4.1 KiB
demo
| demo | ||||
|---|---|---|---|---|
|
02 - Administer Governance and Compliance
Configure Subscriptions
This area does not have a formal demonstration. Consider this Quickstart.
Create an additional Azure subscription
Configure Azure Policy
In this demonstration, we will work with Azure policies.
Tutorial: Build policies to enforce compliance - Azure Policy
Assign a policy
-
Access the Azure portal.
-
Search for and select Policy.
-
Select Assignments on the left side of the Azure Policy page.
-
Select Assign Policy from the top of the Policy - Assignments page.
-
Notice the Scope which determines what resources or grouping of resources the policy assignment is enforced on.
-
Select the Policy definition ellipsis to open the list of available definitions. Take some time to review the built-in policy definitions.
-
Search for and select Allowed locations. This policy enables you to restrict the locations your organization can specify when deploying resources.
-
Move the Parameters tab and using the drop-down select one or more allowed locations.
-
Click Review + create and then Create to create the policy.
Create and assign an initiative definition
-
Return to the Azure Policy page and select Definitions under Authoring.
-
Select Initiative Definition at the top of the page.
-
Provide a Name and Description.
-
Create new Category.
-
From the right panel Add the Allowed locations policy.
-
Add one additional policy of your choosing.
-
Save your changes and then Assign your initiative definition to your subscription.
Check for compliance
-
Return to the Azure Policy service page.
-
Select Compliance.
-
Review the status of your policy and your definition.
Check for remediation tasks
-
Return to the Azure Policy service page.
-
Select Remediation.
-
Review any remediation tasks that are listed.
Remove your policy and initiative (optional)
-
Return to the Azure Policy service page.
-
Select Assignments.
-
Select your Allowed locations policy.
-
Click Delete assignment.
-
Return to the Azure Policy service page.
-
Select Initiatives.
-
Select your new initiative.
-
Click Delete initiative.
Configure Role-Based Access Control
In this demonstration, we will learn about role assignments.
Tutorial: Grant a user access to Azure resources using the Azure portal - Azure RBAC
Quickstart - Check access for a user to Azure resources - Azure RBAC
Locate Access Control blade
-
Access the Azure portal and select a resource group. Make a note of what resource group you use.
-
Select the Access Control (IAM) blade.
-
This blade will be available for many different resources so you can control permissions.
Review role permissions
-
Select the Roles tab (top).
-
Review the large number of built-in roles that are available.
-
Double-click a role, and then select Permissions (top).
-
Continue drilling into the role until you can view the Read, Write, and Delete actions for that role.
-
Return to the Access Control (IAM) blade.
Add a role assignment
-
Create a user.
-
Select Add role assignment.
-
Role: Owner
-
Select: Managers
-
Save your changes.
-
-
Select Check access.
-
Select the user.
-
Notice the user is part of the Managers group and is an Owner.
-
Notice that you can Deny assignments.