Skip to content

Commit 00344b4

Browse files
Merge pull request #230367 from AlizaBernstein/WI-67358-release-notes-update-reg-compliance-pack
WI-67358-update some reg compliance standards now avail in gov clouds
2 parents 243a739 + b768d6f commit 00344b4

File tree

3 files changed

+49
-14
lines changed

3 files changed

+49
-14
lines changed

articles/defender-for-cloud/release-notes.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud
44
ms.topic: overview
5-
ms.date: 02/20/2023
5+
ms.date: 03/20/2023
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -19,9 +19,26 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
1919
## March 2023
2020

2121
Updates in March include:
22+
23+
- [Some regulatory compliance standards are now available in government clouds](#some-regulatory-compliance-standards-are-now-available-in-government-clouds)
2224
- [New preview recommendation for Azure SQL Servers](#new-preview-recommendation-for-azure-sql-servers)
2325
- [New alert in Defender for Key Vault](#new-alert-in-defender-for-key-vault)
2426

27+
### Some regulatory compliance standards are now available in government clouds
28+
29+
We are announcing that the following regulatory standards are being updated with latest version and are available for customers in Azure Government and Azure China 21Vianet.
30+
31+
**Azure Government**:
32+
- [PCI DSS v4](/azure/compliance/offerings/offering-pci-dss)
33+
- [SOC 2 Type 2](/azure/compliance/offerings/offering-soc-2)
34+
- [ISO 27001:2013](/azure/compliance/offerings/offering-iso-27001)
35+
36+
**Azure China 21Vianet**:
37+
- [SOC 2 Type 2](/azure/compliance/offerings/offering-soc-2)
38+
- [ISO 27001:2013](/azure/compliance/offerings/offering-iso-27001)
39+
40+
Learn how to [Customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
41+
2542
### New preview recommendation for Azure SQL Servers
2643

2744
We have added a new recommendation for Azure SQL Servers, `Azure SQL Server authentication mode should be Azure Active Directory Only (Preview)`.

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 22 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important changes coming to Microsoft Defender for Cloud
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
44
ms.topic: overview
5-
ms.date: 03/05/2023
5+
ms.date: 03/20/2023
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -19,11 +19,12 @@ If you're looking for the latest release notes, you'll find them in the [What's
1919
| Planned change | Estimated date for change |
2020
|--|--|
2121
| [Changes in the recommendation "Machines should be configured securely"](#changes-in-the-recommendation-machines-should-be-configured-securely) | March 2023 |
22-
| [Three alerts in the Defender for Resource Manager plan will be deprecated](#three-alerts-in-the-defender-for-resource-manager-plan-will-be-deprecated) | March 2023 |
22+
| [Three alerts in the Defender for Azure Resource Manager plan will be deprecated](#three-alerts-in-the-defender-for-resource-manager-plan-will-be-deprecated) | March 2023 |
2323
| [Alerts automatic export to Log Analytics workspace will be deprecated](#alerts-automatic-export-to-log-analytics-workspace-will-be-deprecated) | March 2023 |
2424
| [Deprecation and improvement of selected alerts for Windows and Linux Servers](#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers) | April 2023 |
2525
| [Deprecation of App Service language monitoring policies](#deprecation-of-app-service-language-monitoring-policies) | April 2023 |
26-
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | May 2023 |
26+
| [Deprecation of legacy compliance standards across cloud environments](#deprecation-of-legacy-compliance-standards-across-cloud-environments) | April 2023 |
27+
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | April 2023 |
2728

2829
### Changes in the recommendation "Machines should be configured securely"
2930

@@ -92,6 +93,15 @@ Customers can use alternative built-in policies to monitor any specified languag
9293

9394
These will no longer be in Defender for Cloud's built-in recommendations. You can add them as custom recommendations to have Defender for Cloud monitor them.
9495

96+
### Deprecation of legacy compliance standards across cloud environments
97+
98+
**Estimated date for change: April 2023**
99+
100+
We are announcing the full deprecation of support of [`PCI DSS`](/azure/compliance/offerings/offering-pci-dss) standard/initiative in Azure China 21Vianet.
101+
102+
Legacy PCI DSS v3.2.1 and legacy SOC TSP are set to be fully deprecated and replaced by [SOC 2 Type 2](/azure/compliance/offerings/offering-soc-2) initiative and [PCI DSS v4](/azure/compliance/offerings/offering-pci-dss) initiative.
103+
Learn how to [Customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
104+
95105
### Multiple changes to identity recommendations
96106

97107
**Estimated date for change: May 2023**
@@ -134,6 +144,15 @@ We recommend updating custom scripts, workflows, and governance rules to corresp
134144

