Skip to content

Commit 30e3a12

Browse files
secrets docs
1 parent 82b40dd commit 30e3a12

File tree

6 files changed

+78
-86
lines changed

6 files changed

+78
-86
lines changed

articles/defender-for-cloud/release-notes-archive.md

Lines changed: 58 additions & 62 deletions
Large diffs are not rendered by default.

articles/defender-for-cloud/remediate-cloud-deployment-secrets.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Remediate cloud deployment secrets security issues in Microsoft Defender for Cloud
3-
description: Learn how to remediate cloud deployment secrets security issues in Microsoft Defender for Cloud
3+
description: Learn how to remediate cloud deployment secrets security issues in Microsoft Defender for Cloud.
44
ms.topic: overview
55
ms.date: 04/16/2024
66
---
77

88

99
# Remediate issues with cloud deployment secrets
1010

11-
Microsoft Defender for Cloud Defender for Cloud provides secrets scanning for virtual machines, and for cloud deployments, to reduce lateral movement risk.
11+
Microsoft Defender for Cloud provides secrets scanning for virtual machines, and for cloud deployments, to reduce lateral movement risk.
1212

1313
This article helps you to identify and remediate security risks with cloud deployment secrets.
1414

@@ -25,7 +25,7 @@ This article helps you to identify and remediate security risks with cloud deplo
2525

2626
## Remediate secrets with attack paths
2727

28-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets.
28+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) to expose exploitable paths that attackers might use to reach high-impact assets.
2929

3030

3131
1. Sign in to the [Azure portal](https://portal.azure.com).

articles/defender-for-cloud/remediate-server-secrets.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Remediate VM secrets security issues in Microsoft Defender for Cloud
3-
description: Learn how to remediate VM secrets security issues in Microsoft Defender for Cloud
3+
description: Learn how to remediate VM secrets security issues in Microsoft Defender for Cloud.
44
ms.topic: overview
55
ms.date: 04/16/2024
66
---
77

88

99
# Remediate VM secrets issues
1010

11-
Microsoft Defender for Cloud Defender for Cloud provides secrets scanning for virtual machines (VMs), and for cloud deployments, to reduce lateral movement risk.
11+
Microsoft Defender for Cloud provides secrets scanning for virtual machines (VMs), and for cloud deployments, to reduce lateral movement risk.
1212

1313
This article helps you to identify and remediate security risks with VM secrets.
1414

@@ -19,17 +19,17 @@ This article helps you to identify and remediate security risks with VM secrets.
1919

2020
- [Defender for Cloud](get-started.md) must be available in your Azure subscription.
2121

22-
- One or either of these Defender for Cloud plans [must be enabled](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features) either or both of the following two plans:
22+
- At least one of these plans [must be enabled](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features):
2323
- [Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md)
2424
- [Defender CSPM](concept-cloud-security-posture-management.md)
2525

26-
- [Agentless machine scannins](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines) must be enabled. Learn more about [agentless scanning](concept-agentless-data-collection.md#availability).
26+
- [Agentless machine scanning](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines) must be enabled. Learn more about [agentless scanning](concept-agentless-data-collection.md#availability).
2727

2828

2929

3030
## Remediate secrets with attack paths
3131

32-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides a number of attack paths scenarios for VM secrets.
32+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides a number of attack paths scenarios for VM secrets.
3333

3434

3535
1. Sign in to the [Azure portal](https://portal.azure.com).

articles/defender-for-cloud/secrets-scanning-cloud-deployment.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Cloud provides agentless secrets scanning for cloud deplo
1212

1313
## What is cloud deployment?
1414

15-
Cloud deployments refers to the process of deploying and managing resources on cloud providers such as Azure and AWS at scale, using tools such as Azure Resource Manager templates and AWS CloudFormation stack. In other words, a cloud deployment is an instance of an infrastructure-as-code (IaC) template.
15+
Cloud deployment refers to the process of deploying and managing resources on cloud providers such as Azure and AWS at scale, using tools such as Azure Resource Manager templates and AWS CloudFormation stack. In other words, a cloud deployment is an instance of an infrastructure-as-code (IaC) template.
1616

