Organize management groups, subscriptions, and tenant-wide visibility
This article explains how to manage your organization’s security posture at scale by applying security policies to all Azure subscriptions linked to your Azure Active Directory tenant.
To get visibility into the security posture of all subscriptions registered in the Azure AD tenant, an Azure role with sufficient read permissions is required to be assigned on the root management group.
Organize your subscriptions into management groups
Introduction to management groups
Azure management groups provide the ability to efficiently manage access, policies, and reporting on groups of subscriptions, as well as effectively manage the entire Azure estate by performing actions on the root management group. You can organize subscriptions into management groups and apply your governance policies to the management groups. All subscriptions within a management group automatically inherit the policies applied to the management group.
Each Azure AD tenant is given a single top-level management group called the root management group. This root management group is built into the hierarchy to have all management groups and subscriptions fold up to it. This group allows global policies and Azure role assignments to be applied at the directory level.
The root management group is created automatically when you do any of the following actions:
- Open Management Groups in the Azure portal.
- Create a management group with an API call.
- Create a management group with PowerShell. For PowerShell instructions, see Create management groups for resource and organization management.
Management groups aren't required to onboard Security Center, but we recommend that you create at least one so that the root management group gets created. After the group is created, all subscriptions under your Azure AD tenant will be linked to it.
For a detailed overview of management groups, see the Organize your resources with Azure management groups article.
View and create management groups in the Azure portal
From the Azure portal, use the search box in the top bar to find and open Management Groups.
The list of your management groups appears.
To create a management group, select Add management group, enter the relevant details, and select Save.
- The Management Group ID is the directory unique identifier that is used to submit commands on this management group. This identifier isn't editable after creation as it is used throughout the Azure system to identify this group.
- The display name field is the name that is displayed within the Azure portal. A separate display name is an optional field when creating the management group and can be changed at any time.
Add subscriptions to a management group
You can add subscriptions to the management group that you created.
Under Management Groups, select the management group for your subscription.
When the group's page opens, select Details
From the group's details page, select Add subscription, then select your subscriptions and select Save. Repeat until you've added all the subscriptions in the scope.
Management groups can contain both subscriptions and child management groups. When you assign a user an Azure role to the parent management group, the access is inherited by the child management group's subscriptions. Policies set at the parent management group are also inherited by the children.
Grant tenant-wide permissions to yourself
A user with the Azure Active Directory role of Global Administrator might have tenant-wide responsibilities, but lack the Azure permissions to view that organization-wide information in Azure Security Center.
If your organization manages resource access with Azure AD Privileged Identity Management (PIM), or any other PIM tool, the global administrator role must be active for the user making these changes.
To assign yourself tenant-level permissions:
As a Global Administrator user without an assignment on the root management group of the tenant, open Security Center's Overview page and select the tenant-wide visibility link in the banner.
Select the new Azure role to be assigned.
Generally, the Security Admin role is required to apply policies on the root level, while Security Reader will suffice to provide tenant-level visibility. For more information about the permissions granted by these roles, see the Security Admin built-in role description or the Security Reader built-in role description.
For differences between these roles specific to Security Center, see the table in Roles and allowed actions.
The organizational-wide view is achieved by granting roles on the root management group level of the tenant.
Log out of the Azure portal, and then log back in again.
Once you have elevated access, open or refresh Azure Security Center to verify you have visibility into all subscriptions under your Azure AD tenant.
Assign Azure roles to other users
Assign Azure roles to users through the Azure portal:
Sign in to the Azure portal.
To view management groups, select All services under the Azure main menu then select Management Groups.
Select a management group and select details.
Select Access control (IAM) then Role assignments.
Select Add role assignment.
Select the role to assign and the user, then select Save.
Assign Azure roles to users with PowerShell:
Install Azure PowerShell.
Run the following commands:
# Login to Azure as a Global Administrator user Connect-AzAccount
When prompted, sign in with global admin credentials.
Grant reader role permissions by running the following command:
# Add Reader role to the required user on the Root Management Group # Replace "email@example.com” with the user to grant access to New-AzRoleAssignment -SignInName "firstname.lastname@example.org" -RoleDefinitionName "Reader" -Scope "/"
To remove the role, use the following command:
Remove-AzRoleAssignment -SignInName "email@example.com" -RoleDefinitionName "Reader" -Scope "/"
Remove elevated access
Once the Azure roles have been assigned to the users, the tenant administrator should remove itself from the user access administrator role.
In the navigation list, select Azure Active Directory and then select Properties.
Under Access management for Azure resources, set the switch to No.
To save your setting, select Save.
In this article, you learned how to gain tenant-wide visibility for Azure Security Center. For related information, see: