Skip to content

Commit 0b8a794

Browse files
authored
Merge pull request #228594 from MicrosoftDocs/main
Publish to live, Sunday 4 PM PST, 2/26
2 parents 7fe39db + fdc0e88 commit 0b8a794

File tree

13 files changed

+369
-102
lines changed

13 files changed

+369
-102
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,8 @@
102102
items:
103103
- name: The Defender for Cloud multicloud solution
104104
href: multicloud.yml
105+
- name: Zero trust infrastructure and integrations
106+
href: zero-trust.md
105107
- name: Planning multicloud security
106108
items:
107109
- name: Get started
Lines changed: 156 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,156 @@
1+
---
2+
title: Zero trust infrastructure and integrations
3+
description: Independent software vendors (ISVs) can integrate their solutions with Microsoft Defender for Cloud to help customers adopt a Zero Trust model and keep their organizations secure.
4+
ms.date: 02/26/2023
5+
ms.topic: conceptual
6+
---
7+
8+
# Zero trust infrastructure and integrations
9+
10+
Infrastructure comprises the hardware, software, micro-services, networking infrastructure, and facilities required to support IT services for an organization. Zero Trust infrastructure solutions assess, monitor, and prevent security threats to these services.
11+
12+
Zero Trust infrastructure solutions support the principles of Zero Trust by ensuring that access to infrastructure resources is verified explicitly, access is granted using principles of least privilege access, and mechanisms are in place that assumes breach and look for and remediate security threats in infrastructure.
13+
14+
This guidance is for software providers and technology partners who want to enhance their infrastructure security solutions by integrating with Microsoft products.
15+
16+
## Zero Trust integration for Infrastructure guide
17+
18+
This integration guide includes strategy and instructions for integrating with [Microsoft Defender for Cloud](defender-for-cloud-introduction.md) and its integrated cloud workload protection platform (CWPP), Microsoft Defender for Cloud.
19+
20+
The guidance includes integrations with the most popular Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), Endpoint Detection and Response (EDR), and IT Service Management (ITSM) solutions.
21+
22+
### Zero Trust and Defender for Cloud
23+
24+
Our [Zero Trust infrastructure deployment guidance](/security/zero-trust/deploy/infrastructure) provides key stages of the Zero Trust strategy for infrastructure. Which are:
25+
26+
1. [Assess compliance with chosen standards and policies](update-regulatory-compliance-packages.md)
27+
1. [Harden configuration](recommendations-reference.md) wherever gaps are found
28+
1. Employ other hardening tools such as [just-in-time (JIT)](just-in-time-access-usage.md) VM access
29+
1. Set up [threat detection and protections](/azure/azure-sql/database/threat-detection-configure?toc=%2Fazure%2Fdefender-for-cloud%2Ftoc.json&view=azuresql)
30+
1. Automatically block and flag risky behavior and take protective actions
31+
32+
There's a clear mapping from the goals we've described in the [infrastructure deployment guidance](/security/zero-trust/deploy/infrastructure) to the core aspects of Defender for Cloud.
33+
34+
|Zero Trust goal | Defender for Cloud feature |
35+
|---------|---------|
36+
|Assess compliance | In Defender for Cloud, every subscription automatically has the [Microsoft cloud security benchmark (MCSB) security initiative assigned](security-policy-concept.md).<br>Using the [secure score tools](secure-score-security-controls.md) and the [regulatory compliance dashboard](update-regulatory-compliance-packages.md) you can get a deep understanding of your customer's security posture. |
37+
| Harden configuration | [Review your security recommendations](review-security-recommendations.md) and [track your secure score improvement overtime](secure-score-access-and-track.md). You can also prioritize which recommendations to remediate based on potential attack paths, by leveraging the [attack path](how-to-manage-attack-path.md) feature. |
38+
|Employ hardening mechanisms | Least privilege access is one of the three principles of Zero Trust. Defender for Cloud can assist you to harden VMs and network using this principle by leveraging features such as:<br>[Just-in-time (JIT) virtual machine (VM) access](just-in-time-access-overview.md)<br>[Adaptive network hardening](adaptive-network-hardening.md)<br>[Adaptive application controls](adaptive-application-controls.md). |
39+
|Set up threat detection | Defender for Cloud offers an integrated cloud workload protection platform (CWPP), Microsoft Defender for Cloud.<br>Microsoft Defender for Cloud provides advanced, intelligent, protection of Azure and hybrid resources and workloads.<br>One of the Microsoft Defender plans, Microsoft Defender for servers, includes a native integration with [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/).<br>Learn more in [Introduction to Microsoft Defender for Cloud](/azure/security-center/azure-defender). |
