Skip to content

Commit 379b000

Browse files
committed
Acrolinx tweaks
1 parent c59e1e6 commit 379b000

File tree

1 file changed

+30
-21
lines changed

1 file changed

+30
-21
lines changed

articles/security-center/release-notes.md

Lines changed: 30 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure Security is in active development and receives improvements on an ongoing
2323
- Bug fixes
2424
- Deprecated functionality
2525

26-
This page is updated regularly, so revisit it often. If you're looking for items that are older than six months, you can find them in the [Archive for What's new in Azure Security Center](release-notes-archive.md).
26+
This page is updated regularly, so revisit it often. If you're looking for items older than six months, you'll find them in the [Archive for What's new in Azure Security Center](release-notes-archive.md).
2727

2828

2929
## May 2020
@@ -60,7 +60,7 @@ Suppression rules define the criteria for which alerts should be automatically d
6060

6161
One of the security controls introduced with the enhanced secure score was "Implement security best practices". Any custom recommendations created for your subscriptions were automatically placed in that control.
6262

63-
To make it easier to find your custom recommendations, we have moved them into a dedicated security control, "Custom recommendations". This control has no impact on your secure score.
63+
To make it easier to find your custom recommendations, we've moved them into a dedicated security control, "Custom recommendations". This control has no impact on your secure score.
6464

6565
Learn more about security controls in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
6666

@@ -71,22 +71,22 @@ Security controls are logical groups of related security recommendations. They r
7171

7272
To immediately see how well your organization is securing each individual attack surface, review the scores for each security control.
7373

74-
By default, your recommendations are shown in the security controls, but from this update you can display them as a list. To view them as simple list sorted by the health status of the affected resources, use the new toggle 'Group by controls' at the top of the list in the portal.
74+
By default, your recommendations are shown in the security controls. From this update you can also display them as a list. To view them as simple list sorted by the health status of the affected resources, use the new toggle 'Group by controls'. The toggle is above the list in the portal.
7575

7676
Learn more about security controls in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
7777

7878

7979
### Account security recommendations moved to "Security best practices" security control
8080

81-
One of the security controls introduced with the enhanced secure score was "Security best practices".
81+
One of the security controls introduced with the enhanced secure score is "Security best practices".
8282

8383
With this update, three recommendations have moved out of the controls in which they were originally placed, and into this best practices control.
8484

8585
The recommendations are:
8686

87-
- MFA should be enabled on accounts with read permissions on your subscription (this was originally in the "Enable MFA" control)
88-
- External accounts with read permissions should be removed from your subscription (this was originally in the "Manage access and permissions" control)
89-
- A maximum of 3 owners should be designated for your subscription (this was originally in the "Manage access and permissions" control)
87+
- MFA should be enabled on accounts with read permissions on your subscription (originally in the "Enable MFA" control)
88+
- External accounts with read permissions should be removed from your subscription (originally in the "Manage access and permissions" control)
89+
- A maximum of 3 owners should be designated for your subscription (originally in the "Manage access and permissions" control)
9090

9191
Learn more about security controls in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
9292

@@ -97,7 +97,7 @@ Custom policies are now part of the Security Center recommendations experience,
9797

9898
Create a custom initiative in Azure policy, add it as a policy in Azure Security Center, and visualize it as recommendations.
9999

100-
We've now also added the ability to edit the custom recommendation metadata such as severity, remediation steps, threats information, and more.
100+
We've now also added the option to edit the custom recommendation metadata. Metadata options include severity, remediation steps, threats information, and more.
101101

102102
[Learn more about enhancing your custom recommendations with detailed information](custom-security-policies.md#enhancing-your-custom-recommendations-with-detailed-information).
103103

@@ -110,7 +110,13 @@ The Azure Security Center regulatory compliance dashboard now includes **dynamic
110110

111111
Dynamic compliance packages can be added to your subscription or management group from the Security Center security policy page. When you've onboarded a standard or benchmark, the standard appears in your regulatory compliance dashboard with all associated compliance data mapped as assessments. A summary report for any of the standards that have been onboarded will be available to download.
112112

113-
Now, you can add standards such as **NIST SP 800-53 R4**, **SWIFT CSP CSCF-v2020**, **UK Official and UK NHS**, **Canada Federal PBMM**, and **Azure CIS 1.1.0 (new)** (which is a more complete representation of Azure CIS 1.1.0).
113+
Now, you can add standards such as:
114+
115+
- **NIST SP 800-53 R4**
116+
- **SWIFT CSP CSCF-v2020**
117+
- **UK Official and UK NHS**
118+
- **Canada Federal PBMM**
119+
- **Azure CIS 1.1.0 (new)** (which is a more complete representation of Azure CIS 1.1.0)
114120

115121
In addition, we've recently added the **Azure Security Benchmark**, the Microsoft-authored Azure-specific guidelines for security and compliance best practices based on common compliance frameworks. Additional standards will be supported in the dashboard as they become available.
116122

@@ -119,7 +125,7 @@ In addition, we've recently added the **Azure Security Benchmark**, the Microsof
119125

120126
### Identity recommendations now included in Azure Security Center free tier
121127

122-
Security recommendations for identity and access on the Azure Security Center free tier are now generally available. This is part of the effort to make the cloud security posture management (CSPM) features completely free. Until now, these recommendations were only available on the standard pricing tier.
128+
Security recommendations for identity and access on the Azure Security Center free tier are now generally available. This is part of the effort to make the cloud security posture management (CSPM) features free. Until now, these recommendations were only available on the standard pricing tier.
123129

124130
Examples of identity and access recommendations include:
125131

@@ -162,13 +168,13 @@ Learn more about how to [integrate Azure Security Center with Windows Admin Cent
162168

