Skip to content

Azure Access Analyzer analyzes your activity logs to identify actions that have been used by a security principal (user or role) within your specified date range.

License

Notifications You must be signed in to change notification settings

spectrum048k/AzureAccessAnalyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Azure Access Analyzer

This is an IAM Access Analyzer for Azure. It will return all the actions / permissions used by a given user or service principal between two dates at either subscription or resource group scope.

Installation

This project requires pipenv

Running locally

App uses the Azure Python SDK DefaultCredentialClass.

If using a service principal the environment variables used are:

export AZURE_TENANT_ID="<TENANT_ID>"
export AZURE_CLIENT_ID="<CLIENT_ID>"
export AZURE_CLIENT_SECRET="<CLIENT_SECRET>"
pipenv run python main.py <subscription> <username> <num_hours> <resource_group_name>

Configuration

Setting log level

App is using Loguru so all settings are configurable via environment variables.

For example to configure the log level:

export LOGURU_LEVEL="INFO"
export LOGURU_LEVEL="DEBUG"

Running Tests

pipenv run pytest -v

Roadmap

  • handle paging
  • compare to existing roles
  • add management group support

See Also

Similar projects and services are:

Permissions.cloud, supports AWS, Azure and Google.

IAM Access Analyzer

Trailscraper

About

Azure Access Analyzer analyzes your activity logs to identify actions that have been used by a security principal (user or role) within your specified date range.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published