Blog Post

Azure Governance and Management Blog
3 MIN READ

AMBA-ALZ pattern: Learn about the latest and greatest enhancements!

BrunoGabrielli's avatar
Oct 08, 2025

Hello AMBA-ALZ customers,

after some time since our last Time for new exciting news about AMBA-ALZ pattern! blog post it again time for some exciting news.

We are very thrilled to share that in September 2025 we were able to reach 2 important goals, both of them enhancing both the Azure platform and the ALZ pattern . In summary we've been working on the :

Adoption of Azure Service Health built-in policy

Adopting the new built-in policy, available as of release 2025-10-01, allowed us to  address situations where customers only permit the use of built-in policies with a consequent increase of trust in the AMBA-ALZ pattern. We combined with the Service Health Product team to ensure feature parity between the Azure native policy and the previous custom version available in AMBA-ALZ.

The new built-in policy, called "Configure subscriptions to enable service health alert monitoring rule", has been added to the new "Deploy Azure Monitor Baseline Alerts (AMBA-ALZ) for Service Health and Resource Health" initiative together with the previous Resource Health custom policy

 

Updating to the version that includes the built-in policy is a straightforward process. For new deployments, there's nothing to do since this is going to be the default behavior as of release 2025-10-01. Updating an existing deployment requires some pre-deployment tasks which are clearly documented at Adopt the new built-in Azure Service Health policy

Adoption of the new least privileged "Monitoring Policy Contributor" Azure role

As part of the ongoing security enhancements in AMBA-ALZ and following-up on some customer evidence about System Assigned Managed Identities created by AMBA being flagged as overprovisioned by Microsoft Defender for Cloud, we started a collaboration with the Azure RBAC team to create a new tailored and least privileged role. After some research, we were able to craft a new built-in role that is benefit not only for AMBA-ALZ but also for other bult-in policies (like the new Azure Service Health policy) or customer policies that aims at creating Azure Monitor alerts. This role is basically an enhancement of the existing Monitoring Contributor role with some additional permissions necessary to deploy the policies, run the remediations which includes Azure Monitor alerts and Resource Group creation.

This new role, which is designed to align with security standards, is now assigned by default to the managed identities in place of the previous Contributor role. Thanks to this effort we were able to significantly reduce the security risk surface by cutting down the number of unnecessary permissions from nearly 6,700 to just 6.

Before (with Contributor rights)

 

After (with Monitoring Policy Contributor)
 

Adopting the least privileged role is super easy. For new deployments, there's nothing to do since this is going to be the default behavior as of release 2025-10-01. Updating an existing deployment requires some pre-deployment tasks which are clearly documented at Adopt the new Monitoring Policy Contributor least privileged role.

So, what to do next? Visit the Introduction to deploying the AMBA-ALZ Pattern page to read more about AMBA and to find the deployment methods (Azure Portal UIAzure CLIAzure PowerShellAzure PipelinesGitHub ActionsTerraform) the best aligns with your needs/preferences and start testing out these new features. 

 

Updated Oct 08, 2025
Version 1.0

1 Comment

  • kewalaka's avatar
    kewalaka
    Copper Contributor

    A perennial frustration is deploying solutions to then have resources flagged by defender or the recommended alz baseline as not follow recommended practice.  Its great to see an appropriate role being used for AMBA, hopefully will see more from other product teams in this vein.  Nice work!