You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/manage-mcsb.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.date: 01/25/2022
7
7
8
8
# Manage MCSB recommendations in Defender for Cloud
9
9
10
-
Microsoft Defender for Cloud assesses resources against [security standards](security-policy-concept.md). By default, when you onboard Azure subscriptions to Defender for Cloud, the [Microsoft Cloud Security Benchmark (MCSB) standard](concept-regulatory-compliance.md) is enabled. Defender for Cloud starts assessing the security posture of your resource against controls in the MCSB standard, and issues security recommendations based on the assessments.
10
+
Microsoft Defender for Cloud assesses resources against [security standards](security-policy-concept.md). By default, when you onboard cloud accounts to Defender for Cloud, the [Microsoft Cloud Security Benchmark (MCSB) standard](concept-regulatory-compliance.md) is enabled. Defender for Cloud starts assessing the security posture of your resource against controls in the MCSB standard, and issues security recommendations based on the assessments.
11
11
12
12
This article describes how you can manage recommendations provided by MCSB.
13
13
@@ -31,14 +31,13 @@ To review which recommendations you can deny and enforce, in the **Security poli
31
31
32
32
## Manage recommendation settings
33
33
34
-
You can enable/disable, deny and enforce recommendations.
35
-
36
34
> [!NOTE]
37
-
> If a recommendation is disabled, all of its subrecommendations are exempted.
35
+
> - If a recommendation is disabled, all of its subrecommendations are exempted.
36
+
> -**Disabled** and **Deny** effects are available for Azure environment only.
38
37
39
38
1. In the Defender for Cloud portal, open the **Environment settings** page.
40
39
41
-
1. Select the subscription or management group for which you want to manage MCSB recommendations.
40
+
1. Select the cloud account or management account for which you want to manage MCSB recommendations.
42
41
43
42
1. Open the **Security policies** page, and select the MCSB standard. The standard should be turned on.
44
43
@@ -105,4 +104,4 @@ This page explained security policies. For related information, see the followin
105
104
-[Learn how to set policies using PowerShell](../governance/policy/assign-policy-powershell.md)
106
105
-[Learn how to edit a security policy in Azure Policy](../governance/policy/tutorials/create-and-manage.md)
107
106
-[Learn how to set a policy across subscriptions or on Management groups using Azure Policy](../governance/policy/overview.md)
108
-
-[Learn how to enable Defender for Cloud on all subscriptions in a management group](onboard-management-group.md)
107
+
-[Learn how to enable Defender for Cloud on all subscriptions in a management group](onboard-management-group.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/security-policy-concept.md
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,32 +15,38 @@ Security standards define rules, compliance conditions for those rules, and acti
15
15
16
16
Security standards in Defender for Cloud come from these sources:
17
17
18
-
-**Microsoft cloud security benchmark (MCSB)**: The MCSB standard is applied by default when you onboard Defender for Cloud to a management group or subscription. Your [secure score](secure-score-security-controls.md) is based on assessment against some MCSB recommendations.
18
+
-**Microsoft cloud security benchmark (MCSB)**: The MCSB standard is applied by default when you onboard cloud accounts to Defender. Your [secure score](secure-score-security-controls.md) is based on assessment against some MCSB recommendations.
19
19
20
20
-**Regulatory compliance standards**: When you enable one or more [Defender for Cloud plans](defender-for-cloud-introduction.md), you can add standards from a wide range of predefined regulatory compliance programs.
21
21
22
22
-**Custom standards**: You can create custom security standards in Defender for Cloud, and then add built-in and custom recommendations to those custom standards as needed.
23
23
24
24
Security standards in Defender for Cloud are based on [Azure Policy](../governance/policy/overview.md)[initiatives](../governance/policy/concepts/initiative-definition-structure.md) or on the Defender for Cloud native platform. Currently, Azure standards are based on Azure Policy. AWS and GCP standards are based on Defender for Cloud.
25
25
26
-
Security standards in Defender for Cloud simplify the complexity of Azure Policy. In most cases, you can work directly with security standards and recommendations in the Defender for Cloud portal, without needing to directly configure Azure Policy.
