Skip to content

Commit 1a75aa4

Browse files
committed
Security policies article updates
Updated the article to reflect new capabilities added.
1 parent 8f362ab commit 1a75aa4

File tree

10 files changed

+73
-36
lines changed

10 files changed

+73
-36
lines changed
198 KB
Loading
149 KB
Loading
Binary file not shown.
191 KB
Loading
192 KB
Loading
Binary file not shown.

articles/defender-for-cloud/tutorial-security-policy.md

Lines changed: 73 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22
title: Working with security policies
33
description: Learn how to work with security policies in Microsoft Defender for Cloud.
44
ms.topic: conceptual
5-
ms.custom: ignite-2022
6-
ms.date: 01/24/2023
5+
ms.date: 01/25/2022
76
---
87

98
# Manage security policies
@@ -14,20 +13,20 @@ To understand the relationships between initiatives, policies, and recommendatio
1413

1514
## Who can edit security policies?
1615

17-
Defender for Cloud uses Azure role-based access control (Azure RBAC), which provides built-in roles you can assign to Azure users, groups, and services. When users open Defender for Cloud, they see only information related to the resources they can access. Which means users are assigned the role of *owner*, *contributor*, or *reader* to the resource's subscription. There are also two specific Defenders for Cloud roles:
16+
Defender for Cloud uses Azure role-based access control (Azure RBAC), which provides built-in roles you can assign to Azure users, groups, and services. When users open Defender for Cloud, they see only information related to the resources they can access. Which means users are assigned the role of *owner*, *contributor*, or *reader* to the resource's subscription. There are two specific Defender for Cloud roles that can view and manage security policies:
1817

1918
- **Security reader**: Has rights to view Defender for Cloud items such as recommendations, alerts, policy, and health. Can't make changes.
2019
- **Security admin**: Has the same view rights as *security reader*. Can also update the security policy and dismiss alerts.
2120

22-
You can edit security policies through the Azure Policy portal, via REST API or using Windows PowerShell.
21+
You can edit Azure security policies through Defender for Cloud, Azure Policy, via REST API or using PowerShell.
2322

2423
## Manage your security policies
2524

2625
To view your security policies in Defender for Cloud:
2726

28-
1. From Defender for Cloud's menu, open the **Environment settings** page. Here, you can see the management groups, subscriptions, and the initiatives applied to each.
27+
1. From Defender for Cloud's menu, open the **Environment settings** page. Here, you can see the Azure management groups or subscriptions.
2928

30-
1. Select the relevant subscription or management group whose policies you want to view.
29+
1. Select the relevant subscription or management group whose security policies you want to view.
3130

3231
1. Open the **Security policy** page.
3332

@@ -36,7 +35,7 @@ To view your security policies in Defender for Cloud:
3635
:::image type="content" source="./media/tutorial-security-policy/security-policy-page.png" alt-text="Defender for Cloud's security policy page" lightbox="./media/tutorial-security-policy/security-policy-page.png":::
3736

3837
> [!NOTE]
39-
> If there is a label "MG Inherited" alongside your default initiative, it means that the initiative has been assigned to a management group and inherited by the subscription you're viewing.
38+
> The settings of each recommendation that apply to the scope are taken into consideration and the cumulative outcome of actions taken by the recommendation is shown. For example, if in one assignment, a recommendation is Disabled, but in another it's set to Audit, then the cumulative effect applies Audit. The more active effect always takes precedence.
4039
4140
1. Choose from the available options on this page:
4241

@@ -46,78 +45,116 @@ To view your security policies in Defender for Cloud:
4645

4746
1. To view and edit the default initiative, select it and proceed as described below.
4847

48+
:::image type="content" source="./media/tutorial-security-policy/policy-screen.png" alt-text="Effective policy screen.":::
49+
4950
This **Security policy** screen reflects the action taken by the policies assigned on the subscription or management group you selected.
5051

51-
* Use the links at the top to open a policy **assignment** that applies on the subscription or management group. These links let you access the assignment and edit or disable the policy. For example, if you see that a particular policy assignment is effectively denying endpoint protection, use the link to edit or disable the policy.
52+
* Use the links at the top to open a policy **assignment** that applies on the subscription or management group. These links let you access the assignment and manage recommendations. For example, if you see that a particular recommendation is set to audit effect, use to change it to deny or disable from being evaluated.
5253

