Before Lab 1.2 — Management Plane and Data Plane
Before Lab 1.2 — Management Plane and Data Plane
In Lab 1.1, you discovered that the backend managed identity has broad access.
In Lab 1.2, you will test the impact of that access.
Before doing that, we need one important cloud security distinction:
management plane
versus
data planeManagement plane
The management plane is about managing the Azure resource itself.
Examples:
- create a resource
- delete a resource
- change configuration
- restart an App Service
- update tags
- change deployment settings
- configure diagnostics
These actions manage the infrastructure.
Data plane
The data plane is about accessing the data inside a resource.
Examples:
- read a Key Vault secret value
- download a blob from a Storage Account
- query database rows
- read queue messages
These actions access the content handled by the service.
Visual model
Why this matters
An identity can have broad management-plane access and still not have the correct data-plane access.
For example:
Contributor on the resource groupcan allow broad management actions on resources in that resource group.
But that does not automatically mean:
read Key Vault secret valueReading a Key Vault secret requires a suitable Key Vault data-plane permission.
For example:
Key Vault Secrets UserWhat to test in Lab 1.2
In the lab, you will test two things.
| Test | What it proves |
|---|---|
| Can the backend modify an Azure resource? | The identity has management-plane access |
| Can the backend read the Key Vault secret? | The identity has or lacks data-plane access |
Key idea
Broad access is not the same as correct access.
Screenshot placeholders for Lab 1.2
During the lab or recap, screenshots can help show the difference between both tests.
Screenshot suggestion
Add a screenshot of the endpoint that demonstrates management-plane access.
Suggested screenshot:
Browser or API client → POST /api/impact-demo/tag-selfShow that the request succeeds.
Also add a screenshot of the Azure Portal showing that the tag was added to the App Service.
Screenshot suggestion
Add a screenshot of the Key Vault secret endpoint failure.
Suggested screenshot:
Browser or API client → GET /api/secret-demoShow the error message or 403-style response.
Avoid showing real secret values in screenshots.