Student Name: Daniel Wanjama
Student ID: ADC-CSS02-25012
This lab demonstrates how to implement Role-Based Access Control (RBAC) in Microsoft Azure. RBAC restricts access based on user roles, enforcing the principle of least privilege. Youβll create security groups, assign roles, validate access, and review governance policies β all within a real-world cloud security scenario.
Three security groups were created:
Screenshot:
Page 2 β Creating security groups and assigning members
Assigned the Virtual Machine Contributor role to the Service Desk group.
Steps:
Screenshots:
Page 3 β Assigning role to Service Desk group
Page 4 β Role assignment confirmation
Logged in as a Service Desk member to test access:
Screenshots:
Page 5 β VM dashboard visible to Service Desk user
Page 6 β Starting VM with contributor privileges
Page 7 β Attempt to delete VM blocked due to insufficient permissions
Verified role assignments across all groups:
Screenshot:
Page 8 β Role assignments overview for all groups
Reviewed access governance policies and audit logs:
Screenshots:
Page 9 β Reviewing RBAC policy compliance
Page 10 β Azure Security Center highlighting RBAC configuration
Page 11 β Audit log showing role assignment and access activity
From page 12 onward, the lab dives deeper into:
These sections reinforce the hands-on validation of RBAC principles and demonstrate your ability to manage identity governance in a production-grade Azure environment.
This lab showcased the practical implementation of Role-Based Access Control in Azure. By creating structured security groups and assigning scoped roles, we enforced access boundaries that align with Zero Trust principles. The Service Desk groupβs ability to manage VMs without elevated privileges demonstrated how RBAC supports operational efficiency while minimizing risk.
Through this hands-on exercise, I reinforced my understanding of identity governance, access management, and secure cloud operations β essential skills for any cloud security professional.