You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/release-notes.md
+30-21Lines changed: 30 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Azure Security is in active development and receives improvements on an ongoing
23
23
- Bug fixes
24
24
- Deprecated functionality
25
25
26
-
This page is updated regularly, so revisit it often. If you're looking for items that are older than six months, you can find them in the [Archive for What's new in Azure Security Center](release-notes-archive.md).
26
+
This page is updated regularly, so revisit it often. If you're looking for items older than six months, you'll find them in the [Archive for What's new in Azure Security Center](release-notes-archive.md).
27
27
28
28
29
29
## May 2020
@@ -60,7 +60,7 @@ Suppression rules define the criteria for which alerts should be automatically d
60
60
61
61
One of the security controls introduced with the enhanced secure score was "Implement security best practices". Any custom recommendations created for your subscriptions were automatically placed in that control.
62
62
63
-
To make it easier to find your custom recommendations, we have moved them into a dedicated security control, "Custom recommendations". This control has no impact on your secure score.
63
+
To make it easier to find your custom recommendations, we've moved them into a dedicated security control, "Custom recommendations". This control has no impact on your secure score.
64
64
65
65
Learn more about security controls in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
66
66
@@ -71,22 +71,22 @@ Security controls are logical groups of related security recommendations. They r
71
71
72
72
To immediately see how well your organization is securing each individual attack surface, review the scores for each security control.
73
73
74
-
By default, your recommendations are shown in the security controls, but from this update you can display them as a list. To view them as simple list sorted by the health status of the affected resources, use the new toggle 'Group by controls' at the top of the list in the portal.
74
+
By default, your recommendations are shown in the security controls. From this update you can also display them as a list. To view them as simple list sorted by the health status of the affected resources, use the new toggle 'Group by controls'. The toggle is above the list in the portal.
75
75
76
76
Learn more about security controls in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
77
77
78
78
79
79
### Account security recommendations moved to "Security best practices" security control
80
80
81
-
One of the security controls introduced with the enhanced secure score was "Security best practices".
81
+
One of the security controls introduced with the enhanced secure score is "Security best practices".
82
82
83
83
With this update, three recommendations have moved out of the controls in which they were originally placed, and into this best practices control.
84
84
85
85
The recommendations are:
86
86
87
-
- MFA should be enabled on accounts with read permissions on your subscription (this was originally in the "Enable MFA" control)
88
-
- External accounts with read permissions should be removed from your subscription (this was originally in the "Manage access and permissions" control)
89
-
- A maximum of 3 owners should be designated for your subscription (this was originally in the "Manage access and permissions" control)
87
+
- MFA should be enabled on accounts with read permissions on your subscription (originally in the "Enable MFA" control)
88
+
- External accounts with read permissions should be removed from your subscription (originally in the "Manage access and permissions" control)
89
+
- A maximum of 3 owners should be designated for your subscription (originally in the "Manage access and permissions" control)
90
90
91
91
Learn more about security controls in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
92
92
@@ -97,7 +97,7 @@ Custom policies are now part of the Security Center recommendations experience,
97
97
98
98
Create a custom initiative in Azure policy, add it as a policy in Azure Security Center, and visualize it as recommendations.
99
99
100
-
We've now also added the ability to edit the custom recommendation metadata such as severity, remediation steps, threats information, and more.
100
+
We've now also added the option to edit the custom recommendation metadata. Metadata options include severity, remediation steps, threats information, and more.
101
101
102
102
[Learn more about enhancing your custom recommendations with detailed information](custom-security-policies.md#enhancing-your-custom-recommendations-with-detailed-information).
103
103
@@ -110,7 +110,13 @@ The Azure Security Center regulatory compliance dashboard now includes **dynamic
110
110
111
111
Dynamic compliance packages can be added to your subscription or management group from the Security Center security policy page. When you've onboarded a standard or benchmark, the standard appears in your regulatory compliance dashboard with all associated compliance data mapped as assessments. A summary report for any of the standards that have been onboarded will be available to download.
112
112
113
-
Now, you can add standards such as **NIST SP 800-53 R4**, **SWIFT CSP CSCF-v2020**, **UK Official and UK NHS**, **Canada Federal PBMM**, and **Azure CIS 1.1.0 (new)** (which is a more complete representation of Azure CIS 1.1.0).
113
+
Now, you can add standards such as:
114
+
115
+
-**NIST SP 800-53 R4**
116
+
-**SWIFT CSP CSCF-v2020**
117
+
-**UK Official and UK NHS**
118
+
-**Canada Federal PBMM**
119
+
-**Azure CIS 1.1.0 (new)** (which is a more complete representation of Azure CIS 1.1.0)
114
120
115
121
In addition, we've recently added the **Azure Security Benchmark**, the Microsoft-authored Azure-specific guidelines for security and compliance best practices based on common compliance frameworks. Additional standards will be supported in the dashboard as they become available.
116
122
@@ -119,7 +125,7 @@ In addition, we've recently added the **Azure Security Benchmark**, the Microsof
119
125
120
126
### Identity recommendations now included in Azure Security Center free tier
121
127
122
-
Security recommendations for identity and access on the Azure Security Center free tier are now generally available. This is part of the effort to make the cloud security posture management (CSPM) features completely free. Until now, these recommendations were only available on the standard pricing tier.
128
+
Security recommendations for identity and access on the Azure Security Center free tier are now generally available. This is part of the effort to make the cloud security posture management (CSPM) features free. Until now, these recommendations were only available on the standard pricing tier.
123
129
124
130
Examples of identity and access recommendations include:
125
131
@@ -162,13 +168,13 @@ Learn more about how to [integrate Azure Security Center with Windows Admin Cent
162
168
163
169
Azure Security Center is expanding its container security features to protect Azure Kubernetes Service (AKS).