27
-
28
26
### Working with security standards
29
27
30
28
Here's what you can do with security standards in Defender for Cloud:
31
29
32
-
-**Modify the built-in MCSB for the subscription**: When you enable Defender for Cloud, the MCSB is automatically assigned to all Defender for Cloud registered subscriptions.
30
+
-**Modify the built-in MCSB for the subscription**: When you enable Defender for Cloud, the MCSB is automatically assigned to all Defender for Cloud registered subscriptions.[Learn more about managing the MCSB standard](manage-mcsb.md).
33
31
34
32
-**Add regulatory compliance standards**: If you have one or more paid plans enabled, you can assign built-in compliance standards against which to assess your Azure, AWS, and GCP resources. [Learn more about assigning regulatory standards](update-regulatory-compliance-packages.yml).
35
33
36
-
-**Add custom standards**: If you have at least one paid Defender plan enabled, you can define new [Azure standards](custom-security-policies.md)or [AWS/GCP standards](create-custom-recommendations.md) in the Defender for Cloud portal. You can then add recommendations to those standards.
34
+
-**Add custom standards**: If you have at least one paid Defender plan enabled, you can define new [custom standards](custom-security-policies.md)and [custom recommendations](create-custom-recommendations.md) in the Defender for Cloud portal. You can then add recommendations to those standards.
37
35
38
-
### Working with custom standards
36
+
### Custom standards
39
37
40
38
Custom standards appear alongside built-in standards in the **Regulatory compliance** dashboard.
41
39
42
40
Recommendations derived from assessments against custom standards appear together with recommendations from built-in standards. Custom standards can contain built-in and custom recommendations.
43
41
42
+
### Custom recommendations
43
+
44
+
All customers with Azure subscriptions can create custom recommendations based on Azure Policy. With Azure Policy, you create a policy definition, assign it to a policy initiative, and merge that initiative and policy into Defender for Cloud.
45
+
46
+
Custom recommendations based on Kusto Query Language (KQL) are available for all clouds, but require enabling the [Defender CSPM plan](concept-cloud-security-posture-management.md). With these recommendations, you specify a unique name, a description, steps for remediation, severity, and which standards the recommendation should be assigned to. You add recommendation logic with KQL. A query editor provides a built-in query template that you can tweak as needed, or you can write your KQL query from scratch.
47
+
48
+
For more information, see [Create custom security standards and recommendations in Microsoft Defender for Cloud](create-custom-recommendations.md).
49
+
44
50
## Security recommendations
45
51
46
52
Defender for Cloud periodically and continuously analyzes and assesses the security state of protected resources against defined security standards, to identify potential security misconfigurations and weaknesses. Defender for Cloud then provides recommendations based on assessment findings.
@@ -65,13 +71,6 @@ The MCSB standard is an Azure Policy initiative that includes multiple complianc
65
71
66
72
As Defender for Cloud continually assesses and finds resources that don't satisfy this control, it marks the resources as noncompliant and triggers a recommendation. In this case, guidance is to harden Azure Storage accounts that aren't protected with virtual network rules.
67
73
68
-
### Custom recommendations
69
-
70
-
All customers with Azure subscriptions can create custom recommendations based on Azure Policy. With Azure Policy, you create a policy definition, assign it to a policy initiative, and merge that initiative and policy into Defender for Cloud.
71
-
72
-
Custom recommendations based on Kusto Query Language (KQL) are available for all clouds, but require enabling the [Defender CSPM plan](concept-cloud-security-posture-management.md). With these recommendations, you specify a unique name, a description, steps for remediation, severity, and which standards the recommendation should be assigned to. You add recommendation logic with KQL. A query editor provides a built-in query template that you can tweak as needed, or you can write your KQL query from scratch.
73
-
74
-
For more information, see [Create custom security standards and recommendations in Microsoft Defender for Cloud](create-custom-recommendations.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/update-regulatory-compliance-packages.yml
+4-52Lines changed: 4 additions & 52 deletions
Original file line number
Diff line number
Diff line change
@@ -24,9 +24,9 @@ prerequisites:
24
24
- You need `Owner` or `Policy Contributor` permissions to add a standard.
