You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-data-security-posture.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.author: dacurwin
5
5
author: dcurwin
6
6
ms.service: defender-for-cloud
7
7
ms.topic: concept-article
8
-
ms.date: 07/30/2024
8
+
ms.date: 08/04/2024
9
9
#customer intent: As a security professional, I want to understand how Defender for Cloud enhances data security in a multicloud environment so that I can effectively protect sensitive data.
10
10
---
11
11
@@ -75,7 +75,7 @@ Changes in sensitivity settings take effect the next time that resources are dis
75
75
76
76
Sensitive data discovery identifies sensitive resources and their related risk and then helps to prioritize and remediate those risks.
77
77
78
-
Defender for Cloud considers a resource sensitive if a Sensitive Information Type (SIT) is detected in it and the customer has configured the SIT to be considered sensitive. Defender for Cloud detects SITs that are considered sensitive by default.
78
+
Defender for Cloud considers a resource sensitive if a Sensitive Information Type (SIT) is detected in it and you have configured the SIT to be considered sensitive. Check out [the list of SITs that are considered sensitive by default](sensitive-info-types.md).
79
79
80
80
The sensitive data discovery process operates by taking samples of the resource’s data. The sample data is then used to identify sensitive resources with high confidence without performing a full scan of all assets in the resource.
0 commit comments