AZ-500 Exam QuestionsBrowse all questions from this exam

AZ-500 Exam - Question 22


You have been tasked with delegate administrative access to your company's Azure key vault.

You have to make sure that a specific user can set advanced access policies for the key vault. You also have to make sure that access is assigned based on the principle of least privilege.

Which of the following options should you use to achieve your goal?

Show Answer
Correct Answer:

To set advanced access policies for the Azure Key Vault and ensure that access is based on the principle of least privilege, you should use Azure Role-Based Access Control (RBAC). RBAC allows you to grant specific permissions to users, groups, or service principals based on their roles. By assigning appropriate RBAC roles, such as 'Key Vault Contributor' or 'Key Vault Administrator,' you can ensure the user has the necessary permissions to manage the Key Vault without granting excessive privileges. This provides a granular level of access control necessary for adhering to the principle of least privilege.

Discussion

17 comments
Sign in to comment
wallythebosOption: A
Sep 30, 2021

For those that won't see it B is right in front of the option A.

cfsxtuv33
Dec 4, 2021

Ahh, thats funny, I kept seeing contributors saying B sits in front of A. i was like what the heck are they talking about!? Then I saw it....sitting in the same row as "A." So yeah, option "B" RBAC is correct.

somenick
Sep 20, 2022

Admins please fix formatting so the option B is on the new line

Irishtk
Apr 28, 2022

Ans is B (RBAC) "Authorization in Key Vault uses a combination of Azure role-based access control (Azure RBAC) and Azure Key Vault access policies" https://docs.microsoft.com/en-us/azure/key-vault/general/security-features

Andre369
May 18, 2023

B. RBAC (Role-Based Access Control) RBAC allows you to grant specific permissions to users, groups, or service principals based on their roles. By assigning the appropriate RBAC role to the specific user, you can grant them the necessary permissions to set advanced access policies for the Key Vault, while ensuring that they only have the minimum privileges required for their tasks. RBAC provides a granular level of control over access to Azure resources, allowing you to assign roles such as "Key Vault Contributor" or "Key Vault Administrator" to the user, depending on the level of access needed. This ensures that the user has the necessary permissions to manage the Key Vault without granting excessive privileges.

rohitmedi
Nov 28, 2021

B is correct answer

Mazhar1993
Apr 21, 2024

The correct answer is RBAC. RBAC allows you to assign specific roles like Key Vault Contributor, which grants the user the ability to set advanced access policies, ensuring access based on the principle of least privilege. Azure Information Protection focuses on data classification, labeling, and protection, not managing access to Azure Key Vault. While Azure AD Privileged Identity Management offers time-based and approval-based role activation, it doesn't directly manage access to Azure Key Vault or allow setting advanced access policies for it. Azure DevOps is primarily a set of services for software development, not for managing access to Azure Key Vault. https://learn.microsoft.com/en-us/azure/key-vault/general/security-features

in_da_cloud
Mar 31, 2022

The answer is B: The management plane uses RBAC - this is where you manage Key Vault itself which implies creating and deleting key vaults, retrieving Key Vault properties, and updating access policies. https://docs.microsoft.com/en-us/azure/key-vault/general/security-features#access-model-overview

TheLegendPasha
Apr 8, 2022

The answer is B but for some reason is BUGGED.

majstor86
Mar 2, 2023

B. RBAC

zellck
May 7, 2023

B is the answer. https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-migration Azure role-based access control (Azure RBAC) is an authorization system built on Azure Resource Manager that provides fine-grained access management of Azure resources. With Azure RBAC you control access to resources by creating role assignments, which consist of three elements: a security principal, a role definition (predefined set of permissions), and a scope (group of resources or individual resource).

becmade
Jan 12, 2022

B - RBAC

Eltooth
Mar 15, 2022

B is correct answer.

AZ5cert
Dec 12, 2022

B: RBAC

brutananadilewski0000
Feb 13, 2023

Just to notify you that the answer B is RBAC

Dinya_jui
Mar 7, 2023

correct answer B

FedericoBellotti
May 13, 2023

the b is not visible

xRiot007
Jul 15, 2024

You can't use PIM (C) for this scenario so go for RBAC (B). In a real life scenario, the user would have a ticket on a backlog that he is required to complete after setting up. Then you de-assign the role from his identity, to respect the least privilege principle, unless the user is explicitly required permanent access from then onwards.