Permissions and Resources

This document outlines the permissions required for installing and operating various Sysdig features on Azure, as well as the resources that will be created in your Azure environment.

Review Azure Roles and Permissions

Security Principals

The onboarding process involves two security principals:

  • Installer: The primary security principal. This security principal will be used to perform the onboarding. Sysdig does not have access to this security principal. The Installer security principal can be either:
    • A User
    • A Service Principal
  • Sysdig: A Service Principal (robot user) created during onboarding with specific, less permissive roles. Sysdig will be given access to this security principal.

Azure Role Types

Azure IAM is separated into two control planes:

Base Azure Integration - CSPM

Connect Azure to Sysdig to enable Cloud Security Posture Management (CSPM). CSPM assesses and manages the security posture of your cloud resources without requiring agents.

Permissions Required to Install

You must assign the Installer security principal at least the following roles:

Role TypeRoleDescription
Entra IDApplication AdministratorThis role is required to create the Sysdig Service Principal in Entra ID.
Entra IDPrivileged Role AdministratorThis role is required to attach Entra ID roles, such as Directory Reader to the Sysdig Service Principal. See Permissions Granted to Sysdig.
Azure RBACUser Access AdministratorThis role is required to attach Azure RBAC roles to the Sysdig Service Principal. To assign this role to a Service Principal Installer, see Assign User Access Administrator. To assign it to a User Installer, see Assign Roles and Permissions.

Permissions Granted to Sysdig

The Sysdig Service Principal will be granted the following roles:

Role TypeRoleDescription
Entra IDDirectory ReadersAllows Sysdig to list Users and Service Principals.
Azure RBACReaderAllows Sysdig to list resources within your Subscriptions.
Azure RBACCustom Role containing: Microsoft.Web/sites/config/list/actionAllows Sysdig to collect the AuthSettings object required by certain CSPM controls.

Resources Created

The following resources will be created in your Azure Environment:

ResourceDescription
azuread_service_principalService principal used by Sysdig for secure posture management
azuread_directory_role_assignmentAssigns the “Directory Reader” role to the Sysdig Service Principal
azurerm_role_assignmentAssigns the “Reader” role to the Sysdig Service Principal. For single subscription installations, this is applied at the Subscription level; for tenant installations, it is applied to the root Management Group.
azurerm_role_definitionCustom role definition containing: Microsoft.Web/sites/config/list/action
azurerm_role_assignmentAssigns the custom role to the Sysdig Service Principal

CDR and CIEM

To enable agentless Cloud Detection and Response (CDR) and Cloud Infrastructure Entitlement Management (CIEM)/Identity Access Management (IAM), set up log ingestion. The permissions required to do this are listed below.

Permissions Required to Install

The Installer must have at least the following roles assigned:

Role TypeRoleDescription
Entra IDApplication AdministratorRequired to create a Service Principal associated with a Sysdig-owned application.
Entra IDSecurity AdministratorRequired to create Entra ID Diagnostic Settings.
Azure RBACOwnerRequired to attach Azure RBAC roles to the created Service Principal, and create Resource Groups, Event Hub resources and Diagnostic Settings.

If you are using Service Principal to run terraform deployment please make sure to assign Contributor role to the Service principal for /providers/Microsoft.aadiam scope.

Permissions Granted to Sysdig

The Sysdig Service Principal will be granted the following roles:

Role TypeRoleDescription
Azure RBACAzure Event Hubs Data ReceiverAllows Sysdig to receive data from Event Hubs.

Resources Created

The following resources will be created in your Azure Environment:

ResourceDescription
azuread_service_principalService principal for Event Hub integration
azurerm_resource_groupResource group to contain the Event Hub and related resources
azurerm_eventhub_namespaceNamespace for the Event Hub
azurerm_eventhubEvent Hub for log ingestion
azurerm_eventhub_consumer_groupConsumer group within the Event Hub
azurerm_eventhub_namespace_authorization_ruleAuthorization rule for the Event Hub namespace
azurerm_role_assignmentAssigns the “Azure Event Hubs Data Receiver” role to the Sysdig service principal for the Event Hub namespace
azurerm_monitor_diagnostic_settingDiagnostic settings for the subscription
azurerm_monitor_aad_diagnostic_settingDiagnostic settings for Entra ID

Vulnerability Management Agentless Host Scanning

Vulnerability Management (VM) Agentless Host Scanning performs vulnerability scanning using disk snapshots and Azure Lighthouse for accurate risk assessment and management.

Permissions Required to Install

The Installer must have at least the following roles assigned:

Role TypeRoleDescription
Entra IDApplication AdministratorRequired to create a Service Principal associated with a Sysdig-owned application.
Entra IDPrivileged Role AdministratorRequired to assign Entra ID roles to the created Service Principal.
Azure RBACOwnerRequired to create Azure Lighthouse Definition and Assignment.

Please make sure Microsoft.ManagedServices resource provider is registered for the specific subscription. Please follow the instructions.

Permissions Granted to Sysdig

The Sysdig Service Principal will be granted the following roles:

Role TypeRoleDescription
Azure RBACVM Scanner OperatorAllows Sysdig access to disk snapshot for security analysis.

Resources Created

The following resources will be created in your Azure Environment:

ResourceDescription
azurerm_lighthouse_definitionDefines the Azure Lighthouse relationship
azurerm_lighthouse_assignmentAssigns the Lighthouse definition to target subscriptions

Assign Roles and Permissions

To apply roles in Azure, check out the Microsoft’s documentation, or use one of the Azure CLI commands given in the sections below.

After you assign a role via the Azure CLI, ensure you Reload Credentials to save your changes.

Assign User Access Administrator

To assign the role User Access Administrator to a Service Principal Installer, use the following command template:

az role assignment create --assignee "<SP_APP_ID>" --role "User Access Administrator" --scope "<ROOT_MANAGEMENT_GROUP_ID>"

Fill in the values SP_APP_ID, and ROOT_MANAGEMENT_GROUP_ID. For example:

az role assignment create --assignee "a686e05a-191d-48ba-a74e-6daf9445ef71" --role "User Access Administrator" --scope "/providers/Microsoft.Management/managementGroups/d1aed736-5b36-41ff-9d78-c8181a3435bb"

For troubleshooting, see Insufficient Permission on Tenant.

Assign Contributor Permission

To assign the role Contributor to a Service Principal Installer, use the following command template:

az role assignment create --assignee "SP_APP_ID" --scope "/providers/Microsoft.aadiam" --role Contributor
  • SP_APP_ID: You can find this either:
    • In the Azure Portal: Azure Active Directory > Enterprise applications > terraform-runner.
    • In the Azure CLI with the command az ad sp list --display-name "terraform-runner" --query "[0].appId" --output tsv.

Reload Credentials

After you update RBAC roles, reload the credentials in the Azure CLI to ensure your changes are reflected.

To update credentials, run the following command in Azure CLI to update credentials:

az account clear && az login

Enable Root Management Group Access

To grant Root Management Group Access (RBAC role assignment on root management group scope) to a security principal:

  1. Go to the Microsoft Azure portal.

  2. Navigate to Entra ID > Manage > Properties.

  3. Under Access management for Azure resources, set the toggle to Yes.

Root Management Group Access is now enabled for the current user.