40+
|Automatically block suspicious behavior | Many of the hardening recommendations in Defender for Cloud offer a *deny* option. This feature lets you prevent the creation of resources that don't satisfy defined hardening criteria. Learn more in [Prevent misconfigurations with Enforce/Deny recommendations](/azure/defender-for-cloud/prevent-misconfigurations). |
41+
|Automatically flag suspicious behavior | Microsoft Defenders for Cloud's security alerts are triggered by advanced detections. Defender for Cloud prioritizes and lists the alerts, along with the information needed for you to quickly investigate the problem. Defender for Cloud also provides detailed steps to help you remediate attacks. For a full list of the available alerts, see [Security alerts - a reference guide](alerts-reference.md).|
42+
43+
### Protect your Azure PaaS services with Defender for Cloud
44+
45+
With Defender for Cloud enabled on your subscription, and Microsoft Defender for Cloud enabled for all available resource types, you'll have a layer of intelligent threat protection - powered by [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) - protecting resources in Azure Key Vault, Azure Storage, Azure DNS, and other Azure PaaS services. For a full list, see [What resource types can Microsoft Defender for Cloud secure?](defender-for-cloud-introduction.md).
46+
47+
### Azure Logic Apps
48+
Use [Azure Logic Apps](/azure/logic-apps/) to build automated scalable workflows, business processes, and enterprise orchestrations to integrate your apps and data across cloud services and on-premises systems.
49+
50+
Defender for Cloud's [workflow automation](workflow-automation.md) feature lets you automate responses to Defender for Cloud triggers.
51+
52+
This is great way to define and respond in an automated, consistent manner when threats are discovered. For example, to notify relevant stakeholders, launch a change management process, and apply specific remediation steps when a threat is detected.
53+
54+
### Integrate Defender for Cloud with your SIEM, SOAR, and ITSM solutions
55+
56+
Microsoft Defender for Cloud can stream your security alerts into the most popular Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions.
57+
58+
There are Azure-native tools for ensuring you can view your alert data in all of the most popular solutions in use today, including:
59+
60+
- Microsoft Sentinel
61+
- Splunk Enterprise and Splunk Cloud
62+
- IBM's QRadar
63+
- ServiceNow
64+
- ArcSight
65+
- Power BI
66+
- Palo Alto Networks
67+
68+
#### Microsoft Sentinel
69+
70+
Defender for Cloud natively integrates with [Microsoft Sentinel](/azure/sentinel/overview), Microsoft's cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.
71+
72+
There are two approaches to ensuring your Defender for Cloud data is represented in Microsoft Sentinel:
73+
74+
- **Sentinel connectors** - Microsoft Sentinel includes built-in connectors for Microsoft Defender for Cloud at the subscription and tenant levels:
75+
76+
- [Stream alerts to Microsoft Sentinel at the subscription level](/azure/sentinel/connect-azure-security-center)
77+
- [Connect all subscriptions in your tenant to Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/azure-security-center-auto-connect-to-sentinel/ba-p/1387539)
78+
79+
> [!TIP]
80+
> Learn more in [Connect security alerts from Microsoft Defender for Cloud](../sentinel/connect-defender-for-cloud.md).
81+
82+
- **Stream your audit logs** - An alternative way to investigate Defender for Cloud alerts in Microsoft Sentinel is to stream your audit logs into Microsoft Sentinel:
83+
84+
- [Connect Windows security events](/azure/sentinel/connect-windows-security-events)
85+
- [Collect data from Linux-based sources using Syslog](/azure/sentinel/connect-syslog)
86+
- [Connect data from Azure Activity log](/azure/sentinel/connect-azure-activity)
87+
88+
#### Stream alerts with Microsoft Graph Security API
89+
90+
Defender for Cloud has out-of-the-box integration with Microsoft Graph Security API. No configuration is required and there are no extra costs.
91+
92+
You can use this API to stream alerts from the **entire tenant** (and data from many other Microsoft Security products) into third-party SIEMs and other popular platforms:
93+
94+
- **Splunk Enterprise and Splunk Cloud** - [Use the Microsoft Graph Security API Add-On for Splunk](https://splunkbase.splunk.com/app/4564/)
95+
- **Power BI** - [Connect to the Microsoft Graph Security API in Power BI Desktop](/power-bi/connect-data/desktop-connect-graph-security)
96+
- **ServiceNow** - [Follow the instructions to install and configure the Microsoft Graph Security API application from the ServiceNow Store](https://docs.servicenow.com/bundle/orlando-security-management/page/product/secops-integration-sir/secops-integration-ms-graph/task/ms-graph-install.html)
97+
- **QRadar** - [IBM's Device Support Module for Microsoft Defender for Cloud via Microsoft Graph API](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/com.ibm.dsm.doc/c_dsm_guide_ms_azure_security_center_overview.html)
