Azure subscription management

This topic describes how to manage Azure subscriptions, management groups, and tenant root groups in CloudFlow.

For details about permissions required, see Permissions required for Azure roles.

You can choose from the following four onboarding methods to add new Azure subscriptions, management groups, and tenant root groups:

  • With script - Uses scripts to onboard Azure resources. Changes to subscriptions, management groups, and tenant root groups after onboarding are automatically synced.

  • No script - Onboard Azure resources without using scripts. Changes to subscriptions, management groups, and tenant root groups after onboarding are automatically synced.

  • API (single account) - Onboard a single subscription. Changes to the subscription after onboarding are not synced.

  • Terraform - Leverage Terraform, the infrastructure-as-code solution, for onboarding your Azure subscriptions into CloudFlow. Changes to subscriptions, management groups, and tenant root groups after onboarding are automatically synced.

Note: Any changes to Azure subscriptions, managed groups, or tenant root groups after onboarding will automatically sync with CloudFlow once every hour.

Access the Onboarding wizard

Do the following:

  1. In the CloudFlow Settings area, click ONBOARDING.

    On the Onboarding Managment page that opens, click +Onboard.

  2. If you are onboarding your first account, click the New Cloud Account button on the welcome page.

  3. Otherwise, click the Microsoft Azure button and click Next.

    The Azure Onboarding wizard appears.

  4. Select your preferred method to onboard using the Select Onboarding Method dropdown.

    *Automatically syncs changes to subscriptions, management groups, and tenant root groups from Azure to CloudFlow after onboarding.
    Onboarding Method Description Automatic sync*
    With script Uses scripts to onboard Azure resources Yes
    No script Onboard Azure resources without using scripts Yes
    API (single account) Onboard a single subscription via API No
    Terraform Onboard Azure resources using Terraform Yes
  5. Onboard Azure resources using your preferred method:

Permissions required for Azure roles

Important: Missing permissions can cause CloudFlow to malfunction and lead to data inconsistencies. AlgoSec is not responsible for any issues arising from missing permissions.

#

Required permission*

 

*Click for link to Microsoft API Docs

  Access level:   READ  

1

Microsoft.Resources/subscriptions/read

2

Microsoft.Network/virtualNetworks/read

3

Microsoft.Network/networkInterfaces/read

4

Microsoft.Network/loadBalancers/read

5

Microsoft.Network/publicIPAddresses/read

6

Microsoft.Network/azurefirewalls/read

7

Microsoft.Network/firewallPolicies/read

8

Microsoft.Network/firewallPolicies/ruleCollectionGroups/read

9

Microsoft.Network/localnetworkgateways/read

10

Microsoft.Network/routeTables/read

11

Microsoft.Network/virtualHubs/read

12

Microsoft.Network/virtualNetworkGateways/read

13

Microsoft.Network/locations/serviceTags/read

14

Microsoft.Web/hostingEnvironments/read

15

Microsoft.Network/connections/read

16

Microsoft.Network/networkSecurityGroups/read

17

Microsoft.Network/applicationSecurityGroups/read

18

Microsoft.Compute/virtualMachines/read

19

Microsoft.Compute/virtualMachineScaleSets/read

20

Microsoft.Compute/virtualMachineScaleSets/virtualMachines/read

21

Microsoft.Compute/virtualMachineScaleSets/networkInterfaces/read

22

Microsoft.Storage/storageAccounts/read

23

Microsoft.Storage/storageAccounts/listKeys/action

24

Microsoft.Network/networkWatchers/read

25

Microsoft.Network/networkWatchers/queryFlowLogStatus/action

26

Microsoft.Network/networkWatchers/flowLogs/read

27

Microsoft.Insights/diagnosticSettings

28

Microsoft.Network/ipGroups/read

29

Microsoft.Network/virtualHubs/effectiveRoutes/action
30
Microsoft.Network/virtualWans/read
31
Microsoft.Network/vpnGateways/read
32
Microsoft.Network/vpnsites/read
33
Microsoft.Network/virtualHubs/hubRouteTables/read
34
Microsoft.Network/virtualHubs/hubVirtualNetworkConnections/read

#

Optional permissions

  Access level:   WRITE  
Note: Access level WRITE is needed if you want to change policy details.

1

Microsoft.Network/azurefirewalls/write

2

Microsoft.Network/networkSecurityGroups/write

Enable Azure flow logs

For each Azure device where flow logs are enabled in your connected subscription, CloudFlow automatically collects flow logs.

The flow logs provide all the details needed to display rule usage data on the risk trigger and network policy pages. On the Network policy pages, CloudFlow users can clean up old or unused NSG / Azure Firewall policy rules, supported by the display of this data. For more details, see Last used and Clean up policies.