53-
* In the list of policies, you can see the effective application of the policy on your subscription or management group. The settings of each policy that apply to the scope are taken into consideration and the cumulative outcome of actions taken by the policy is shown. For example, if in one assignment of the policy is disabled, but in another it's set to AuditIfNotExist, then the cumulative effect applies AuditIfNotExist. The more active effect always takes precedence.
54+
* In the list of recommendations, you can see the effective application of the recommendation on your subscription or management group.
5455

55-
* The policies' effect can be: Append, Audit, AuditIfNotExists, Deny, DeployIfNotExists, Disabled. For more information on how effects are applied, see [Understand Policy effects](../governance/policy/concepts/effects.md).
56+
* The recommendations' effect can be:
57+
58+
**Audit** evaluates the compliance state of resources according to recommendation logic.<br>
59+
**Deny** prevents deployment of non-compliant resources based on recommendation logic.<br>
60+
**Disabled** prevents the recommendation from running.
5661

57-
> [!NOTE]
58-
> When you view assigned policies, you can see multiple assignments and you can see how each assignment is configured on its own.
62+
:::image type="content" source="./media/tutorial-security-policy/default-assignment-screen.png" alt-text="Edit default assignment screen.":::
5963

64+
## Enable a security recommendation
6065

61-
## Disable security policies and disable recommendations
66+
Some recommendations might be disabled by default. For example, in the Azure Security Benchmark initiative, some recommendations are provided for you to enable only if they meet a specific regulatory or compliance requirement for your organization. For example: recommendations to encrypt data at rest with customer-managed keys, such as "Container registries should be encrypted with a customer-managed key (CMK)".
6267

63-
When your security initiative triggers a recommendation that's irrelevant for your environment, you can prevent that recommendation from appearing again. To disable a recommendation, disable the specific policy that generates the recommendation.
68+
To enable a disabled recommendation and ensure it's assessed for your resources:
6469

65-
The recommendation you want to disable will still appear if it's required for a regulatory standard you've applied with Defender for Cloud's regulatory compliance tools. Even if you've disabled a policy in the built-in initiative, a policy in the regulatory standard's initiative will still trigger the recommendation if it's necessary for compliance. You can't disable policies from regulatory standard initiatives.
70+
1. From Defender for Cloud's menu, open the **Environment settings** page.
6671

67-
For more information about recommendations, see [Managing security recommendations](review-security-recommendations.md).
72+
1. Select the subscription or management group for which you want to disable a recommendation.
73+
74+
1. Open the **Security policy** page.
75+
76+
1. From the **Default initiative** section, select the relevant initiative.
6877

78+
1. Search for the recommendation that that you want to disable, either by the search bar or filters.
6979

70-
1. From Defender for Cloud's menu, open the **Environment settings** page. Here, you can see the management groups, subscriptions, and the initiatives applied to each.
80+
1. Select the ellipses menu, select **Manage effect and parameters**.
7181

72-
1. Select the subscription or management group for which you want to disable the recommendation (and policy).
82+
1. From the effect section, select **Audit**.
83+
84+
1. Select **Save**.
85+
86+
:::image type="content" source="./media/tutorial-security-policy/enable-security-recommendation.png" alt-text="Enable security recommendation on manage effect and parameters screen.":::
7387

7488
> [!NOTE]
75-
> Remember that a management group applies its policies to its subscriptions. Therefore, if you disable a subscription's policy, and the subscription belongs to a management group that still uses the same policy, then you will continue to receive the policy recommendations. The policy will still be applied from the management level and the recommendations will still be generated.
89+
> Setting will take effect immediately, but recommendations will update based on their freshness interval (up to 12 hours).
90+
91+
## Manage a security recommendation's settings
92+
93+
It may be necessary to configure additional parameters for some recommendations.
94+
As an example, diagnostic logging recommendations have a default retention period of 1 day. You can change the default value if your organizational security requirements require logs to be kept for more than that, for example: 30 days.
95+
The **additional parameters** column indicates whether a recommendation has associated additional parameters:
96+
97+
**Default** – the recommendation is running with default configuration<br>
98+
**Configured** – the recommendation’s configuration is modified from its default values<br>
99+
**None** – the recommendation does not require any additional configuration
100+
101+
1. From Defender for Cloud's menu, open the **Environment settings** page.
102+
103+
1. Select the subscription or management group for which you want to disable a recommendation.
76104

77105
1. Open the **Security policy** page.
78106

79-
1. From the **Default initiative** or **Your custom initiatives** sections, select the relevant initiative containing the policy you want to disable.
107+
1. From the **Default initiative** section, select the relevant initiative.
108+
109+
1. Search for the recommendation that that you want to configure.
80110

