You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/remediate-cloud-deployment-secrets.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
2
title: Remediate cloud deployment secrets security issues in Microsoft Defender for Cloud
3
-
description: Learn how to remediate cloud deployment secrets security issues in Microsoft Defender for Cloud
3
+
description: Learn how to remediate cloud deployment secrets security issues in Microsoft Defender for Cloud.
4
4
ms.topic: overview
5
5
ms.date: 04/16/2024
6
6
---
7
7
8
8
9
9
# Remediate issues with cloud deployment secrets
10
10
11
-
Microsoft Defender for Cloud Defender for Cloud provides secrets scanning for virtual machines, and for cloud deployments, to reduce lateral movement risk.
11
+
Microsoft Defender for Cloud provides secrets scanning for virtual machines, and for cloud deployments, to reduce lateral movement risk.
12
12
13
13
This article helps you to identify and remediate security risks with cloud deployment secrets.
14
14
@@ -25,7 +25,7 @@ This article helps you to identify and remediate security risks with cloud deplo
25
25
26
26
## Remediate secrets with attack paths
27
27
28
-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets.
28
+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) to expose exploitable paths that attackers might use to reach high-impact assets.
29
29
30
30
31
31
1. Sign in to the [Azure portal](https://portal.azure.com).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/remediate-server-secrets.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
2
title: Remediate VM secrets security issues in Microsoft Defender for Cloud
3
-
description: Learn how to remediate VM secrets security issues in Microsoft Defender for Cloud
3
+
description: Learn how to remediate VM secrets security issues in Microsoft Defender for Cloud.
4
4
ms.topic: overview
5
5
ms.date: 04/16/2024
6
6
---
7
7
8
8
9
9
# Remediate VM secrets issues
10
10
11
-
Microsoft Defender for Cloud Defender for Cloud provides secrets scanning for virtual machines (VMs), and for cloud deployments, to reduce lateral movement risk.
11
+
Microsoft Defender for Cloud provides secrets scanning for virtual machines (VMs), and for cloud deployments, to reduce lateral movement risk.
12
12
13
13
This article helps you to identify and remediate security risks with VM secrets.
14
14
@@ -19,17 +19,17 @@ This article helps you to identify and remediate security risks with VM secrets.
19
19
20
20
-[Defender for Cloud](get-started.md) must be available in your Azure subscription.
21
21
22
-
-One or either of these Defender for Cloud plans [must be enabled](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features) either or both of the following two plans:
22
+
-At least one of these plans [must be enabled](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features):
23
23
-[Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md)
-[Agentless machine scannins](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines) must be enabled. Learn more about [agentless scanning](concept-agentless-data-collection.md#availability).
26
+
-[Agentless machine scanning](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines) must be enabled. Learn more about [agentless scanning](concept-agentless-data-collection.md#availability).
27
27
28
28
29
29
30
30
## Remediate secrets with attack paths
31
31
32
-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides a number of attack paths scenarios for VM secrets.
32
+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides a number of attack paths scenarios for VM secrets.
33
33
34
34
35
35
1. Sign in to the [Azure portal](https://portal.azure.com).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secrets-scanning-cloud-deployment.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Cloud provides agentless secrets scanning for cloud deplo
12
12
13
13
## What is cloud deployment?
14
14
15
-
Cloud deployments refers to the process of deploying and managing resources on cloud providers such as Azure and AWS at scale, using tools such as Azure Resource Manager templates and AWS CloudFormation stack. In other words, a cloud deployment is an instance of an infrastructure-as-code (IaC) template.
15
+
Cloud deployment refers to the process of deploying and managing resources on cloud providers such as Azure and AWS at scale, using tools such as Azure Resource Manager templates and AWS CloudFormation stack. In other words, a cloud deployment is an instance of an infrastructure-as-code (IaC) template.
16
16
17
17
Each cloud provide exposes an API query, and when querying APIs for cloud deployment resources, you typically retrieve deployment metadata such as deployment templates, parameters, output, and tags.
18
18
@@ -68,17 +68,13 @@ The following cloud deployment secrets security recommendations are available:
68
68
69
69
### Attack path scenarios
70
70
71
-
The table summarizes supported attack paths. Currently an attack path for Azure Resource Manager deployments in Azure is supported: Internet exposed Azure VM with
71
+
Attack path analysis is a graph-based algorithm that scans your cloud security graph. to expose exploitable paths that attackers might use to reach high-impact assets.
72
72
73
73
74
74
### Predefined cloud security explorer queries
75
75
76
-
In cloud security explorer, you can currently search for Azure Resource Manager deployments. For example, you might search for:
77
-
Azure resource manager deployments, that contain secrets such as connection strings, SAS tokens, that can authenticate to
76
+
The cloud security explorer enables you to proactively identify potential security risks within your cloud environment. It does so by querying the cloud security graph. Create queries by selecting cloud deployment resource types, and the types of secrets you want to find.
78
77
79
-
- VM with plaintext secret that can authenticate to another VM - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
80
-
- VM with plaintext secret that can authenticate to a storage account - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts
81
-
- VM with plaintext secret that can authenticate to an SQL database - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access SQL databases.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secrets-scanning-servers.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,15 +16,15 @@ Defender for Cloud's agentless secrets scanning for Virtual Machines (VM) locate
16
16
17
17
Secrets scanning for VMs is agentless and uses cloud APIs.
