Skip to content

Commit 1c909dc

Browse files
authored
Merge pull request #229519 from ElazarK/cspm-fixes
fixes for CSMP
2 parents 75815da + 078d835 commit 1c909dc

File tree

5 files changed

+18
-51
lines changed

5 files changed

+18
-51
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@
141141
- name: Policies, initiatives, and recommendations
142142
displayName: policies, security, initiative, Microsoft cloud security benchmark, mcsb, recommendation
143143
href: security-policy-concept.md
144-
- name: Security posture
144+
- name: Secure score
145145
displayName: security, posture, secure, score, calculate, control, improve,
146146
href: secure-score-security-controls.md
147147
- name: Cloud Security Posture Management (CSPM)
@@ -150,7 +150,7 @@
150150
- name: Microsoft cloud security benchmark (MCSB)
151151
displayName: mcsb, azure, security, benchmark
152152
href: concept-regulatory-compliance.md
153-
- name: What is the cloud security graph
153+
- name: Identify and analyze risks across your environment
154154
displayName: cloud security graph, attack path analysis, cloud security explorer, attack, path, graph, security, explorer, explore, analysis
155155
href: concept-attack-path.md
156156
- name: External attack surface management (EASM)

articles/defender-for-cloud/concept-attack-path.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: What are the cloud security graph, attack path analysis, and the cloud security explorer?
2+
title: Identify and analyze risks across your environment
33
description: Learn how to prioritize remediation of cloud misconfigurations and vulnerabilities based on risk.
44
titleSuffix: Defender for Cloud attack path.
55
ms.topic: conceptual
66
ms.custom: ignite-2022
7-
ms.date: 01/24/2023
7+
ms.date: 03/06/2023
88
---
99

10-
# What are the cloud security graph, attack path analysis, and the cloud security explorer?
10+
# Identify and analyze risks across your environment
1111

1212
<iframe src="https://aka.ms/docs/player?id=36a5c440-00e6-4bd8-be1f-a27fbd007119" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
1313

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 8 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Overview of Cloud Security Posture Management (CSPM)
33
description: Learn more about the new Defender CSPM plan and the other enhanced security features that can be enabled for your multicloud environment through the Defender Cloud Security Posture Management (CSPM) plan.
44
ms.topic: conceptual
55
ms.custom: ignite-2022
6-
ms.date: 02/20/2023
6+
ms.date: 03/08/2023
77
---
88

99
# Cloud Security Posture Management (CSPM)
@@ -24,60 +24,27 @@ Defender for Cloud continually assesses your resources, subscriptions and organi
2424

2525
Defender for cloud offers foundational multicloud CSPM capabilities for free. These capabilities are automatically enabled by default on any subscription or account that has onboarded to Defender for Cloud. The foundational CSPM includes asset discovery, continuous assessment and security recommendations for posture hardening, compliance with Microsoft Cloud Security Benchmark (MCSB), and a [Secure score](secure-score-access-and-track.md) which measure the current status of your organization’s posture.
2626

27-
The optional Defender CSPM plan, provides advanced posture management capabilities such as [Attack path analysis](#attack-path-analysis), [Cloud security explorer](#cloud-security-explorer), advanced threat hunting, [security governance capabilities](#security-governance-and-regulatory-compliance), and also tools to assess your [security compliance](#security-governance-and-regulatory-compliance) with a wide range of benchmarks, regulatory standards, and any custom security policies required in your organization, industry, or region.
27+
The optional Defender CSPM plan, provides advanced posture management capabilities such as [Attack path analysis](how-to-manage-attack-path.md), [Cloud security explorer](how-to-manage-cloud-security-explorer.md), advanced threat hunting, [security governance capabilities](concept-regulatory-compliance.md), and also tools to assess your [security compliance](review-security-recommendations.md) with a wide range of benchmarks, regulatory standards, and any custom security policies required in your organization, industry, or region.
2828

