Skip to content

limit-role-actions

Default Severity: medium

Explanation

The permissions granted to a role should be kept to the minimum required to be able to do the task. Wildcard permissions must not be used.

Possible Impact

Open permissions for subscriptions could result in an easily compromisable account

Suggested Resolution

Use targeted permissions for roles

Insecure Example

The following example will fail the azure-authorization-limit-role-actions check.

 data "azurerm_subscription" "primary" {
 }

 resource "azurerm_role_definition" "example" {
   name        = "my-custom-role"
   scope       = data.azurerm_subscription.primary.id
   description = "This is a custom role created via Terraform"

   permissions {
     actions     = ["*"]
     not_actions = []
   }

   assignable_scopes = [
     "/"
   ]
 }

Secure Example

The following example will pass the azure-authorization-limit-role-actions check.

 data "azurerm_subscription" "primary" {
 }

 resource "azurerm_role_definition" "example" {
   name        = "my-custom-role"
   scope       = data.azurerm_subscription.primary.id
   description = "This is a custom role created via Terraform"

   permissions {
     actions     = ["*"]
     not_actions = []
   }

   assignable_scopes = [
     data.azurerm_subscription.primary.id,
   ]
 }