18
18
19
-
- Scanning captures disk snapshots and analyses them, with no impact on VM performance.
20
-
- After the Microsoft secrets scanning engine collects secrets metadata from disk, it sends them to Defender for Cloud.
21
-
- The secrets scanning engine verifies whether SSH private keys can be used to move laterally in your network.
19
+
1. Scanning captures disk snapshots and analyses them, with no impact on VM performance.
20
+
1. After the Microsoft secrets scanning engine collects secrets metadata from disk, it sends them to Defender for Cloud.
21
+
1. The secrets scanning engine verifies whether SSH private keys can be used to move laterally in your network.
22
22
- SSH keys that aren’t successfully verified are categorized as unverified on the Defender for Cloud Recommendations page.
23
23
- Directories recognized as containing test-related content are excluded from scanning.
24
24
25
25
## What’s supported?
26
26
27
-
VM secrets scanning is available when you’re using either of these plans: Defender for Servers plan 2/Defender Cloud Security Posture Management (CSPM). VM secrets scanning scans Azure VMs, and AWS/GCP instances onboarded to Defender for Cloud. Review the secrets that can be discovered by Defender for Cloud.
27
+
VM secrets scanning is available when you’re using either Defender for Servers Plan 2 or Defender Cloud Security Posture Management (CSPM). VM secrets scanning is able to scan Azure VMs, and AWS/GCP instances onboarded to Defender for Cloud. Review the secrets that can be discovered by Defender for Cloud.
28
28
29
29
## How does VM secrets scanning mitigate risk?
30
30
@@ -41,7 +41,7 @@ There are a number of ways. Not every method is supported for every secret. Revi
41
41
42
42
- Review secrets in the asset inventory: The inventory shows the security state of resources connected to Defender for Cloud. From the inventory you can view the secrets discovered on a specific machine.
43
43
- Review secrets recommendations: When secrets are found on assets, a recommendation is triggered under the Remediate vulnerabilities security control on the Defender for Cloud Recommendations page. Recommendations are triggered as follows:
44
-
- Review secrets with cloud security explorer. Use cloud security explorer to query the cloud security graph. You can build your own queries, or use one of the built-in templates to query for VM secrets across your environment.
44
+
- Review secrets with cloud security explorer. Use cloud security explorer to query the cloud security graph. You can build your own queries, or use one of the built-in templates to query for VM secrets across your environment.
45
45
- Review attack paths: Attack path analysis scans the cloud security graph to expose exploitable paths that attacks might use to breach your environment and reach high-impact assets. VM secrets scanning supports a number of attack path scenarios.
46
46
47
47
### Security recommendations
@@ -60,7 +60,7 @@ The table summarizes supported attack paths.
60
60
**VM** | **Attack paths**
61
61
--- | ---
62
62
Azure | Exposed Vulnerable VM has an insecure SSH private key that is used to authenticate to a VM.<br/>Exposed Vulnerable VM has insecure secrets that are used to authenticate to a storage account.<br/>Vulnerable VM has insecure secrets that are used to authenticate to a storage account.<br/>Exposed Vulnerable VM has insecure secrets that are used to authenticate to an SQL server.
63
-
AWS | Exposed Vulnerable EC2 instance has an insecure SSH private key that is used to authenticate to an EC2 instance.<br/>Exposed Vulnerable EC2 instance has an insecure secret that are used to authenticate to a storage account.<br/>Exposed Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.<br/>Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.
63
+
AWS | Exposed Vulnerable EC2 instance has an insecure SSH private key that is used to authenticate to an EC2 instance.<br/>Exposed Vulnerable EC2 instance has an insecure secret that is used to authenticate to a storage account.<br/>Exposed Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.<br/>Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.
64
64
GCP | Exposed Vulnerable GCP VM instance has an insecure SSH private key that is used to authenticate to a GCP VM instance.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secrets-scanning.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 04/16/2024
10
10
11
11
Microsoft Defender for Cloud helps security team to minimize the risk of attackers exploiting security secrets.
12
12
13
-
After gaining initial access, attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing cloud deployments, resources, and internet facing workloads. Lateral movement often involves credentials threats that typically exploit sensitive data such as exposed credentials and secrets such as passwords, keys, tokens and connection strings to gain access to additional assets. Secrets are often found in files, stored on VM disks, or on containers, across multi-cloud deployments. Exposed secrets happen for a number of reasons:
13
+
After gaining initial access, attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing cloud deployments, resources, and internet facing workloads. Lateral movement often involves credentials threats that typically exploit sensitive data such as exposed credentials and secrets such as passwords, keys, tokens, and connection strings to gain access to additional assets. Secrets are often found in files, stored on VM disks, or on containers, across multi-cloud deployments. Exposed secrets happen for a number of reasons:
14
14
15
15
- Lack of awareness: Organizations might not be aware of the risks and consequences of secrets exposure in their cloud environment. There might not be a clear policy on handling and protecting secrets in code and configuration files.
16
16
- Lack of discovery tools: Tools might not be in place to detect and remediate secrets leaks.
@@ -50,7 +50,7 @@ Defender for Cloud supports discovery of the types of secrets summarized in the
0 commit comments