164
170
165
-
The popular, opensource platform Kubernetes has been adopted so widely that it’s now an industry standard for container orchestration. Despite this widespread implementation, there’s still a lack of understanding regarding how to secure a Kubernetes environment. Defending the attack surfaces of a containerized application requires expertise to ensuring the infrastructure is configured securely and constantly monitored for potential threats.
171
+
The popular, open-source platform Kubernetes has been adopted so widely that it’s now an industry standard for container orchestration. Despite this widespread implementation, there’s still a lack of understanding regarding how to secure a Kubernetes environment. Defending the attack surfaces of a containerized application requires expertise to ensuring the infrastructure is configured securely and constantly monitored for potential threats.
166
172
167
173
The Security Center defense includes:
168
174
169
-
-**Discovery and visibility**— Continuous discovery of managed AKS instances within the subscriptions registered to Security Center.
170
-
-**Security recommendations**— Actionable recommendations to help you comply with security best-practices for AKS. These recommendations are included in your secure score to ensure they’re viewed as a part of your organization’s security posture. An example of an AKS-related recommendation you might see is "Role-based access control should be used to restrict access to a Kubernetes service cluster".
171
-
-**Threat protection**— Through continuous analysis of your AKS deployment, Security Center alerts you to threats and malicious activity detected at the host and AKS cluster level.
175
+
-**Discovery and visibility**- Continuous discovery of managed AKS instances within the subscriptions registered to Security Center.
176
+
-**Security recommendations**- Actionable recommendations to help you comply with security best-practices for AKS. These recommendations are included in your secure score to ensure they’re viewed as a part of your organization’s security posture. An example of an AKS-related recommendation you might see is "Role-based access control should be used to restrict access to a Kubernetes service cluster".
177
+
-**Threat protection**- Through continuous analysis of your AKS deployment, Security Center alerts you to threats and malicious activity detected at the host and AKS cluster level.
172
178
173
179
[Learn more about Azure Kubernetes Services integration with Security Center](azure-kubernetes-service-integration.md).
174
180
[Learn more about the container security features in Security Center](container-security.md).
@@ -178,8 +184,8 @@ The Security Center defense includes:
178
184
179
185
The features, operation, and UI for Azure Security Center’s just-in-time tools that secure your management ports have been enhanced as follows:
180
186
181
-
-**Justification field**— When requesting access to a virtual machine (VM) through the just-in-time page of the Azure portal, a new optional field is available to enter a justification for the request. Information entered into this field can be tracked in the activity log.
182
-
-**Automatic cleanup of redundant just-in-time (JIT) rules**— Whenever you update a JIT policy, a cleanup tool automatically runs to check the validity of your entire ruleset. The tool looks for mismatches between rules in your policy and rules in the NSG. If the cleanup tool finds a mismatch, it determines the cause and, when it's safe to do so, removes built-in rules that aren't needed any more. The cleaner never deletes rules that you've created.
187
+
-**Justification field**- When requesting access to a virtual machine (VM) through the just-in-time page of the Azure portal, a new optional field is available to enter a justification for the request. Information entered into this field can be tracked in the activity log.
188
+
-**Automatic cleanup of redundant just-in-time (JIT) rules**- Whenever you update a JIT policy, a cleanup tool automatically runs to check the validity of your entire ruleset. The tool looks for mismatches between rules in your policy and rules in the NSG. If the cleanup tool finds a mismatch, it determines the cause and, when it's safe to do so, removes built-in rules that aren't needed anymore. The cleaner never deletes rules that you've created.
183
189
184
190
[Learn more about the JIT access feature](security-center-just-in-time.md).
185
191
@@ -189,22 +195,25 @@ The features, operation, and UI for Azure Security Center’s just-in-time tools
189
195
Two security recommendations related to web applications are being deprecated:
190
196
191
197
- The rules for web applications on IaaS NSGs should be hardened.
192
-
(Related policy — The NSGs rules for web applications on IaaS should be hardened)
198
+
(Related policy: The NSGs rules for web applications on IaaS should be hardened)
193
199
194
200
- Access to App Services should be restricted.
195
-
(Related policy — Access to App Services should be restricted [preview])
201
+
(Related policy: Access to App Services should be restricted [preview])
196
202
197
-
These recommendations will no longer appear in the Security Center list of recommendations and their related policies will no longer be included in the Security Center Default initiative.
203
+
These recommendations will no longer appear in the Security Center list of recommendations. The related policies will no longer be included in the initiative named "Security Center Default".
198
204
199
205
[Learn more about security recommendations](recommendations-reference.md).
200
206
201
207
## February 2020
202
208
203
209
### Fileless attack detection for Linux is now in preview
204
210
205
-
As attackers increasing employ stealthier methods to avoid detection, Azure Security Center is extending fileless attack detection for Linux, in addition to Windows. Fileless attacks exploit software vulnerabilities, inject malicious payloads into benign system processes, and hide in memory. These techniques minimize or eliminate traces of malware on disk and greatly reduce the chances of detection by disk-based malware scanning solutions.
211
+
As attackers increasing employ stealthier methods to avoid detection, Azure Security Center is extending fileless attack detection for Linux, in addition to Windows. Fileless attacks exploit software vulnerabilities, inject malicious payloads into benign system processes, and hide in memory. These techniques:
212
+
213
+
- minimize or eliminate traces of malware on disk
214
+
- greatly reduce the chances of detection by disk-based malware scanning solutions
206
215
207
-
To counter this threat, Azure Security Center released fileless attack detection for Windows in October 2018, and has now extended fileless attack detection on Linux as well.
216
+
To counter this threat, Azure Security Center released fileless attack detection for Windows in October 2018, and has now extended fileless attack detection on Linux as well.
0 commit comments