81-
1. Open the **Parameters** section and search for the policy that invokes the recommendation that you want to disable.
111+
> [!TIP]
112+
> To view all available recommendations with additional parameters, using the filters to view the **Additional parameters** column and then default.
82113
83-
1. From the dropdown list, change the value for the corresponding policy to **Disabled**.
114+
1. Select the ellipses menu, select **Manage effect and parameters**.
84115

85-
![disable policy.](./media/tutorial-security-policy/disable-policy.png)
116+
1. From the additional parameters section, configure the available parameters with new values.
86117

87118
1. Select **Save**.
88119

89-
> [!NOTE]
90-
> The change might take up to 12 hours to take effect.
120+
:::image type="content" source="./media/tutorial-security-policy/additional-parameters.png" alt-text="Configure additional parameters on manage effect and parameters screen.":::
121+
122+
Use the "reset to default" button to revert changes per the recommendation and restore the default value.
91123

124+
## Disable a security recommendation
92125

93-
## Enable a security policy
126+
When your security policy triggers a recommendation that's irrelevant for your environment, you can prevent that recommendation from appearing again. To disable a recommendation, select an initiative and change its settings to disable relevant recommendations.
94127

95-
Some policies in your initiatives might be disabled by default. For example, in the Microsoft cloud security benchmark initiative, some policies are provided for you to enable only if they meet a specific regulatory or compliance requirement for your organization. Such policies include recommendations to encrypt data at rest with customer-managed keys, such as "Container registries should be encrypted with a customer-managed key (CMK)".
128+
The recommendation you want to disable will still appear if it's required for a regulatory standard you've applied with Defender for Cloud's regulatory compliance tools. Even if you've disabled a recommendation in the built-in initiative, a recommendation in the regulatory standard's initiative will still trigger the recommendation if it's necessary for compliance. You can't disable recommendations from regulatory standard initiatives.
96129

97-
To enable a disabled policy and ensure it's assessed for your resources:
130+
For more information about recommendations, see [Managing security recommendations](review-security-recommendations.md).
131+
132+
1. From Defender for Cloud's menu, open the **Environment settings** page.
98133

99-
1. From Defender for Cloud's menu, open the **Environment settings** page. Here, you can see the management groups, subscriptions, and the initiatives applied to each.
134+
1. Select the subscription or management group for which you want to enable a recommendation.
100135

101-
1. Select the subscription or management group for which you want to enable the recommendation (and policy).
136+
> [!NOTE]
137+
> Remember that a management group applies its settings to its subscriptions. Therefore, if you disabled a subscription's recommendation, and the subscription belongs to a management group that still uses the same settings, then you will continue to receive the recommendation. The security policy settings will still be applied from the management level and the recommendation will still be generated.
102138
103139
1. Open the **Security policy** page.
104140

105-
1. From the **Default initiative** or **Your custom initiatives** sections, select the relevant initiative with the policy you want to enable.
141+
1. From the **Default initiative** section, select the relevant initiative.
106142

107-
1. Open the **Parameters** section and search for the policy that invokes the recommendation that you want to disable.
143+
1. Search for the recommendation that that you want to enable, either by the search bar or filters.
108144

109-
1. From the dropdown list, change the value for the corresponding policy to **AuditIfNotExists** or **Enforce**.
145+
1. Select the ellipses menu, select **Manage effect and parameters**.
146+
147+
1. From the effect section, select **Disabled**.
110148

111149
1. Select **Save**.
112150

113151
> [!NOTE]
114-
> The change might take up to 12 hours to take effect.
115-
152+
> Setting will take effect immediately, but recommendations will update based on their freshness interval (up to 12 hours).
116153
117154
## Next steps
118155
This page explained security policies. For related information, see the following pages:
119156

120157
- [Learn how to set policies using PowerShell](../governance/policy/assign-policy-powershell.md)
121158
- [Learn how to edit a security policy in Azure Policy](../governance/policy/tutorials/create-and-manage.md)
122159
- [Learn how to set a policy across subscriptions or on Management groups using Azure Policy](../governance/policy/overview.md)
123-
- [Learn how to enable Defender for Cloud on all subscriptions in a management group](onboard-management-group.md)
160+
- [Learn how to enable Defender for Cloud on all subscriptions in a management group](onboard-management-group.md)

0 commit comments

Comments
 (0)