Privileged roles should not have permanent access at subscription/RG level

CRITICAL

Ensures privileged roles (Owner, Contributor, etc.) are not permanently assigned but use just-in-time activation.

What does this mean?

Permanent privileged role assignments create a standing attack surface. If an account with permanent Owner or Contributor access is compromised, the attacker immediately has full control. This recommendation enforces just-in-time (JIT) access through PIM.

Benefits of implementation

  • Reduces standing privileged access to near-zero
  • Limits the blast radius of compromised accounts
  • Provides audit trail of privilege activation

Drawbacks and considerations

  • Requires Azure AD PIM licensing (P2)
  • Additional friction for administrators needing frequent access
  • Emergency access scenarios need break-glass account procedures

Implementation

Implementation guidance coming soon.

Related recommendations will be linked here.

Frameworks

Details
Risk Level
CRITICAL
Category
Identity & Access Management
Azure Resource

Frameworks
2 frameworks
Last updated
2026-02-12