Skip to content

Commit 09799b3

Browse files
authored
Merge pull request #276015 from dcurwin/fix-formatting-may22-2024
Fix formatting
2 parents 855a287 + 7be3b9f commit 09799b3

File tree

3 files changed

+61
-77
lines changed

3 files changed

+61
-77
lines changed

articles/defender-for-cloud/remediate-server-secrets.md

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ Microsoft Defender for Cloud provides secrets scanning for virtual machines (VMs
1212

1313
This article helps you to identify and remediate security risks with VM secrets.
1414

15-
1615
## Prerequisites
1716

1817
- An Azure account. If you don't already have an Azure account, you can [create your Azure free account today](https://azure.microsoft.com/free/).
@@ -25,12 +24,9 @@ This article helps you to identify and remediate security risks with VM secrets.
2524

2625
- [Agentless machine scanning](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines) must be enabled. Learn more about [agentless scanning](concept-agentless-data-collection.md#availability).
2726

28-
29-
3027
## Remediate secrets with attack paths
3128

32-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides a number of attack paths scenarios for VM secrets.
33-
29+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides several attack paths scenarios for VM secrets.
3430

3531
1. Sign in to the [Azure portal](https://portal.azure.com).
3632

@@ -46,7 +42,6 @@ Attack path analysis is a graph-based algorithm that scans your [cloud security
4642

4743
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the Remediate vulnerabilities security control on the Recommendations page. Defender for Cloud provides a [number of VM secrets security recommendations](secrets-scanning-servers.md#security-recommendations).
4844

49-
5045
1. Sign in to the [Azure portal](https://portal.azure.com).
5146

5247
1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**.
@@ -65,21 +60,20 @@ If a secret is found on your resource, that resource triggers an affiliated reco
6560

6661
1. In the Findings section, select a secret to view detailed information about the secret.
6762

68-
:::image type="content" source="media/secret-scanning/select-findings.png" alt-text="Screenshot that shows the detailed information of a secret after you have selected the secret in the findings section." lightbox="media/secret-scanning/select-findings.png":::
63+
:::image type="content" source="media/secret-scanning/select-findings.png" alt-text="Screenshot that shows the detailed information of a secret after you selected the secret in the findings section." lightbox="media/secret-scanning/select-findings.png":::
6964

7065
1. Expand **Remediation steps** and follow the listed steps.
7166

7267
1. Expand **Affected resources** to review the resources affected by this secret.
7368

74-
1. (Optional) You can select an affected resource to see that resource's information.
69+
1. (Optional) You can select an affected resource to see the resource's information.
7570

7671
Secrets that don't have a known attack path are referred to as `secrets without an identified target resource`.
7772

7873
## Remediate secrets with cloud security explorer
7974

8075
The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer) enables you to proactively identify potential security risks within your cloud environment. It does so by querying the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph), which is the context engine of Defender for Cloud. Cloud security explorer provides a [number of query templates](secrets-scanning-servers.md#) for investigating VM secrets issues.
8176

82-
8377
1. Sign in to the [Azure portal](https://portal.azure.com).
8478

8579
1. Navigate to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
@@ -94,8 +88,7 @@ If you don't want to use any of the available templates, you can also [build you
9488

9589
## Remediate secrets in the asset inventory
9690

97-
Your [asset inventory](asset-inventory.md) shows the [security posture](concept-cloud-security-posture-management.md) of the resources you've connected to Defender for Cloud. You can view the secrets discovered on a specific machine.
98-
91+
Your [asset inventory](asset-inventory.md) shows the [security posture](concept-cloud-security-posture-management.md) of the resources you connected to Defender for Cloud. You can view the secrets discovered on a specific machine.
9992

10093
1. Sign in to the [Azure portal](https://portal.azure.com).
10194

@@ -110,4 +103,3 @@ Your [asset inventory](asset-inventory.md) shows the [security posture](concept-
110103
1. Select a secret to view extra details of that secret.
111104

112105
Different types of secrets have different sets of additional information. For example, for plaintext SSH private keys, the information includes related public keys (mapping between the private key to the authorized keys’ file we discovered or mapping to a different virtual machine that contains the same SSH private key identifier).
113-

articles/defender-for-cloud/secrets-scanning.md

Lines changed: 56 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,10 @@ Defender for Cloud provides secrets scanning for virtual machines, and for cloud
2323
- **Cloud deployments**: Agentless secrets scanning across multicloud infrastructure-as-code deployment resources.
2424
- **Azure DevOps**: [Scanning to discover exposed secrets in Azure DevOps](defender-for-devops-introduction.md).
2525

