AZ_ADD_OWNER
Summary
FSProtect ACL Alias
AZ_ADD_OWNERS
Azure AD Alias
Add Owners
Affected Object Types
AZ Group
Exploitation Certainty
Certain
Graph Permission / Role
Ability to add group owners via Graph scopes (e.g., Group.ReadWrite.All, Directory.ReadWrite.All) and/or directory roles (e.g., Groups Administrator, User Administrator, Privileged Role Administrator, Global Administrator) or already being a Group Owner
Description
AZ_ADD_OWNERS represents the ability for a principal (user, service principal, or group) to add new owners to a Microsoft Entra (Azure AD) group.
Group owners have full administrative control over that group including the ability to:
Add or remove members and other owners.
Modify group settings and attributes.
If the group is role-assignable (
isAssignableToRole = true), indirectly control directory roles and Azure RBAC permissions associated with it.
Therefore, any identity capable of adding owners to sensitive groups can escalate privileges by granting themselves or a controlled identity full control over privileged or role-assignable groups.
Identification
PowerShell
Azure CLI
Check owners and (if you are owner or hold the right role) add a member:
Azure GUI
Properties: Role-assignable check
In Properties, check whether “Is this group assignable to roles in Entra ID?” is enabled.
If True (role-assignable): only Global Administrator (GA) and Privileged Role Administrator (PRA) (besides Owners) can add owners.
If False: GA, PRA, Groups Administrator (GAd), and User Administrator (UAd) (besides Owners) can add owners.
Exploitation
PowerShell Example
Azure GUI
Open Microsoft Entra admin center → Groups.
Select the target group.
Go to Owners (left menu of the group blade).
Anyone listed as Owner can add other owners.
Click Add owners → search for the target identity → select it → click Select.
Mitigation
Reduce number of owners
Fewer Owners means fewer identities that can add members; this directly reduces lateral-movement and privilege-escalation risk, especially for role-assignable or production-impacting groups.
Go to Microsoft Entra ID → Groups → All groups.
Filter or search to find groups that you want to remove owner(s).
Open a target group.
Open Owners.
Remove any vulnerable/high-risk identities.
Remove unnecessary / vulnerable user assignees from a role
Go to Microsoft Entra ID → Roles & administrators.
In the search box, type the exact role name (e.g., Global Administrator) and click the role.
In the left menu, click Assignments.
Ensure Active assignments is selected.
Find the user you want to remove.
At the right of that row, click … (More options) → Remove assignment.
In the confirmation dialog, click Remove.
Detection
Monitor Audit Logs for owner addition events.
Go to Microsoft Entra ID → Audit logs.
Filter by Category: GroupManagement.
Look for activities such as Add owner to group or equivalent.
If not visible, use Manage view → Edit columns and enable Activity, Initiated by (actor), and Target columns.
References
https://learn.microsoft.com/en-us/cli/azure/ad/group/owner?view=azure-cli-latest#az-ad-group-owner-add
https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-activity-log-schemas
https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities
https://learn.microsoft.com/en-us/powershell/module/az.resources/new-azadgroupowner?view=azps-14.6.0
Last updated
Was this helpful?