98+
- **Palo Alto Networks**, **Anomali**, **Lookout**, **InSpark**, and more - [Microsoft Graph Security API](https://www.microsoft.com/security/business/graph-security-api#office-MultiFeatureCarousel-09jr2ji)
99+
100+
[Learn more about Microsoft Graph Security API](https://www.microsoft.com/security/business/graph-security-api).
101+
102+
#### Stream alerts with Azure Monitor
103+
104+
Use Defender for Cloud's [continuous export](/azure/security-center/continuous-export) feature to connect Defender for Cloud with Azure monitor via Azure Event Hubs and stream alerts into **ArcSight**, **SumoLogic**, Syslog servers, **LogRhythm**, **Logz.io Cloud Observability Platform**, and other monitoring solutions.
105+
106+
Learn more in [Stream alerts with Azure Monitor](/azure/security-center/export-to-siem#stream-alerts-with-azure-monitor).
107+
108+
This can also be done at the Management Group level using Azure Policy, see [Create continuous export automation configurations at scale](continuous-export.md#configure-continuous-export-from-the-defender-for-cloud-pages-in-azure-portal).
109+
110+
> [!TIP]
111+
> To view the event schemas of the exported data types, visit the [Event Hub event schemas](https://aka.ms/ASCAutomationSchemas).
112+
113+
### Integrate Defender for Cloud with an Endpoint Detection and Response (EDR) solution
114+
115+
#### Microsoft Defender for Endpoint
116+
117+
[Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/) is a holistic, cloud-delivered endpoint security solution.
118+
119+
Defender for Cloud's integrated CWPP for machines, [Microsoft Defender for servers](plan-defender-for-servers.md), includes an integrated license for [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/security/endpoint-defender). Together, they provide comprehensive endpoint detection and response (EDR) capabilities. For more information, see [Protect your endpoints](/azure/security-center/security-center-wdatp?tabs=linux).
120+
121+
When Defender for Endpoint detects a threat, it triggers an alert. The alert is shown in Defender for Cloud. From Defender for Cloud, you can also pivot to the Defender for Endpoint console and perform a detailed investigation to uncover the scope of the attack. Learn more about [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint).
122+
123+
#### Other EDR solutions
124+
125+
Defender for Cloud provides hardening recommendations to ensure you're securing your organization's resources according to the guidance of [Azure Security Benchmark](/security/benchmark/azure/introduction). One of the controls in the benchmark relates to endpoint security: [ES-1: Use Endpoint Detection and Response (EDR)](/security/benchmark/azure/security-controls-v2-endpoint-security).
126+
127+
There are two recommendations in Defender for Cloud to ensure you've enabled endpoint protection and it's running well. These recommendations are checking for the presence and operational health of EDR solutions from:
128+
129+
- Trend Micro
130+
- Symantec
131+
- McAfee
132+
- Sophos
133+
134+
Learn more in [Endpoint protection assessment and recommendations in Microsoft Defender for Cloud](endpoint-protection-recommendations-technical.md).
135+
136+
### Apply your Zero Trust strategy to hybrid and multicloud scenarios
137+
138+
With cloud workloads commonly spanning multiple cloud platforms, cloud security services must do the same.
139+
140+
Microsoft Defender for Cloud protects workloads wherever they're running: in Azure, on-premises, Amazon Web Services (AWS), or Google Cloud Platform (GCP).
141+
142+
#### Integrate Defender for Cloud with on-premises machines
143+
144+
To secure hybrid cloud workloads, you can extend Defender for Cloud's protections by connecting on-premises machines to [Azure Arc enabled servers](/azure/azure-arc/servers/overview).
145+
146+
Learn about how to connect machines in [Connect your non-Azure machines to Defender for Cloud](quickstart-onboard-machines.md).
147+
148+
#### Integrate Defender for Cloud with other cloud environments
149+
150+
To view the security posture of **Amazon Web Services** machines in Defender for Cloud, onboard AWS accounts into Defender for Cloud. This integrates AWS Security Hub and Microsoft Defender for Cloud for a unified view of Defender for Cloud recommendations and AWS Security Hub findings and provides a range of benefits as described in [Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md).
151+
152+
To view the security posture of **Google Cloud Platform** machines in Defender for Cloud, onboard GCP accounts into Defender for Cloud. This integrates GCP Security Command and Microsoft Defender for Cloud for a unified view of Defender for Cloud recommendations and GCP Security Command Center findings and provides a range of benefits as described in [Connect your GCP accounts to Microsoft Defender for Cloud](quickstart-onboard-gcp.md).
153+
154+
## Next steps
155+
156+
To learn more about Microsoft Defender for Cloud and Microsoft Defender for Cloud, see the complete [Defender for Cloud documentation](index.yml).

