AZ-104-MicrosoftAzureAdmini.../Instructions/Demos/02 - Administer Governance and Compliance.md

113 lines
3.7 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
demo:
title: 'Demonstration 02: Administer Governance and Compliance'
module: 'Administer Governance and Compliance'
---
# 02 - Administer Governance and Compliance
## Configure Subscriptions
This area does not have a formal demonstration.
**Reference**: [Create an additional Azure subscription](https://docs.microsoft.com/azure/cost-management-billing/manage/create-subscription)
## Configure Azure Policy
In this demonstration, we will work with Azure policies.
**Reference**: [Tutorial: Build policies to enforce compliance - Azure Policy](https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage)
**Assign a policy**
1. Access the Azure portal.
2. Search for and select **Policy**.
3. Select **Assignments** and then **Assign Policy**.
5. Discuss the **Scope** which determines what resources or grouping of resources the policy assignment is enforced on.
6. Select the **Policy definition** ellipsis to open the list of available definitions. Take some time to review the built-in policy definitions.
7. Search for and select the **Allowed locations** policy. This policy enables you to restrict the locations your organization can specify when deploying resources.
8. Move the **Parameters** tab and using the drop-down select one or more allowed locations.
9. Click **Review + create** and then **Create** to create the policy.
**Create and assign an initiative definition**
1. Return to the Azure Policy page and select **Definitions** under Authoring.
2. Select **Initiative Definition** at the top of the page.
3. Provide a **Name** and **Description**.
4. **Create new** Category.
5. From the right panel **Add** the **Allowed locations** policy.
6. Add one additional policy of your choosing.
7. **Save** your changes and then **Assign** your initiative definition to your subscription.
**Check for compliance**
1. Return to the Azure Policy service page.
2. Select **Compliance**.
3. Review the status of your policy and your definition.
**Check for remediation tasks**
1. Return to the Azure Policy service page.
2. Select **Remediation**.
3. Review any remediation tasks that are listed.
4. As you have time, remove the policy and the initiative.
## Configure Role-Based Access Control
In this demonstration, we will learn about role assignments.
**Reference**: [Tutorial: Grant a user access to Azure resources using the Azure portal - Azure RBAC](https://docs.microsoft.com/azure/role-based-access-control/quickstart-assign-role-user-portal)
**Reference**: [Quickstart - Check access for a user to Azure resources - Azure RBAC](https://docs.microsoft.com/azure/role-based-access-control/check-access)
**Locate Access Control blade**
1. Access the Azure portal and select a resource group. Make a note of what resource group you use.
2. Select the **Access Control (IAM)** blade.
3. This blade will be available for many different resources so you can control permissions.
**Review role permissions**
1. Select the **Roles** tab (top).
1. Review the large number of built-in roles that are available.
1. Double-click a role, and then select **Permissions** (top).
1. Continue drilling into the role until you can view the **Read, Write, and Delete** actions for that role.
1. Return to the **Access Control (IAM)** blade.
**Add a role assignment**
1. Create a user or select an existing user.
1. Select **Add role assignment** and select a role. For example, *owner*.
1. Select **Check access**.
1. Review the user permissions.
1. Note that you can **Deny assignments**.