26-
27-
28-
2926
## Deploying secrets scanning
3027

3128
Secrets scanning is provided as a feature in Defender for Cloud plans:
29+
3230
- **VM scanning**: Provided with Defender for Cloud Security Posture Management (CSPM) plan, or with Defender for Servers Plan 2.
3331
- **Cloud deployment resource scanning** Provided with Defender CSPM.
3432
- **DevOps scanning**: Provided with Defender CSPM.
@@ -46,69 +44,64 @@ You can review and investigate the security findings for secrets in a couple of
4644

4745
Defender for Cloud supports discovery of the types of secrets summarized in the table.
4846

49-
50-
**Secrets type** | **VM secrets discovery** | **Cloud deployment secrets discovery** | **Review location**
47+
**Secrets type** | **VM secrets discovery** | **Cloud deployment secrets discovery** | **Review location**
5148
--- | --- | --- | ---
52-
Insecure SSH private keys<br/>Supports RSA algorithm for PuTTy files.<br/>PKCS#8 and PKCS#1 standards<br/>OpenSSH standard |Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
53-
Plaintext Azure SQL connection strings support SQL PAAS.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
54-
Plaintext Azure database for PostgreSQL.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
55-
Plaintext Azure database for MySQL.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
56-
Plaintext Azure database for MariaDB.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
57-
Plaintext Azure Cosmos DB, including PostgreSQL, MySQL and MariaDB.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
58-
Plaintext AWS RDS connection string supports SQL PAAS:<br/>Plaintext Amazon Aurora with Postgres and MySQL flavors.<br/>Plaintext Amazon custom RDS with Oracle and SQL Server flavors.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
59-
Plaintext Azure storage account connection strings|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
60-
Plaintext Azure storage account connection strings.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
61-
Plaintext Azure storage account SAS tokens.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
62-
Plaintext AWS access keys.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
63-
Plaintext AWS S3 presigned URL. |Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
64-
Plaintext Google storage signed URL. |Yes |Yes | Inventory, cloud security explorer.
65-
Plaintext Azure AD Client Secret. |Yes |Yes | Inventory, cloud security explorer.
66-
Plaintext Azure DevOps Personal Access Token. |Yes |Yes | Inventory, cloud security explorer.
67-
Plaintext GitHub Personal Access Token.|Yes |Yes | Inventory, cloud security explorer.
68-
Plaintext Azure App Configuration Access Key. |Yes |Yes | Inventory, cloud security explorer.
69-
Plaintext Azure Cognitive Service Key.|Yes |Yes | Inventory, cloud security explorer.
70-
Plaintext Azure AD User Credentials. |Yes |Yes | Inventory, cloud security explorer.
71-
Plaintext Azure Container Registry Access Key. |Yes |Yes | Inventory, cloud security explorer.
72-
Plaintext Azure App Service Deployment Password. |Yes |Yes | Inventory, cloud security explorer.
73-
Plaintext Azure Databricks Personal Access Token. |Yes |Yes | Inventory, cloud security explorer.
74-
Plaintext Azure SignalR Access Key. |Yes |Yes | Inventory, cloud security explorer.
75-
Plaintext Azure API Management Subscription Key. |Yes |Yes | Inventory, cloud security explorer.
76-
Plaintext Azure Bot Framework Secret Key. |Yes |Yes | Inventory, cloud security explorer.
77-
Plaintext Azure Machine Learning Web Service API Key. |Yes |Yes | Inventory, cloud security explorer.
78-
Plaintext Azure Communication Services Access Key.|Yes |Yes | Inventory, cloud security explorer.
79-
Plaintext Azure Event Grid Access Key. |Yes |Yes | Inventory, cloud security explorer.
80-
Plaintext Amazon Marketplace Web Service (MWS) Access Key. |Yes |Yes | Inventory, cloud security explorer.
81-
Plaintext Azure Maps Subscription Key. |Yes |Yes | Inventory, cloud security explorer.
82-
Plaintext Azure Web PubSub Access Key.|Yes |Yes | Inventory, cloud security explorer.
83-
Plaintext OpenAI API Key. |Yes |Yes | Inventory, cloud security explorer.