135145
We've improved the coverage of the V2 identity recommendations by scanning all Azure resources (rather than just subscriptions) which allows security administrators to view role assignments per account. These changes may result in changes to your Secure Score throughout the GA process.
136146

147+
### Deprecation of legacy compliance standards across cloud environments
148+
149+
**Estimated date for change: April 2023**
150+
151+
We are announcing the full deprecation of support of [`PCI DSS`](/azure/compliance/offerings/offering-pci-dss) standard/initiative in Azure China 21Vianet.
152+
153+
Legacy PCI DSS v3.2.1 and legacy SOC TSP are set to be fully deprecated and replaced by [SOC 2 Type 2](/azure/compliance/offerings/offering-soc-2) initiative and [`PCI DSS v4`](/azure/compliance/offerings/offering-pci-dss) initiative.
154+
Learn how to [Customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
155+
137156
## Next steps
138157

139158
For all recent changes to Defender for Cloud, see [What's new in Microsoft Defender for Cloud?](release-notes.md).

articles/defender-for-cloud/update-regulatory-compliance-packages.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: The regulatory compliance dashboard in Microsoft Defender for Cloud
33
description: Learn how to add and remove regulatory standards from the regulatory compliance dashboard in Defender for Cloud
44
ms.topic: how-to
5-
ms.date: 02/07/2023
5+
ms.date: 03/20/2023
66
ms.custom: ignite-2022
77
---
88

@@ -21,17 +21,18 @@ To see compliance data mapped as assessments in your dashboard, add a compliance
2121

2222
When you've assigned a standard or benchmark to your selected scope, the standard appears in your regulatory compliance dashboard with all associated compliance data mapped as assessments. You can also download summary reports for any of the standards that have been assigned.
2323

24-
Microsoft tracks the regulatory standards themselves and automatically improves its coverage in some of the packages over time. When Microsoft releases new content for the initiative, it will appear automatically in your dashboard as new policies mapped to controls in the standard.
24+
Microsoft tracks the regulatory standards themselves and automatically improves its coverage in some of the packages over time. When Microsoft releases new content for the initiative, it appears automatically in your dashboard as new policies mapped to controls in the standard.
2525

2626
## What regulatory compliance standards are available in Defender for Cloud?
2727

2828
By default, every Azure subscription has the Microsoft cloud security benchmark assigned. This is the Microsoft-authored, cloud specific guidelines for security and compliance best practices based on common compliance frameworks. [Learn more about Microsoft cloud security benchmark](/security/benchmark/azure/introduction).
2929

30-
Available regulatory standards:
30+
**Available regulatory standards**:
3131

32-
- PCI-DSS v3.2.1
32+
- PCI-DSS v3.2.1 **(deprecated)**
3333
- PCI DSS v4
3434
- SOC TSP
35+
- SOC 2 Type 2
3536
- ISO 27001:2013
3637
- Azure CIS 1.1.0
3738
- Azure CIS 1.3.0
@@ -55,7 +56,7 @@ Available regulatory standards:
5556

5657
Users that have one Defender bundle enabled can enable other standards.
5758

58-
Available AWS regulatory standards:
59+
**Available AWS regulatory standards**:
5960

6061
- CIS 1.2.0
6162
- CIS 1.5.0
@@ -73,13 +74,11 @@ To add regulatory compliance standards on AWS accounts:
7374

7475
:::image type="content" source="media/update-regulatory-compliance-packages/Add-aws-regulatory-compliance.png" alt-text="Screenshot of adding regulatory compliance standard to AWS account." lightbox="media/update-regulatory-compliance-packages/Add-aws-regulatory-compliance.png":::
7576

76-
More standards will be added to the dashboard and included in the information on [Customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
77-
78-
**GCP**: When users onboard, every GCP project has the "GCP Default" standard assigned and can be viewed under Recommendations.
77+
**GCP**: When users onboard, every GCP project has the "GCP Default" standard assigned.
7978

8079
Users that have one Defender bundle enabled can enable other standards.
8180

82-
Available GCP regulatory standards:
81+
**Available GCP regulatory standards**:
8382

8483
- CIS 1.1.0, 1.2.0
8584
- PCI DSS 3.2.1
@@ -163,7 +162,7 @@ To remove a standard:
163162

164163
:::image type="content" source="./media/update-regulatory-compliance-packages/remove-standard-confirm.png" alt-text="Screenshot showing to confirm that you really want to remove the regulatory standard you selected." lightbox="media/update-regulatory-compliance-packages/remove-standard-confirm.png":::
165164

166-
1. Select **Yes**. The standard will be removed.
165+
1. Select **Yes**.
167166

168167
## Next steps
169168

0 commit comments

Comments
 (0)