25
25
procedureSection:
26
26
- title: |
27
-
Assign a standard (Azure)
27
+
Assign a standard
28
28
summary: |
29
-
**To assign regulatory compliance standards on Azure**:
29
+
**To assign regulatory compliance standards on cloud environment**:
30
30
steps:
31
31
- |
32
32
Sign in to the [Azure portal](https://portal.azure.com/).
@@ -37,7 +37,7 @@ procedureSection:
37
37
38
38
:::image type="content" source="media/update-regulatory-compliance-packages/manage-compliance.png" alt-text="Screenshot of the regulatory compliance page that shows you where to select the manage compliance policy button." lightbox="media/update-regulatory-compliance-packages/manage-compliance.png":::
39
39
- |
40
-
Select the subscription or management group on which you want to assign the security standard.
40
+
Select an account or management account (Azure subscription or nmanagement group, AWS account or management account, GCP project or organization) on which you want to assign the security standard.
41
41
42
42
> [!NOTE]
43
43
> We recommend selecting the highest scope for which the standard is applicable so that compliance data is aggregated and tracked for all nested resources.
@@ -51,54 +51,6 @@ procedureSection:
51
51
If any information is needed in order to enable the standard, the **Set parameters** page appears for you to type in the information.
52
52
53
53
The selected standard appears in **Regulatory compliance** dashboard as enabled for the subscription it was enabled on.
54
-
- title: |
55
-
Assign a standard (AWS)
56
-
summary: |
57
-
**To assign regulatory compliance standards on AWS accounts**:
58
-
steps:
59
-
- |
60
-
Sign in to the [Azure portal](https://portal.azure.com/).
61
-
- |
62
-
Navigate to **Microsoft Defender for Cloud** > **Regulatory compliance**. For each standard, you can see the applied subscription.
63
-
- |
64
-
Select **Manage compliance policies**.
65
-
- |
66
-
Select the relevant AWS account.
67
-
- |
68
-
Select **Security policies**.
69
-
- |
70
-
In the **Standards** tab, select the three dots in the standard you want to assign > **Assign standard**.
71
-
72
-
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-aws-from-list.png" alt-text="Screenshot that shows where to select a standard to assign." lightbox="media/update-regulatory-compliance-packages/assign-standard-aws-from-list.png":::
73
-
- |
74
-
At the prompt, select **Yes**. The standard is assigned to your AWS account.
75
-
76
-
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-aws.png" alt-text="Screenshot of the prompt to assign a regulatory compliance standard to the AWS account." lightbox="media/update-regulatory-compliance-packages/assign-standard-aws.png":::
77
-
78
-
The selected standard appears in **Regulatory compliance** dashboard as enabled for the account.
79
-
- title: |
80
-
Assign a standard (GCP)
81
-
summary: |
82
-
**To assign regulatory compliance standards on GCP projects**:
83
-
steps:
84
-
- |
85
-
Sign in to the [Azure portal](https://portal.azure.com/).
86
-
- |
87
-
Navigate to **Microsoft Defender for Cloud** > **Regulatory compliance**. For each standard, you can see the applied subscription.
88
-
- |
89
-
Select **Manage compliance policies**.
90
-
- |
91
-
Select the relevant GCP project.
92
-
- |
93
-
Select **Security policies**.
94
-
- |
95
-
In the **Standards** tab, select the three dots alongside an unassigned standard and select **Assign standard**.
96
-
97
-
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-gcp-from-list.png" alt-text="Screenshot that shows how to assign a standard to your GCP project." lightbox="media/update-regulatory-compliance-packages/assign-standard-gcp-from-list.png":::
98
-
- |
99
-
At the prompt, select **Yes**. The standard is assigned to your GCP project.
100
-
101
-
The selected standard appears in the **Regulatory compliance** dashboard as enabled for the project.
102
54
103
55
relatedContent:
104
56
- text: Create custom standards for Azure
@@ -109,4 +61,4 @@ relatedContent:
109
61
url: regulatory-compliance-dashboard.md
110
62
111
63
# - Create custom standards for [Azure](custom-security-policies.md), [AWS, and GCP](create-custom-recommendations.md).
0 commit comments