2929
The following table summarizes each plan and their cloud availability.
3030

3131
| Feature | Foundational CSPM capabilities | Defender CSPM | Cloud availability |
3232
|--|--|--|--|
3333
| Continuous assessment of the security configuration of your cloud resources | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
3434
| [Security recommendations to fix misconfigurations and weaknesses](review-security-recommendations.md) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png":::| Azure, AWS, GCP, on-premises |
35-
| [Secure score](secure-score-access-and-track.md) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
36-
| [Governance](#security-governance-and-regulatory-compliance) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
37-
| [Regulatory compliance](#security-governance-and-regulatory-compliance) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
38-
| [Cloud security explorer](#cloud-security-explorer) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
39-
| [Attack path analysis](#attack-path-analysis) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
40-
| [Agentless scanning for machines](#agentless-scanning-for-machines) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
35+
| [Secure score](secure-score-security-controls.md) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
36+
| [Governance](concept-regulatory-compliance.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
37+
| [Regulatory compliance](concept-regulatory-compliance.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
38+
| [Cloud security explorer](how-to-manage-cloud-security-explorer.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
39+
| [Attack path analysis](how-to-manage-attack-path.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
40+
| [Agentless scanning for machines](concept-agentless-data-collection.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
4141

4242

4343
> [!NOTE]
4444
> If you have enabled Defender for DevOps, you will only gain cloud security graph and attack path analysis to the artifacts that arrive through those connectors.
4545
>
4646
> To enable Governance for for DevOps related recommendations, the Defender CSPM plan needs to be enabled on the Azure subscription that hosts the DevOps connector.
4747
48-
## Security governance and regulatory compliance
49-
50-
Security governance and regulatory compliance refer to the policies and processes which organizations have in place. These policies ensure that they comply with laws, rules and regulations put in place by external bodies (government) which control activity in a given jurisdiction. Defender for Cloud allows you to view your regulatory compliance through the regulatory compliance dashboard.
51-
52-
Defender for Cloud continuously assesses your hybrid cloud environment to analyze the risk factors according to the controls and best practices in the standards that you've applied to your subscriptions. The dashboard reflects the status of your compliance with these standards.
53-
54-
Learn more about [security and regulatory compliance in Defender for Cloud](concept-regulatory-compliance.md).
55-
56-
## Cloud security explorer
57-
58-
The cloud security graph is a graph-based context engine that exists within Defender for Cloud. The cloud security graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected builds a graph representing your multicloud environment.
59-
60-
Defender for Cloud then uses the generated graph to perform an attack path analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the cloud security explorer.
61-
62-
Learn more about [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer)
63-
64-
## Attack path analysis
65-
66-
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans:
67-
68-
- expose exploitable paths that attackers may use to breach your environment and reach your high-impact assets
69-
- provide recommendations for ways to prevent successful breaches
70-
71-
When you take your environment's contextual information into account, attack path analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first. For example its exposure to the internet, permissions, lateral movement, and more.
72-
73-
Learn more about [attack path analysis](concept-attack-path.md#what-is-attack-path-analysis).
74-
75-
## Agentless scanning for machines
76-
77-
With agentless scanning for VMs, you can get visibility on actionable OS posture issues without installed agents, network connectivity, or machine performance.
78-
79-
Learn more about [agentless scanning](concept-agentless-data-collection.md).
80-
8148
## Next steps
8249

8350
Learn about Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).

articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ titleSuffix: Defender for Cloud
44
description: Learn how to build queries in cloud security explorer to find vulnerabilities that exist on your multicloud environment.
55
ms.topic: how-to
66
ms.custom: ignite-2022
7-
ms.date: 02/07/2023
7+
ms.date: 03/05/2023
88
---
99

10-
# Cloud security explorer
10+
# Build queries with cloud security explorer
1111

1212
Defender for Cloud's contextual security capabilities assist security teams in reducing the risk of impactful breaches. Defender for Cloud uses environmental context to perform a risk assessment of your security issues, identifies the biggest security risks, and distinguishes them from less risky issues.
1313

articles/defender-for-cloud/secure-score-security-controls.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Security posture for Microsoft Defender for Cloud
2+
title: Secure score
33
description: Description of Microsoft Defender for Cloud's secure score and its security controls
44
ms.topic: conceptual
5-
ms.date: 01/15/2023
5+
ms.date: 03/05/2023
66
---
77

8-
# Security posture for Microsoft Defender for Cloud
8+
# Secure score
99

1010
## Overview of secure score
1111

0 commit comments

Comments
 (0)