Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/epomatti/azure-pim-security
Azure Privileged Identity Management (PIM) security scenarios
https://github.com/epomatti/azure-pim-security
azure azure-pim azure-security entra entra-id pim terraform
Last synced: 18 days ago
JSON representation
Azure Privileged Identity Management (PIM) security scenarios
- Host: GitHub
- URL: https://github.com/epomatti/azure-pim-security
- Owner: epomatti
- License: mit
- Created: 2023-12-16T16:50:42.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2023-12-16T17:00:15.000Z (about 1 year ago)
- Last Synced: 2024-11-17T00:21:12.243Z (3 months ago)
- Topics: azure, azure-pim, azure-security, entra, entra-id, pim, terraform
- Language: HCL
- Homepage:
- Size: 56.6 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Azure PIM Security
Azure Privileged Identity Management (PIM) security scenarios.
To create the sample resources:
```sh
cp config/template.tfvars .auto.tfvarsterraform init
terraform apply -auto-approve
```### Role settings
Settings you can require on `activation`:
- MFA, or conditional access authentication context
- Justification
- Ticket information
- ApprovalAssignment:
- Allow permanent eligible assignment (or set to expire)
- Allow permanent active assignment (or set ot expire)
- Require Azure MFA on active assignment
- Require justification on active assignment### Scenario
Here is a scenario for PIM assignment.
The following users will be created:
| Name | Member of |
|----------|----------------|
| User1 | Group1 |
| User2 | Group2 |
| User3 | Group1, Group2 |> ℹ️ `Group1` and `Group2` are already created with PIM roles assignment enabled
To execute this PIM scenario, configure a role such as `Security Administrator` like this:
`Group1` assignment:
`Group2` assignment: