02 - Administer Governance and Compliance
Configure Subscriptions
This area does not have a formal demonstration.
Reference: Create an additional Azure subscription
Configure Azure Policy
In this demonstration, we will work with Azure policies.
Reference: Tutorial: Build policies to enforce compliance - Azure Policy
Assign a policy
-
Access the Azure portal.
-
Search for and select Policy.
-
Select Assignments and then Assign Policy.
-
Discuss the Scope which determines what resources or grouping of resources the policy assignment is enforced on.
-
Select the Policy definition ellipsis to open the list of available definitions. Take some time to review the built-in policy definitions.
-
Search for and select the Allowed locations policy. This policy enables you to restrict the locations your organization can specify when deploying resources.
-
Move the Parameters tab and using the drop-down select one or more allowed locations.
-
Click Review + create and then Create to create the policy.
Create and assign an initiative definition
-
Return to the Azure Policy page and select Definitions under Authoring.
-
Select Initiative Definition at the top of the page.
-
Provide a Name and Description.
-
Create new Category.
-
From the right panel Add the Allowed locations policy.
-
Add one additional policy of your choosing.
-
Save your changes and then Assign your initiative definition to your subscription.
Check for compliance
-
Return to the Azure Policy service page.
-
Select Compliance.
-
Review the status of your policy and your definition.
Check for remediation tasks
-
Return to the Azure Policy service page.
-
Select Remediation.
-
Review any remediation tasks that are listed.
-
As you have time, remove the policy and the initiative.
Configure Role-Based Access Control
In this demonstration, we will learn about role assignments.
Reference: Tutorial: Grant a user access to Azure resources using the Azure portal - Azure RBAC
Reference: Quickstart - Check access for a user to Azure resources - Azure RBAC
Locate Access Control blade
-
Access the Azure portal and select a resource group. Make a note of what resource group you use.
-
Select the Access Control (IAM) blade.
-
This blade will be available for many different resources so you can control permissions.
Review role permissions
-
Select the Roles tab (top).
-
Review the large number of built-in roles that are available.
-
Double-click a role, and then select Permissions (top).
-
Continue drilling into the role until you can view the Read, Write, and Delete actions for that role.
-
Return to the Access Control (IAM) blade.
Add a role assignment
-
Create a user or select an existing user.
-
Select Add role assignment and select a role. For example, owner.
-
Select Check access.
-
Review the user permissions.
-
Note that you can Deny assignments.