1717
Each cloud provide exposes an API query, and when querying APIs for cloud deployment resources, you typically retrieve deployment metadata such as deployment templates, parameters, output, and tags.
1818

@@ -68,17 +68,13 @@ The following cloud deployment secrets security recommendations are available:
6868

6969
### Attack path scenarios
7070

71-
The table summarizes supported attack paths. Currently an attack path for Azure Resource Manager deployments in Azure is supported: Internet exposed Azure VM with
71+
Attack path analysis is a graph-based algorithm that scans your cloud security graph. to expose exploitable paths that attackers might use to reach high-impact assets.
7272

7373

7474
### Predefined cloud security explorer queries
7575

76-
In cloud security explorer, you can currently search for Azure Resource Manager deployments. For example, you might search for:
77-
Azure resource manager deployments, that contain secrets such as connection strings, SAS tokens, that can authenticate to
76+
The cloud security explorer enables you to proactively identify potential security risks within your cloud environment. It does so by querying the cloud security graph. Create queries by selecting cloud deployment resource types, and the types of secrets you want to find.
7877

79-
- VM with plaintext secret that can authenticate to another VM - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
80-
- VM with plaintext secret that can authenticate to a storage account - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts
81-
- VM with plaintext secret that can authenticate to an SQL database - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access SQL databases.
8278

8379
## Related content
8480

articles/defender-for-cloud/secrets-scanning-servers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,15 +16,15 @@ Defender for Cloud's agentless secrets scanning for Virtual Machines (VM) locate
1616

1717
Secrets scanning for VMs is agentless and uses cloud APIs.
1818

19-
- Scanning captures disk snapshots and analyses them, with no impact on VM performance.
20-
- After the Microsoft secrets scanning engine collects secrets metadata from disk, it sends them to Defender for Cloud.
21-
- The secrets scanning engine verifies whether SSH private keys can be used to move laterally in your network.
19+
1. Scanning captures disk snapshots and analyses them, with no impact on VM performance.
20+
1. After the Microsoft secrets scanning engine collects secrets metadata from disk, it sends them to Defender for Cloud.
21+
1. The secrets scanning engine verifies whether SSH private keys can be used to move laterally in your network.
2222
- SSH keys that aren’t successfully verified are categorized as unverified on the Defender for Cloud Recommendations page.
2323
- Directories recognized as containing test-related content are excluded from scanning.
2424

2525
## What’s supported?
2626

27-
VM secrets scanning is available when you’re using either of these plans: Defender for Servers plan 2/Defender Cloud Security Posture Management (CSPM). VM secrets scanning scans Azure VMs, and AWS/GCP instances onboarded to Defender for Cloud. Review the secrets that can be discovered by Defender for Cloud.
27+
VM secrets scanning is available when you’re using either Defender for Servers Plan 2 or Defender Cloud Security Posture Management (CSPM). VM secrets scanning is able to scan Azure VMs, and AWS/GCP instances onboarded to Defender for Cloud. Review the secrets that can be discovered by Defender for Cloud.
2828

2929
## How does VM secrets scanning mitigate risk?
3030

@@ -41,7 +41,7 @@ There are a number of ways. Not every method is supported for every secret. Revi
4141

4242
- Review secrets in the asset inventory: The inventory shows the security state of resources connected to Defender for Cloud. From the inventory you can view the secrets discovered on a specific machine.
4343
- Review secrets recommendations: When secrets are found on assets, a recommendation is triggered under the Remediate vulnerabilities security control on the Defender for Cloud Recommendations page. Recommendations are triggered as follows:
44-
- Review secrets with cloud security explorer. Use cloud security explorer to query the cloud security graph. You can build your own queries, or use one of the built-in templates to query for VM secrets across your environment.
44+
- Review secrets with cloud security explorer. Use cloud security explorer to query the cloud security graph. You can build your own queries, or use one of the built-in templates to query for VM secrets across your environment.
4545
- Review attack paths: Attack path analysis scans the cloud security graph to expose exploitable paths that attacks might use to breach your environment and reach high-impact assets. VM secrets scanning supports a number of attack path scenarios.
4646

