-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limit App permission to Storage Queue endpoint #24
base: main
Are you sure you want to change the base?
Conversation
Are you sure this works? Because "dataActions": [ But we also need to list storage accounts and event grid subscriptions so we're notified of new audit logs Here are some other Built-in roles that have those missing permissions However that would involve having 3 built-in roles assigned to the service principal, instead of allowing just this one CustomRole (which would be assigned to Lacework's resource group, as per my PR#22) |
@marcosgm Yes, I may be wrong. Can you explain what each permission is needed for?
|
@Tbohunek Thank you so much for this contribution, this is a bigger change that will require
We will keep you posted on how the review goes. 👍🏽 |
b796bf7
to
1145742
Compare
Use Role Definition Name instead
Hi @Tbohunek . I've been working with Engineering, they're aware we can do things differently on our backend. For the time being, the integration needs the permissions we document in the Custom Role description. However if you prefer Built-in roles, you could use these two (which grant broader permissions though). $ appID=<LW_ACTLOGREAD_APP_ID> Today, we use Azure's Log Profile export feature, which stored the logs in a folder named "insights-operational-logs". I'm working to certify our usage with Azure Monitor's Diagnostic Settings, which exports the same kind of logs in a folder named "insights-activity-logs". Inside, we'll find a folder structure that includes Subscription ID, allowing us to consolidate logs from multiple subscriptions in a single Storage account (in alignment to Microsoft's best practices for centralized logging). The blobs are created by Azure hourly, in separate folders. We leverage an Event Grid subscription that puts a Queue messages, so Lacework pulls the new logs as soon as they appear, by subscribing to the Queue and then downloading the logs only when needed. |
Closing as we consider the permissions scoped down to the resource group to be the most restrictive. |
Thanks for your efforts @marcosgm, however I think there's a little misunderstanding. In my understanding, all your AAD App needs access to is the Storage Queue to which Event Grid Subscription feeds messages from the Storage Blob. For that, Why would you need to Am I wrong? Thanks for your thoughts. |
@afiune I guess you just need to test it out internally. |
It is enough to use builtin RBAC role to access Queue endpoint.
It is enough to scope the role to the Storage Account.