You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-government/compliance/recommended-secure-configuration.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ Azure defines the following top-level administrative accounts.
49
49
50
50
**SCG-CSO-RSC Requirement:** Instructions about how to securely access, configure, operate, and decommission top-level administrative accounts that control enterprise access to the entire cloud service offering.
51
51
52
-
Azure publishes authoritative guidance for top-level admin roles via Microsoft Learn (Microsoft Entra documentation), including privileged role definitions, emergency access ("break-glass") account guidance, and FedRAMP High identity access controls. For more information, see [RBAC and Directory Admin Roles](/role-based-access-control/rbac-and-directory-admin-roles).
52
+
Azure publishes authoritative guidance for top-level admin roles via Microsoft Learn (Microsoft Entra documentation), including privileged role definitions, emergency access ("break-glass") account guidance, and FedRAMP High identity access controls. For more information, see [RBAC and Directory Admin Roles](/azure/role-based-access-control/rbac-and-directory-admin-roles).
53
53
54
54
Microsoft Learn documents the built‑in administrative roles that are authorized to change tenant‑wide security settings, including:
55
55
@@ -62,7 +62,7 @@ These roles have the ability to alter authentication requirements, disable prote
62
62
63
63
Azure provides guidance to protect administrator sign-in, enforce MFA, conditional access, and protected admin workstations which detail how to securely access top-level administrative accounts in Azure. For more information, see [Privileged roles and permissions](/entra/identity/role-based-access-control/privileged-roles-permissions).
64
64
65
-
Azure defines critical roles (Global/Privileged Role Admin), separation of duties, least‑privilege configuration and provides guidance to manage emergency access admin accounts in Entra ID – Guidance on creating and managing highly privileged “break-glass” global admin accounts (for emergency scenarios) to securely configure top-level administrative accounts with instructions to implement at [Microsoft cloud security benchmark – Privileged access](/security/benchmark/azure/mcsb-privileged-access) and [Azure identity & access security best practices](/azure/security/fundamentals/identity-management-best-practices).
65
+
Azure defines critical roles (Global/Privileged Role Admin), separation of duties, least‑privilege configuration and provides guidance to manage emergency access admin accounts in Entra ID – Guidance on creating and managing highly privileged break-glass global admin accounts (for emergency scenarios) to securely configure top-level administrative accounts with instructions to implement at [Microsoft cloud security benchmark – Privileged access](/security/benchmark/azure/mcsb-privileged-access) and [Azure identity & access security best practices](/azure/security/fundamentals/identity-management-best-practices).
66
66
67
67
Azure provides operational guardrails for privileged sessions, access reviews, activation workflows, and monitoring to securely operate top-level administrative accounts as well as lifecycle guidance to remove stale assignments and revoke credentials with least standing privilege to securely decommission (retire) top‑level administrative accounts.
0 commit comments