4747
### Security recommendations
@@ -60,7 +60,7 @@ The table summarizes supported attack paths.
6060
**VM** | **Attack paths**
6161
--- | ---
6262
Azure | Exposed Vulnerable VM has an insecure SSH private key that is used to authenticate to a VM.<br/>Exposed Vulnerable VM has insecure secrets that are used to authenticate to a storage account.<br/>Vulnerable VM has insecure secrets that are used to authenticate to a storage account.<br/>Exposed Vulnerable VM has insecure secrets that are used to authenticate to an SQL server.
63-
AWS | Exposed Vulnerable EC2 instance has an insecure SSH private key that is used to authenticate to an EC2 instance.<br/>Exposed Vulnerable EC2 instance has an insecure secret that are used to authenticate to a storage account.<br/>Exposed Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.<br/>Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.
63+
AWS | Exposed Vulnerable EC2 instance has an insecure SSH private key that is used to authenticate to an EC2 instance.<br/>Exposed Vulnerable EC2 instance has an insecure secret that is used to authenticate to a storage account.<br/>Exposed Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.<br/>Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.
6464
GCP | Exposed Vulnerable GCP VM instance has an insecure SSH private key that is used to authenticate to a GCP VM instance.
6565

6666
### Predefined cloud security explorer queries

articles/defender-for-cloud/secrets-scanning.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 04/16/2024
1010

1111
Microsoft Defender for Cloud helps security team to minimize the risk of attackers exploiting security secrets.
1212

13-
After gaining initial access, attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing cloud deployments, resources, and internet facing workloads. Lateral movement often involves credentials threats that typically exploit sensitive data such as exposed credentials and secrets such as passwords, keys, tokens and connection strings to gain access to additional assets. Secrets are often found in files, stored on VM disks, or on containers, across multi-cloud deployments. Exposed secrets happen for a number of reasons:
13+
After gaining initial access, attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing cloud deployments, resources, and internet facing workloads. Lateral movement often involves credentials threats that typically exploit sensitive data such as exposed credentials and secrets such as passwords, keys, tokens, and connection strings to gain access to additional assets. Secrets are often found in files, stored on VM disks, or on containers, across multi-cloud deployments. Exposed secrets happen for a number of reasons:
1414

1515
- Lack of awareness: Organizations might not be aware of the risks and consequences of secrets exposure in their cloud environment. There might not be a clear policy on handling and protecting secrets in code and configuration files.
1616
- Lack of discovery tools: Tools might not be in place to detect and remediate secrets leaks.
@@ -50,7 +50,7 @@ Defender for Cloud supports discovery of the types of secrets summarized in the
5050
**Secrets type** | **VM secrets discovery** | **Cloud deployment secrets discovery** | **Review location**
5151
--- | --- | --- | ---
5252
Insecure SSH private keys<br/>Supports RSA algorithm for PuTTy files.<br/>PKCS#8 and PKCS#1 standards<br/>OpenSSH standard |Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
53-
Plaintext Azure SQL connection strings, supports SQL PAAS|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
53+
Plaintext Azure SQL connection strings supports SQL PAAS.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
5454
Plaintext Azure database for PostgreSQL.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
5555
Plaintext Azure database for MySQL.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
5656
Plaintext Azure database for MariaDB.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
@@ -60,7 +60,7 @@ Plaintext Azure storage account connection strings|Yes |Yes | Inventory, cloud s
6060
Plaintext Azure storage account connection strings.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
6161
Plaintext Azure storage account SAS tokens.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
6262
Plaintext AWS access keys.|Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
63-
Plaintext AWS S3 pre-signed URL. |Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
63+
Plaintext AWS S3 presigned URL. |Yes |Yes | Inventory, cloud security explorer, recommendations, attack paths
6464
Plaintext Google storage signed URL. |Yes |Yes | Inventory, cloud security explorer.
6565
Plaintext Azure AD Client Secret. |Yes |Yes | Inventory, cloud security explorer.
6666
Plaintext Azure DevOps Personal Access Token. |Yes |Yes | Inventory, cloud security explorer.

0 commit comments

Comments
 (0)