84-
Plaintext Azure Batch Shared Access Key. |Yes |Yes | Inventory, cloud security explorer.
85-
Plaintext NPM Author Token. |Yes |Yes | Inventory, cloud security explorer.
86-
Plaintext Azure Subscription Management Certificate. |Yes |Yes | Inventory, cloud security explorer.
87-
Plaintext GCP API Key. |No |Yes | Inventory, cloud security explorer.
88-
Plaintext AWS Redshift credentials.|No |Yes | Inventory, cloud security explorer.
89-
Plaintext Private key.|No |Yes | Inventory, cloud security explorer.
90-
Plaintext ODBC connection string.|No |Yes | Inventory, cloud security explorer.
91-
Plaintext General password.|No |Yes | Inventory, cloud security explorer.
92-
Plaintext User login credentials.|No |Yes | Inventory, cloud security explorer.
93-
Plaintext Travis personal token.|No |Yes | Inventory, cloud security explorer.
94-
Plaintext Slack access token. |No |Yes | Inventory, cloud security explorer.
95-
Plaintext ASP.NET Machine Key.|No |Yes | Inventory, cloud security explorer.
96-
Plaintext HTTP Authorization Header. |No |Yes | Inventory, cloud security explorer.
97-
Plaintext Azure Redis Cache password. |No |Yes | Inventory, cloud security explorer.
98-
Plaintext Azure IoT Shared Access Key. |No |Yes | Inventory, cloud security explorer.
99-
Plaintext Azure DevOps App Secret.|No |Yes | Inventory, cloud security explorer.
100-
Plaintext Azure Function API Key. |No |Yes | Inventory, cloud security explorer.
101-
Plaintext Azure Shared Access Key. |No |Yes | Inventory, cloud security explorer.
102-
Plaintext Azure Logic App Shared Access Signature. |No |Yes | Inventory, cloud security explorer.
103-
Plaintext Azure Active Directory Access Token.|No |Yes | Inventory, cloud security explorer.
104-
Plaintext Azure Service Bus Shared Access Signature.|No |Yes | Inventory, cloud security explorer.
105-
106-
107-
49+
Insecure SSH private keys<br/>Supports RSA algorithm for PuTTy files.<br/>PKCS#8 and PKCS#1 standards<br/>OpenSSH standard |Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
50+
Plaintext Azure SQL connection strings support SQL PAAS.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
51+
Plaintext Azure database for PostgreSQL.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
52+
Plaintext Azure database for MySQL.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
53+
Plaintext Azure database for MariaDB.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
54+
Plaintext Azure Cosmos DB, including PostgreSQL, MySQL and MariaDB.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
55+
Plaintext AWS RDS connection string supports SQL PAAS:<br/>Plaintext Amazon Aurora with Postgres and MySQL flavors.<br/>Plaintext Amazon custom RDS with Oracle and SQL Server flavors.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
56+
Plaintext Azure storage account connection strings|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
57+
Plaintext Azure storage account connection strings.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
58+
Plaintext Azure storage account SAS tokens.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
59+
Plaintext AWS access keys.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
60+
Plaintext AWS S3 presigned URL. |Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
61+
Plaintext Google storage signed URL. |Yes |Yes | Inventory, cloud security explorer.
62+
Plaintext Azure AD Client Secret. |Yes |Yes | Inventory, cloud security explorer.
63+
Plaintext Azure DevOps Personal Access Token. |Yes |Yes | Inventory, cloud security explorer.
64+
Plaintext GitHub Personal Access Token.|Yes |Yes | Inventory, cloud security explorer.
65+
Plaintext Azure App Configuration Access Key. |Yes |Yes | Inventory, cloud security explorer.
66+
Plaintext Azure Cognitive Service Key.|Yes |Yes | Inventory, cloud security explorer.
67+
Plaintext Azure AD User Credentials. |Yes |Yes | Inventory, cloud security explorer.
68+
Plaintext Azure Container Registry Access Key. |Yes |Yes | Inventory, cloud security explorer.
69+
Plaintext Azure App Service Deployment Password. |Yes |Yes | Inventory, cloud security explorer.
