place through the Core resources configuration.
If you have implemented a custom "least privilege" permissions model, you may need to consider the additional permissions needed to deploy Management resources in the Management Subscription.
To ensure you have sufficient coverage of the resource types deployed by this module, we recommend assigning the Log Analytics Contributor
role.
Although the module should inherit the necessary permissions through the Core resources configuration, please note that the sequencing of resource creation assumes these permissions are already in place on the target Subscription. Initial deployment may fail if the target Subscription hasn't already been moved into the target Management Group.
You may also need to add these permissions if running dedicated pipelines for Core resources, Connectivity resources, and Management resources.
This wiki is being actively developed
If you discover any documentation bugs or would like to request new content, please raise them as an issue or feel free to contribute to the wiki via a pull request. The wiki docs are located in the repository in the docs/wiki/
folder.
- Home
- User guide
- Video guides
-
Examples
- Level 100
- Level 200
-
Level 300
- Deploy multi region networking with custom settings (Hub and Spoke)
- Deploy multi region networking with custom settings (Virtual WAN)
- Deploy with Zero Trust network principles (Hub and Spoke)
- Deploy identity resources with custom settings
- Deploy management resources with custom settings
- Expand built-in archetype definitions
- Create custom policies, initiatives and assignments
- Override module role assignments
- Control policy enforcement mode
- Policy assignments with user assigned managed identities
- Level 400
- Frequently Asked Questions
- Troubleshooting
- Contributing