You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Release notes for Microsoft Defender for Cloud
3
3
description: A description of what's new and changed in Microsoft Defender for Cloud
4
4
ms.topic: overview
5
-
ms.date: 02/20/2023
5
+
ms.date: 03/20/2023
6
6
---
7
7
8
8
# What's new in Microsoft Defender for Cloud?
@@ -19,9 +19,26 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
19
19
## March 2023
20
20
21
21
Updates in March include:
22
+
23
+
-[Some regulatory compliance standards are now available in government clouds](#some-regulatory-compliance-standards-are-now-available-in-government-clouds)
22
24
-[New preview recommendation for Azure SQL Servers](#new-preview-recommendation-for-azure-sql-servers)
23
25
-[New alert in Defender for Key Vault](#new-alert-in-defender-for-key-vault)
24
26
27
+
### Some regulatory compliance standards are now available in government clouds
28
+
29
+
We are announcing that the following regulatory standards are being updated with latest version and are available for customers in Azure Government and Azure China 21Vianet.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+22-3Lines changed: 22 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Important changes coming to Microsoft Defender for Cloud
3
3
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
4
4
ms.topic: overview
5
-
ms.date: 03/05/2023
5
+
ms.date: 03/20/2023
6
6
---
7
7
8
8
# Important upcoming changes to Microsoft Defender for Cloud
@@ -19,11 +19,12 @@ If you're looking for the latest release notes, you'll find them in the [What's
19
19
| Planned change | Estimated date for change |
20
20
|--|--|
21
21
|[Changes in the recommendation "Machines should be configured securely"](#changes-in-the-recommendation-machines-should-be-configured-securely)| March 2023 |
22
-
|[Three alerts in the Defender for Resource Manager plan will be deprecated](#three-alerts-in-the-defender-for-resource-manager-plan-will-be-deprecated)| March 2023 |
22
+
|[Three alerts in the Defender for Azure Resource Manager plan will be deprecated](#three-alerts-in-the-defender-for-resource-manager-plan-will-be-deprecated)| March 2023 |
23
23
|[Alerts automatic export to Log Analytics workspace will be deprecated](#alerts-automatic-export-to-log-analytics-workspace-will-be-deprecated)| March 2023 |
24
24
|[Deprecation and improvement of selected alerts for Windows and Linux Servers](#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers)| April 2023 |
25
25
|[Deprecation of App Service language monitoring policies](#deprecation-of-app-service-language-monitoring-policies)| April 2023 |
26
-
|[Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations)| May 2023 |
26
+
|[Deprecation of legacy compliance standards across cloud environments](#deprecation-of-legacy-compliance-standards-across-cloud-environments)| April 2023 |
27
+
|[Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations)| April 2023 |
27
28
28
29
### Changes in the recommendation "Machines should be configured securely"
29
30
@@ -92,6 +93,15 @@ Customers can use alternative built-in policies to monitor any specified languag
92
93
93
94
These will no longer be in Defender for Cloud's built-in recommendations. You can add them as custom recommendations to have Defender for Cloud monitor them.
94
95
96
+
### Deprecation of legacy compliance standards across cloud environments
97
+
98
+
**Estimated date for change: April 2023**
99
+
100
+
We are announcing the full deprecation of support of [`PCI DSS`](/azure/compliance/offerings/offering-pci-dss) standard/initiative in Azure China 21Vianet.
101
+
102
+
Legacy PCI DSS v3.2.1 and legacy SOC TSP are set to be fully deprecated and replaced by [SOC 2 Type 2](/azure/compliance/offerings/offering-soc-2) initiative and [PCI DSS v4](/azure/compliance/offerings/offering-pci-dss) initiative.
103
+
Learn how to [Customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
104
+
95
105
### Multiple changes to identity recommendations
96
106
97
107
**Estimated date for change: May 2023**
@@ -134,6 +144,15 @@ We recommend updating custom scripts, workflows, and governance rules to corresp
134
144
135
145
We've improved the coverage of the V2 identity recommendations by scanning all Azure resources (rather than just subscriptions) which allows security administrators to view role assignments per account. These changes may result in changes to your Secure Score throughout the GA process.
136
146
147
+
### Deprecation of legacy compliance standards across cloud environments
148
+
149
+
**Estimated date for change: April 2023**
150
+
151
+
We are announcing the full deprecation of support of [`PCI DSS`](/azure/compliance/offerings/offering-pci-dss) standard/initiative in Azure China 21Vianet.
