AZ_BUILTIN_PRIVILEGED_ROLE

Summary

FSProtect ACL Alias

AZ_BUILTIN_PRIVILEGED_ROLE

Entra ID (Azure AD) Alias

Built-in Directory Role (Privileged)

Affected Object Types

Users, Groups, Service Principals

Exploitation Certainty

Certain

Graph Permission / Role

Built-in Directory Roles with elevated permissions

Description

AZ_BUILTIN_PRIVILEGED_ROLE represents built-in directory roles in Microsoft Entra ID (Azure AD) that grant significant administrative privileges. These roles are predefined by Microsoft and cannot be modified. Compromise of an account with a privileged built-in role can lead to full tenant takeover.

Important: Many of these roles cannot be scoped to Administrative Units and always operate tenant-wide.

Tier classifications:

  • Tier 0 - Highest Privilege Roles (Full Tenant Control)

  • Tier 1 - High Privilege Roles (Significant Access)

  • Tier 2 - Moderate Privilege Roles (Limited but Impactful)

Tier 0 - Highest Privilege Roles (Full Tenant Control):

Role
Risk Description

Global Administrator

Full control over all aspects of the tenant

Privileged Role Administrator

Can assign any role to any principal

Privileged Authentication Administrator

Can reset any user's credentials including admins

Tier 1 - High Privilege Roles (Significant Access):

Role
Risk Description

Application Administrator

Full control over all applications and service principals

Cloud Application Administrator

Manage cloud apps except App Proxy

Authentication Administrator

Can reset non-admin passwords and MFA

Helpdesk Administrator

Can reset non-admin passwords

User Administrator

Full control over non-admin users and groups

Groups Administrator

Full control over groups

Exchange Administrator

Full control over Exchange Online

SharePoint Administrator

Full control over SharePoint Online

Intune Administrator

Full control over Intune/Endpoint Manager

Azure DevOps Administrator

Full control over Azure DevOps

Hybrid Identity Administrator

Can manage Azure AD Connect and federation settings

Tier 2 - Moderate Privilege Roles (Limited but Impactful):

Role
Risk Description

Security Administrator

Manage security settings and read security data

Conditional Access Administrator

Manage Conditional Access policies

Password Administrator

Reset passwords for non-admins

License Administrator

Manage license assignments

Directory Readers

Read all directory objects

Directory Writers

Modify directory objects

Identification

PowerShell

Exploitation

An attacker with a privileged built-in role can perform various attacks depending on the role.

chevron-rightGlobal Administrator - Full Tenant Takeoverhashtag

For detailed exploitation techniques and attack scenarios, see AZ_GLOBAL_ADMIN.

chevron-rightPrivileged Role Administrator - Role Assignment Abusehashtag

For detailed exploitation techniques and attack scenarios, see AZ_PRIVILEGED_ROLE_ADMIN.

chevron-rightPrivileged Authentication Administrator - Credential Resethashtag

For detailed exploitation techniques and attack scenarios, see AZ_PRIVILEGED_AUTH_ADMIN.

chevron-rightApplication Administrator - Application Takeoverhashtag

For detailed exploitation techniques and attack scenarios, see AZ_APP_ADMIN.

chevron-rightCloud Application Administrator - Cloud App Takeoverhashtag

For detailed exploitation techniques and attack scenarios, see AZ_CLOUD_APP_ADMIN.

chevron-rightSecurity Administrator - Security Settings Abusehashtag

For detailed exploitation techniques and attack scenarios, see AZ_SECURITY_ADMIN.

Mitigation

  • Minimize privileged role assignments:

    • Regularly review who has privileged roles.

    • Remove unnecessary assignments.

    • Use least privilege principles.

  • Implement Privileged Identity Management (PIM):

    • Go to Microsoft Entra ID -> Privileged Identity Management.

    • Make privileged role assignments eligible instead of permanent.

    • Require justification and approval for activation.

  • Enforce MFA for privileged roles:

    • Create Conditional Access policies requiring MFA for admin roles.

    • Use phishing-resistant MFA methods (FIDO2, Windows Hello).

  • Use break-glass accounts for Global Admin:

    • Limit permanent Global Administrator assignments.

    • Maintain emergency access accounts with strong controls.

  • Regular access reviews:

    • Go to Identity Governance -> Access Reviews.

    • Review privileged role assignments quarterly.

  • Monitor privileged role assignments:

    • Alert on new privileged role assignments.

    • Alert on changes to existing assignments.

Detection

Detect privileged role abuse in Audit logs.

  • Go to Microsoft Entra ID -> Audit logs.

  • Filter by activities:

    • Add member to role

    • Add eligible member to role

    • Remove member from role

Monitor for:

  • New Global Administrator assignments.

  • Privileged role assignments to service principals.

  • Role assignments outside of change management windows.

  • Unusual admin activity patterns.

  • Password resets by privileged accounts.

References

  • https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference

  • https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-configure

  • https://learn.microsoft.com/en-us/security/privileged-access-workstations/overview

  • https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/best-practices

  • https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48

Last updated

Was this helpful?