- Who: The identity (user, group, or service principal) attempting to access a resource.
- Where: The specific resource or resource group in question.
- What: The action being performed, such as creating a database or deleting a Virtual Machine.
- Predefined roles: Roles like owner, contributor, and reader provide a broad range of permissions.
- Custom roles: Tailor roles to meet specific requirements unique to your organization.
- Flexible scope: Assign roles at the management group, subscription, resource group, or individual resource level.
- Least privilege: Users receive only the access necessary to perform their tasks, reducing overall risk.
- Streamlined management: Simplifies permission handling in complex environments.
- Enhanced compliance: Ensures that access controls conform to industry and organizational standards.


