Security best practices in Azure Automation
Important
Azure Automation Run as accounts, including Classic Run as accounts have retired on 30 September 2023 and replaced with Managed Identities. You would no longer be able to create or renew Run as accounts through the Azure portal. For more information, see migrating from an existing Run As accounts to managed identity.
This article details the best practices to securely execute the automation jobs. Azure Automation provides you the platform to orchestrate frequent, time consuming, error-prone infrastructure management and operational tasks, as well as mission-critical operations. This service allows you to execute scripts, known as automation runbooks seamlessly across cloud and hybrid environments.
The platform components of Azure Automation Service are actively secured and hardened. The service goes through robust security and compliance checks. Azure security benchmark details the best practices and recommendations to help improve the security of workloads, data, and services on Azure. Also see Azure security baseline for Azure Automation.
Secure configuration of Automation account
This section guides you in configuring your Automation account securely.
Permissions
Follow the principle of least privilege to get the work done when granting access to Automation resources. Implement Automation granular RBAC roles and avoid assigning broader roles or scopes such as subscription level. When creating the custom roles, only include the permissions users need. By limiting roles and scopes, you limit the resources that are at risk if the security principal is ever compromised. For detailed information on role-based access control concepts, see Azure role-based access control best practices.
Avoid roles that include Actions having a wildcard (*) as it implies full access to the Automation resource or a sub-resource, for example automationaccounts/*/read. Instead, use specific actions only for the required permission.
Configure Role based access at a runbook level if the user doesn't require access to all the runbooks in the Automation account.
Limit the number of highly privileged roles such as Automation Contributor to reduce the potential for breach by a compromised owner.
Use Microsoft Entra Privileged Identity Management to protect the privileged accounts from malicious cyber-attacks to increase your visibility into their use through reports and alerts.
Securing Hybrid Runbook worker role
Install Hybrid workers using the Hybrid Runbook Worker VM extension, that doesn't have any dependency on the Log Analytics agent. We recommend this platform as it leverages Microsoft Entra ID based authentication. Hybrid Runbook Worker feature of Azure Automation allows you to execute runbooks directly on the machine hosting the role in Azure or non-Azure machine to execute Automation jobs in the local environment.
- Use only high privilege users or Hybrid worker custom roles for users responsible for managing operations such as registering or unregistering Hybrid workers and hybrid groups and executing runbooks against Hybrid runbook worker groups.
- The same user would also require VM contributor access on the machine hosting Hybrid worker role. Since the VM contributor is a high privilege role, ensure only a limited right set of users have access to manage Hybrid works, thereby reducing the potential for breach by a compromised owner.
Follow the Azure RBAC best practices.
Follow the principle of least privilege and grant only the required permissions to users for runbook execution against a Hybrid worker. Don't provide unrestricted permissions to the machine hosting the hybrid runbook worker role. In case of unrestricted access, a user with VM Contributor rights or having permissions to run commands against the hybrid worker machine can use the Automation Account Run As certificate from the hybrid worker machine and could potentially allow a malicious user access as a subscription contributor. This could jeopardize the security of your Azure environment. Use Hybrid worker custom roles for users responsible to manage Automation runbooks against Hybrid runbook workers and Hybrid runbook worker groups.
Unregister any unused or non-responsive hybrid workers.
We strongly recommend that you never configure Hybrid Worker extension on a Virtual machine hosting domain controller. Security best practices don't advise such a setup due to the high-risk nature of exposing domain controllers to potential attack vectors via Azure Automation jobs. Domain controllers should be highly secured and isolated from non-essential services to prevent unauthorized access and maintain the integrity of the Active Directory Domain Services (ADDS) environment.
Authentication certificate and identities
For runbook authentication, we recommend that you use Managed identities instead of Run As accounts. The Run As accounts are an administrative overhead and we plan to deprecate them. A managed identity from Microsoft Entra ID allows your runbook to easily access other Microsoft Entra protected resources such as Azure Key Vault. The identity is managed by the Azure platform and does not require you to provision or rotate any secrets. For more information about managed identities in Azure Automation, see Managed identities for Azure Automation
You can authenticate an Automation account using two types of managed identities:
- System-assigned identity is tied to your application and is deleted if your app is deleted. An app can only have one system-assigned identity.
- User-assigned identity is a standalone Azure resource that can be assigned to your app. An app can have multiple user-assigned identities.
Follow the Managed identity best practice recommendations for more details.
Rotate the Azure Automation keys periodically. The key regeneration prevents future DSC or hybrid worker node registrations from using previous keys. We recommend to use the Extension based hybrid workers that use Microsoft Entra authentication instead of Automation keys. Microsoft Entra ID centralizes the control and management of identities and resource credentials.
Data security
Secure the assets in Azure Automation including credentials, certificates, connections and encrypted variables. These assets are protected in Azure Automation using multiple levels of encryption. By default, data is encrypted with Azure-managed keys. For additional control over encryption keys, you can supply customer-managed keys to use for encryption of Automation assets. These keys must be present in Azure Key Vault for Automation service to be able to access the keys. See Encryption of secure assets using customer-managed keys.
Don't print any credentials or certificate details in the job output. An Automation job operator who is the low privilege user can view the sensitive information.
Maintain a valid backup of Automation configuration like runbooks and assets ensuring backups are validated and protected to maintain business continuity after an unexpected event.
Policies for Azure Automation
Review the Azure Policy recommendations for Azure Automation and act as appropriate. See Azure Automation policies.
Next steps
- To learn how to use Azure role-based access control (Azure RBAC), see Manage role permissions and security in Azure Automation.
- For information on how Azure protects your privacy and secures your data, see Azure Automation data security.
- To learn about configuring the Automation account to use encryption, see Encryption of secure assets in Azure Automation.