70+
Plaintext Azure Databricks Personal Access Token. |Yes |Yes | Inventory, cloud security explorer.
71+
Plaintext Azure SignalR Access Key. |Yes |Yes | Inventory, cloud security explorer.
72+
Plaintext Azure API Management Subscription Key. |Yes |Yes | Inventory, cloud security explorer.
73+
Plaintext Azure Bot Framework Secret Key. |Yes |Yes | Inventory, cloud security explorer.
74+
Plaintext Azure Machine Learning Web Service API Key. |Yes |Yes | Inventory, cloud security explorer.
75+
Plaintext Azure Communication Services Access Key.|Yes |Yes | Inventory, cloud security explorer.
76+
Plaintext Azure Event Grid Access Key. |Yes |Yes | Inventory, cloud security explorer.
77+
Plaintext Amazon Marketplace Web Service (MWS) Access Key. |Yes |Yes | Inventory, cloud security explorer.
78+
Plaintext Azure Maps Subscription Key. |Yes |Yes | Inventory, cloud security explorer.
79+
Plaintext Azure Web PubSub Access Key.|Yes |Yes | Inventory, cloud security explorer.
80+
Plaintext OpenAI API Key. |Yes |Yes | Inventory, cloud security explorer.
81+
Plaintext Azure Batch Shared Access Key. |Yes |Yes | Inventory, cloud security explorer.
82+
Plaintext NPM Author Token. |Yes |Yes | Inventory, cloud security explorer.
83+
Plaintext Azure Subscription Management Certificate. |Yes |Yes | Inventory, cloud security explorer.
84+
Plaintext GCP API Key. |No |Yes | Inventory, cloud security explorer.
85+
Plaintext AWS Redshift credentials.|No |Yes | Inventory, cloud security explorer.
86+
Plaintext Private key.|No |Yes | Inventory, cloud security explorer.
87+
Plaintext ODBC connection string.|No |Yes | Inventory, cloud security explorer.
88+
Plaintext General password.|No |Yes | Inventory, cloud security explorer.
89+
Plaintext User login credentials.|No |Yes | Inventory, cloud security explorer.
90+
Plaintext Travis personal token.|No |Yes | Inventory, cloud security explorer.
91+
Plaintext Slack access token. |No |Yes | Inventory, cloud security explorer.
92+
Plaintext ASP.NET Machine Key.|No |Yes | Inventory, cloud security explorer.
93+
Plaintext HTTP Authorization Header. |No |Yes | Inventory, cloud security explorer.
94+
Plaintext Azure Redis Cache password. |No |Yes | Inventory, cloud security explorer.
95+
Plaintext Azure IoT Shared Access Key. |No |Yes | Inventory, cloud security explorer.
96+
Plaintext Azure DevOps App Secret.|No |Yes | Inventory, cloud security explorer.
97+
Plaintext Azure Function API Key. |No |Yes | Inventory, cloud security explorer.
98+
Plaintext Azure Shared Access Key. |No |Yes | Inventory, cloud security explorer.
99+
Plaintext Azure Logic App Shared Access Signature. |No |Yes | Inventory, cloud security explorer.
100+
Plaintext Azure Active Directory Access Token.|No |Yes | Inventory, cloud security explorer.
101+
Plaintext Azure Service Bus Shared Access Signature.|No |Yes | Inventory, cloud security explorer.
108102

109103
## Related content
104+
110105
- [VM secrets scanning](secrets-scanning-servers.md).
111106
- [Cloud deployment secrets scanning](secrets-scanning-cloud-deployment.md)
112107
- [Azure DevOps scanning](devops-support.md)
113-
114-

articles/defender-for-cloud/security-policy-concept.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,7 @@ Every recommendation in Defender for Cloud has an associated risk level that rep
6969

7070
The MCSB standard is an Azure Policy initiative that includes multiple compliance controls. One of these controls is "Storage accounts should restrict network access using virtual network rules."
7171

72-
As Defender for Cloud continually assesses and finds resources that don't satisfy this control, it marks the resources as noncompliant and triggers a recommendation. In this case, guidance is to harden Azure Storage accounts that aren't protected with virtual network rules.
73-
72+
Defender for Cloud continuously assesses resources. If it finds any that don’t satisfy this control, it marks them as noncompliant and triggers a recommendation. In this case, guidance is to harden Azure Storage accounts that aren't protected with virtual network rules.
7473

7574
## Next steps
7675

0 commit comments

Comments
 (0)