Hi Russ,
thanks for posting this question,
first off, microsoft's official docs say u need contributor or owner role to assign recommendation owners in defender for cloud. that's... way too broad, right? like giving someone keys to the whole castle when they just need to water the plants )
u need to create a custom role with just these two actions: 'microsoft.security/assessments/write' 'microsoft.security/assessments/metadata/write'
this lets someone assign owners and set dates without touching anything else. u can scope it to specific resource groups too! check the exact details here https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftsecurity
always start with the least privilege. test with a test user before rolling it out to everyone. aha, and dont forget - azure's role assignments can take a few mins to propagate, so dont panic if it doesnt work instantly ))
if u manage multiple subscriptions, consider using azure policy to standardize these permissions. its cleaner than doing it manually each time.
the 'security admin' built-in role might already have these permissions. if u dont mind the extra access it gives, thats a quick fix! docs here https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#security-admin
let me know if this works for u
Best regards,
Alex
and "yes" if you would follow me at Q&A - personaly thx.
P.S. If my answer help to you, please Accept my answer