152
+
153
+
Legacy PCI DSS v3.2.1 and legacy SOC TSP are set to be fully deprecated and replaced by [SOC 2 Type 2](/azure/compliance/offerings/offering-soc-2) initiative and [`PCI DSS v4`](/azure/compliance/offerings/offering-pci-dss) initiative.
154
+
Learn how to [Customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
155
+
137
156
## Next steps
138
157
139
158
For all recent changes to Defender for Cloud, see [What's new in Microsoft Defender for Cloud?](release-notes.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/update-regulatory-compliance-packages.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: The regulatory compliance dashboard in Microsoft Defender for Cloud
3
3
description: Learn how to add and remove regulatory standards from the regulatory compliance dashboard in Defender for Cloud
4
4
ms.topic: how-to
5
-
ms.date: 02/07/2023
5
+
ms.date: 03/20/2023
6
6
ms.custom: ignite-2022
7
7
---
8
8
@@ -21,17 +21,18 @@ To see compliance data mapped as assessments in your dashboard, add a compliance
21
21
22
22
When you've assigned a standard or benchmark to your selected scope, the standard appears in your regulatory compliance dashboard with all associated compliance data mapped as assessments. You can also download summary reports for any of the standards that have been assigned.
23
23
24
-
Microsoft tracks the regulatory standards themselves and automatically improves its coverage in some of the packages over time. When Microsoft releases new content for the initiative, it will appear automatically in your dashboard as new policies mapped to controls in the standard.
24
+
Microsoft tracks the regulatory standards themselves and automatically improves its coverage in some of the packages over time. When Microsoft releases new content for the initiative, it appears automatically in your dashboard as new policies mapped to controls in the standard.
25
25
26
26
## What regulatory compliance standards are available in Defender for Cloud?
27
27
28
28
By default, every Azure subscription has the Microsoft cloud security benchmark assigned. This is the Microsoft-authored, cloud specific guidelines for security and compliance best practices based on common compliance frameworks. [Learn more about Microsoft cloud security benchmark](/security/benchmark/azure/introduction).
29
29
30
-
Available regulatory standards:
30
+
**Available regulatory standards**:
31
31
32
-
- PCI-DSS v3.2.1
32
+
- PCI-DSS v3.2.1**(deprecated)**
33
33
- PCI DSS v4
34
34
- SOC TSP
35
+
- SOC 2 Type 2
35
36
- ISO 27001:2013
36
37
- Azure CIS 1.1.0
37
38
- Azure CIS 1.3.0
@@ -55,7 +56,7 @@ Available regulatory standards:
55
56
56
57
Users that have one Defender bundle enabled can enable other standards.
57
58
58
-
Available AWS regulatory standards:
59
+
**Available AWS regulatory standards**:
59
60
60
61
- CIS 1.2.0
61
62
- CIS 1.5.0
@@ -73,13 +74,11 @@ To add regulatory compliance standards on AWS accounts:
73
74
74
75
:::image type="content" source="media/update-regulatory-compliance-packages/Add-aws-regulatory-compliance.png" alt-text="Screenshot of adding regulatory compliance standard to AWS account." lightbox="media/update-regulatory-compliance-packages/Add-aws-regulatory-compliance.png":::
75
76
76
-
More standards will be added to the dashboard and included in the information on [Customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
77
-
78
-
**GCP**: When users onboard, every GCP project has the "GCP Default" standard assigned and can be viewed under Recommendations.
77
+
**GCP**: When users onboard, every GCP project has the "GCP Default" standard assigned.
79
78
80
79
Users that have one Defender bundle enabled can enable other standards.
81
80
82
-
Available GCP regulatory standards:
81
+
**Available GCP regulatory standards**:
83
82
84
83
- CIS 1.1.0, 1.2.0
85
84
- PCI DSS 3.2.1
@@ -163,7 +162,7 @@ To remove a standard:
163
162
164
163
:::image type="content" source="./media/update-regulatory-compliance-packages/remove-standard-confirm.png" alt-text="Screenshot showing to confirm that you really want to remove the regulatory standard you selected." lightbox="media/update-regulatory-compliance-packages/remove-standard-confirm.png":::
0 commit comments