163169
Azure Security Center is expanding its container security features to protect Azure Kubernetes Service (AKS).
164170

165-
The popular, open source platform Kubernetes has been adopted so widely that it’s now an industry standard for container orchestration. Despite this widespread implementation, there’s still a lack of understanding regarding how to secure a Kubernetes environment. Defending the attack surfaces of a containerized application requires expertise to ensuring the infrastructure is configured securely and constantly monitored for potential threats.
171+
The popular, open-source platform Kubernetes has been adopted so widely that it’s now an industry standard for container orchestration. Despite this widespread implementation, there’s still a lack of understanding regarding how to secure a Kubernetes environment. Defending the attack surfaces of a containerized application requires expertise to ensuring the infrastructure is configured securely and constantly monitored for potential threats.
166172

167173
The Security Center defense includes:
168174

169-
- **Discovery and visibility** Continuous discovery of managed AKS instances within the subscriptions registered to Security Center.
170-
- **Security recommendations** Actionable recommendations to help you comply with security best-practices for AKS. These recommendations are included in your secure score to ensure they’re viewed as a part of your organization’s security posture. An example of an AKS-related recommendation you might see is "Role-based access control should be used to restrict access to a Kubernetes service cluster".
171-
- **Threat protection** Through continuous analysis of your AKS deployment, Security Center alerts you to threats and malicious activity detected at the host and AKS cluster level.
175+
- **Discovery and visibility** - Continuous discovery of managed AKS instances within the subscriptions registered to Security Center.
176+
- **Security recommendations** - Actionable recommendations to help you comply with security best-practices for AKS. These recommendations are included in your secure score to ensure they’re viewed as a part of your organization’s security posture. An example of an AKS-related recommendation you might see is "Role-based access control should be used to restrict access to a Kubernetes service cluster".
177+
- **Threat protection** - Through continuous analysis of your AKS deployment, Security Center alerts you to threats and malicious activity detected at the host and AKS cluster level.
172178

173179
[Learn more about Azure Kubernetes Services integration with Security Center](azure-kubernetes-service-integration.md).
174180
[Learn more about the container security features in Security Center](container-security.md).
@@ -178,8 +184,8 @@ The Security Center defense includes:
178184

179185
The features, operation, and UI for Azure Security Center’s just-in-time tools that secure your management ports have been enhanced as follows:
180186

181-
- **Justification field** When requesting access to a virtual machine (VM) through the just-in-time page of the Azure portal, a new optional field is available to enter a justification for the request. Information entered into this field can be tracked in the activity log.
182-
- **Automatic cleanup of redundant just-in-time (JIT) rules** Whenever you update a JIT policy, a cleanup tool automatically runs to check the validity of your entire ruleset. The tool looks for mismatches between rules in your policy and rules in the NSG. If the cleanup tool finds a mismatch, it determines the cause and, when it's safe to do so, removes built-in rules that aren't needed any more. The cleaner never deletes rules that you've created.
187+
- **Justification field** - When requesting access to a virtual machine (VM) through the just-in-time page of the Azure portal, a new optional field is available to enter a justification for the request. Information entered into this field can be tracked in the activity log.
188+
- **Automatic cleanup of redundant just-in-time (JIT) rules** - Whenever you update a JIT policy, a cleanup tool automatically runs to check the validity of your entire ruleset. The tool looks for mismatches between rules in your policy and rules in the NSG. If the cleanup tool finds a mismatch, it determines the cause and, when it's safe to do so, removes built-in rules that aren't needed anymore. The cleaner never deletes rules that you've created.
183189

184190
[Learn more about the JIT access feature](security-center-just-in-time.md).
185191

@@ -189,22 +195,25 @@ The features, operation, and UI for Azure Security Center’s just-in-time tools
189195
Two security recommendations related to web applications are being deprecated:
190196

191197
- The rules for web applications on IaaS NSGs should be hardened.
192-
(Related policy The NSGs rules for web applications on IaaS should be hardened)
198+
(Related policy: The NSGs rules for web applications on IaaS should be hardened)
193199

194200
- Access to App Services should be restricted.
195-
(Related policy Access to App Services should be restricted [preview])
201+
(Related policy: Access to App Services should be restricted [preview])
196202

197-
These recommendations will no longer appear in the Security Center list of recommendations and their related policies will no longer be included in the Security Center Default initiative.
203+
These recommendations will no longer appear in the Security Center list of recommendations. The related policies will no longer be included in the initiative named "Security Center Default".
198204

199205
[Learn more about security recommendations](recommendations-reference.md).
200206

201207
## February 2020
202208

203209
### Fileless attack detection for Linux is now in preview
204210

205-
As attackers increasing employ stealthier methods to avoid detection, Azure Security Center is extending fileless attack detection for Linux, in addition to Windows. Fileless attacks exploit software vulnerabilities, inject malicious payloads into benign system processes, and hide in memory. These techniques minimize or eliminate traces of malware on disk and greatly reduce the chances of detection by disk-based malware scanning solutions.
211+
As attackers increasing employ stealthier methods to avoid detection, Azure Security Center is extending fileless attack detection for Linux, in addition to Windows. Fileless attacks exploit software vulnerabilities, inject malicious payloads into benign system processes, and hide in memory. These techniques:
212+
213+
- minimize or eliminate traces of malware on disk
214+
- greatly reduce the chances of detection by disk-based malware scanning solutions
206215

207-
To counter this threat, Azure Security Center released fileless attack detection for Windows in October 2018, and has now extended fileless attack detection on Linux as well.
216+
To counter this threat, Azure Security Center released fileless attack detection for Windows in October 2018, and has now extended fileless attack detection on Linux as well.
208217

209218

210219
## January 2020

0 commit comments

Comments
 (0)