2023-06-07 06:39:48 -07:00
---
demo:
2023-06-08 10:47:15 -07:00
title: 'Demonstration 02: Administer Governance and Compliance'
2023-06-07 06:39:48 -07:00
module: 'Administer Governance and Compliance'
---
# 02 - Administer Governance and Compliance
## Configure Subscriptions
2023-06-08 15:39:17 -07:00
This area does not have a formal demonstration.
2023-06-07 06:39:48 -07:00
2023-06-08 15:39:17 -07:00
**Reference**: [Create an additional Azure subscription ](https://docs.microsoft.com/azure/cost-management-billing/manage/create-subscription )
2023-06-07 06:39:48 -07:00
## Configure Azure Policy
In this demonstration, we will work with Azure policies.
2023-06-08 15:39:17 -07:00
**Reference**: [Tutorial: Build policies to enforce compliance - Azure Policy ](https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage )
2023-06-07 06:39:48 -07:00
**Assign a policy**
1. Access the Azure portal.
2. Search for and select **Policy** .
2023-06-12 15:22:01 -07:00
3. Select **Assignments** and then **Assign Policy** .
2023-06-07 06:39:48 -07:00
2023-06-12 15:22:01 -07:00
5. Discuss the **Scope** which determines what resources or grouping of resources the policy assignment is enforced on.
2023-06-07 06:39:48 -07:00
2023-06-12 15:22:01 -07:00
6. Select the **Policy definition** ellipsis to open the list of available definitions. Take some time to review the built-in policy definitions.
2023-06-07 06:39:48 -07:00
2023-06-12 15:22:01 -07:00
7. Search for and select the **Allowed locations** policy. This policy enables you to restrict the locations your organization can specify when deploying resources.
2023-06-07 06:39:48 -07:00
8. Move the **Parameters** tab and using the drop-down select one or more allowed locations.
9. Click **Review + create** and then **Create** to create the policy.
**Create and assign an initiative definition**
1. Return to the Azure Policy page and select **Definitions** under Authoring.
2. Select **Initiative Definition** at the top of the page.
3. Provide a **Name** and **Description** .
4. **Create new** Category.
5. From the right panel **Add** the **Allowed locations** policy.
6. Add one additional policy of your choosing.
7. **Save** your changes and then **Assign** your initiative definition to your subscription.
**Check for compliance**
1. Return to the Azure Policy service page.
2. Select **Compliance** .
3. Review the status of your policy and your definition.
**Check for remediation tasks**
1. Return to the Azure Policy service page.
2. Select **Remediation** .
3. Review any remediation tasks that are listed.
2023-06-13 05:57:05 -07:00
4. As you have time, remove the policy and the initiative.
2023-06-07 06:39:48 -07:00
## Configure Role-Based Access Control
In this demonstration, we will learn about role assignments.
2023-06-08 15:39:17 -07:00
**Reference**: [Tutorial: Grant a user access to Azure resources using the Azure portal - Azure RBAC ](https://docs.microsoft.com/azure/role-based-access-control/quickstart-assign-role-user-portal )
2023-06-07 06:39:48 -07:00
2023-06-08 15:39:17 -07:00
**Reference**: [Quickstart - Check access for a user to Azure resources - Azure RBAC ](https://docs.microsoft.com/azure/role-based-access-control/check-access )
2023-06-07 06:39:48 -07:00
**Locate Access Control blade**
1. Access the Azure portal and select a resource group. Make a note of what resource group you use.
2. Select the **Access Control (IAM)** blade.
3. This blade will be available for many different resources so you can control permissions.
**Review role permissions**
1. Select the **Roles** tab (top).
2023-06-08 15:39:17 -07:00
1. Review the large number of built-in roles that are available.
2023-06-07 06:39:48 -07:00
2023-06-08 15:39:17 -07:00
1. Double-click a role, and then select **Permissions** (top).
2023-06-07 06:39:48 -07:00
2023-06-08 15:39:17 -07:00
1. Continue drilling into the role until you can view the **Read, Write, and Delete** actions for that role.
2023-06-07 06:39:48 -07:00
2023-06-08 15:39:17 -07:00
1. Return to the **Access Control (IAM)** blade.
2023-06-07 06:39:48 -07:00
**Add a role assignment**
2023-06-13 05:57:05 -07:00
1. Create a user or select an existing user.
2023-06-07 06:39:48 -07:00
2023-10-19 06:31:13 -07:00
1. Select **Add role assignment** and select a role. For example, *owner* .
2023-06-07 06:39:48 -07:00
2023-06-08 15:39:17 -07:00
1. Select **Check access** .
2023-06-07 06:39:48 -07:00
2023-06-13 05:57:05 -07:00
1. Review the user permissions.
2023-06-07 06:39:48 -07:00
2023-06-13 05:57:05 -07:00
1. Note that you can **Deny assignments** .