articles/index.yml

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ metadata:
1111
ms.service: azure
1212
ms.custom: ignite-2022
1313
ms.topic: hub-page
14-
author: rolyon
15-
ms.author: rolyon
16-
ms.date: 01/03/2023
14+
author: kcpitt
15+
ms.author: kellypi
16+
ms.date: 02/25/2023
1717
featureFlags:
1818
- clicktale
1919
highlightedContent:
@@ -145,6 +145,7 @@ productDirectory:
145145
imageSrc: ./media/index/communications-gateway.svg
146146
azureCategories:
147147
- networking
148+
- 5g-space
148149
url: communications-gateway/index.yml
149150
# Card
150151
- title: Computer Vision
@@ -1376,6 +1377,7 @@ productDirectory:
13761377
imageSrc: ./media/index/private-5g-core.svg
13771378
azureCategories:
13781379
- networking
1380+
- 5g-space
13791381
url: private-5g-core/index.yml
13801382
# Card
13811383
- title: Load Balancer
@@ -1562,6 +1564,21 @@ productDirectory:
15621564
azureCategories:
15631565
- web
15641566
url: azure-fluid-relay/index.yml
1567+
# Card
1568+
- title: Azure Operator Nexus
1569+
summary: Build your mission-critical mobile networks with a carrier-grade, hybrid cloud platform
1570+
imageSrc: https://static.docs.com/ui/media/product/azure/azure.svg
1571+
azureCategories:
1572+
- 5g-space
1573+
url: operator-nexus/index.yml
1574+
# Card
1575+
- title: Azure Network Function Manager
1576+
summary: Extend Azure management for deploying 5G and SD-WAN network functions on edge devices
1577+
imageSrc: ./media/index/azure-network-function-manager.svg
1578+
azureCategories:
1579+
- networking
1580+
- 5g-space
1581+
url: network-function-manager/index.yml
15651582
tools:
15661583
title: Languages and tools
15671584
items:
145 KB
Loading
8.86 KB
Loading

0 commit comments

Comments
 (0)