You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Learn more about the new Defender CSPM plan and the other enhanced security features that can be enabled for your multicloud environment through the Defender Cloud Security Posture Management (CSPM) plan.
4
4
ms.topic: conceptual
5
5
ms.custom: ignite-2022
6
-
ms.date: 02/20/2023
6
+
ms.date: 03/08/2023
7
7
---
8
8
9
9
# Cloud Security Posture Management (CSPM)
@@ -24,60 +24,27 @@ Defender for Cloud continually assesses your resources, subscriptions and organi
24
24
25
25
Defender for cloud offers foundational multicloud CSPM capabilities for free. These capabilities are automatically enabled by default on any subscription or account that has onboarded to Defender for Cloud. The foundational CSPM includes asset discovery, continuous assessment and security recommendations for posture hardening, compliance with Microsoft Cloud Security Benchmark (MCSB), and a [Secure score](secure-score-access-and-track.md) which measure the current status of your organization’s posture.
26
26
27
-
The optional Defender CSPM plan, provides advanced posture management capabilities such as [Attack path analysis](#attack-path-analysis), [Cloud security explorer](#cloud-security-explorer), advanced threat hunting, [security governance capabilities](#security-governance-and-regulatory-compliance), and also tools to assess your [security compliance](#security-governance-and-regulatory-compliance) with a wide range of benchmarks, regulatory standards, and any custom security policies required in your organization, industry, or region.
27
+
The optional Defender CSPM plan, provides advanced posture management capabilities such as [Attack path analysis](how-to-manage-attack-path.md), [Cloud security explorer](how-to-manage-cloud-security-explorer.md), advanced threat hunting, [security governance capabilities](concept-regulatory-compliance.md), and also tools to assess your [security compliance](review-security-recommendations.md) with a wide range of benchmarks, regulatory standards, and any custom security policies required in your organization, industry, or region.
28
28
29
29
The following table summarizes each plan and their cloud availability.
> If you have enabled Defender for DevOps, you will only gain cloud security graph and attack path analysis to the artifacts that arrive through those connectors.
45
45
>
46
46
> To enable Governance for for DevOps related recommendations, the Defender CSPM plan needs to be enabled on the Azure subscription that hosts the DevOps connector.
47
47
48
-
## Security governance and regulatory compliance
49
-
50
-
Security governance and regulatory compliance refer to the policies and processes which organizations have in place. These policies ensure that they comply with laws, rules and regulations put in place by external bodies (government) which control activity in a given jurisdiction. Defender for Cloud allows you to view your regulatory compliance through the regulatory compliance dashboard.
51
-
52
-
Defender for Cloud continuously assesses your hybrid cloud environment to analyze the risk factors according to the controls and best practices in the standards that you've applied to your subscriptions. The dashboard reflects the status of your compliance with these standards.
53
-
54
-
Learn more about [security and regulatory compliance in Defender for Cloud](concept-regulatory-compliance.md).
55
-
56
-
## Cloud security explorer
57
-
58
-
The cloud security graph is a graph-based context engine that exists within Defender for Cloud. The cloud security graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected builds a graph representing your multicloud environment.
59
-
60
-
Defender for Cloud then uses the generated graph to perform an attack path analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the cloud security explorer.
61
-
62
-
Learn more about [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer)
63
-
64
-
## Attack path analysis
65
-
66
-
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans:
67
-
68
-
- expose exploitable paths that attackers may use to breach your environment and reach your high-impact assets
69
-
- provide recommendations for ways to prevent successful breaches
70
-
71
-
When you take your environment's contextual information into account, attack path analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first. For example its exposure to the internet, permissions, lateral movement, and more.
72
-
73
-
Learn more about [attack path analysis](concept-attack-path.md#what-is-attack-path-analysis).
74
-
75
-
## Agentless scanning for machines
76
-
77
-
With agentless scanning for VMs, you can get visibility on actionable OS posture issues without installed agents, network connectivity, or machine performance.
78
-
79
-
Learn more about [agentless scanning](concept-agentless-data-collection.md).
80
-
81
48
## Next steps
82
49
83
50
Learn about Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,10 @@ titleSuffix: Defender for Cloud
4
4
description: Learn how to build queries in cloud security explorer to find vulnerabilities that exist on your multicloud environment.
5
5
ms.topic: how-to
6
6
ms.custom: ignite-2022
7
-
ms.date: 02/07/2023
7
+
ms.date: 03/05/2023
8
8
---
9
9
10
-
# Cloud security explorer
10
+
# Build queries with cloud security explorer
11
11
12
12
Defender for Cloud's contextual security capabilities assist security teams in reducing the risk of impactful breaches. Defender for Cloud uses environmental context to perform a risk assessment of your security issues, identifies the biggest security risks, and distinguishes them from less risky issues.
0 commit comments