-
Notifications
You must be signed in to change notification settings - Fork 240
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add service principals to the evaluation scope of AAD ScubaGear policy checks 7.1 through 7.5 #887
Comments
MS Graph Powershell cmdlet AnalysisTo get the metadata about the service principal (including Displayname), we need the Cmdlet below. Since it is in a Graph module that we don't currently have in ScubaGear (microsoft.graph.beta.applications), we'd need to add the module to the setup script. The cmdlet can work with the existing permission in ScubaGear Directory.Read.All so we don't need a new permission.
|
ScubaGear AAD Policy Impact AnalysisThis section describes how the addition of service principals to the code will enhance or impact each of the policies in section 7 of the Azure AD baseline. It is important to understand that organizations that previously used ScubaGear may receive different assessment outputs from the tool after we include the service principal functionality.
|
Changed the issue status to Blocked at the request from CISA to have a discussion about how to integrate service principals into our baseline. It may require new baseline statements that are specific to service principals. |
After discussing with CISA, the plan is to augment ScubaGear to grab the list of service principals and their respective highly privileged roles and display them in the report. Once this is implemented, CISA will work with agencies to examine the data for a period of time, and then we will determine if new Scuba policies are necessary and design what they should be. #934 was created for the coding enhancement. |
💡 Summary
The scope of this task is to enhance ScubaGear AAD policy checks 7.1 through 7.5 to include service principal identities. The existing code only processes regular user accounts and groups. It makes sense to add service principals to the assessment because they are frequently assigned to highly privileged roles and therefore carry a lot of risk just like regular users.
Implementation notes
The text was updated successfully, but these errors were encountered: