|
| 1 | +--- |
| 2 | +title: Agentless Container Posture for Microsoft Defender for Cloud |
| 3 | +description: Learn how Agentless Container Posture offers discovery and visibility for Containers without installing an agent on your machines. |
| 4 | +ms.service: defender-for-cloud |
| 5 | +ms.topic: conceptual |
| 6 | +ms.date: 04/16/2023 |
| 7 | +ms.custom: template-concept |
| 8 | +--- |
| 9 | + |
| 10 | +# Agentless Container Posture (Preview) |
| 11 | + |
| 12 | +You can identify security risks that exist in containers and Kubernetes realms with the agentless discovery and visibility capability across SDLC and runtime. |
| 13 | + |
| 14 | +You can maximize the coverage of your container posture issues and extend your protection beyond the reach of agent-based assessments to provide a holistic approach to your posture improvement. This includes, for example, container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis. |
| 15 | + |
| 16 | +Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md). |
| 17 | + |
| 18 | +> [!IMPORTANT] |
| 19 | +> The Agentless Container Posture preview features are available on a self-service, opt-in basis. Previews are provided "as is" and "as available" and are excluded from the service-level agreements and limited warranty. Agentless Container Posture previews are partially covered by customer support on a best-effort basis. As such, these features aren't meant for production use. |
| 20 | +
|
| 21 | +## Capabilities |
| 22 | + |
| 23 | +Agentless Container Posture provides the following capabilities: |
| 24 | + |
| 25 | +- Using Kubernetes Attack Path analysis to visualize risks and threats to Kubernetes environments. |
| 26 | +- Using Cloud Security Explorer for risk hunting by querying various risk scenarios. |
| 27 | +- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, search for `Kubernetes` in the [list of Insights](attack-path-reference.md#insights). |
| 28 | +- Agentless discovery and visibility within Kubernetes components. |
| 29 | +- Agentless container registry vulnerability assessment, using the image scanning results of your Azure Container Registry (ACR) with Cloud Security Explorer. |
| 30 | + |
| 31 | + [Vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) for Containers in Defender Cloud Security Posture Management (CSPM) gives you frictionless, wide, and instant visibility on actionable posture issues without the need for installed agents, network connectivity requirements, or container performance impact. |
| 32 | + |
| 33 | +All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan. |
| 34 | + |
| 35 | +## Availability |
| 36 | + |
| 37 | +| Aspect | Details | |
| 38 | +|---------|---------| |
| 39 | +|Release state:|Preview| |
| 40 | +|Pricing:|Requires [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) and is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/) | |
| 41 | +| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Commercial clouds<br> :::image type="icon" source="./media/icons/no-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure China 21Vianet<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected AWS accounts<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected GCP accounts | |
| 42 | +| Permissions | You need to have access as a Subscription Owner, or, User Access Admin as well as Security Admin permissions for the Azure subscription used for onboarding | |
| 43 | + |
| 44 | +## Prerequisites |
| 45 | + |
| 46 | +You need to have a Defender for CSPM plan enabled. There's no dependency on Defender for Containers. |
| 47 | + |
| 48 | +This feature uses trusted access. Learn more about [AKS trusted access prerequisites](/azure/aks/trusted-access-feature#prerequisites). |
| 49 | + |
| 50 | +## Onboard Agentless Containers for CSPM |
| 51 | + |
| 52 | +Onboarding Agentless Containers for CSPM will allow you to gain wide visibility into Kubernetes and containers registries across SDLC and runtime. |
| 53 | + |
| 54 | +**To onboard Agentless Containers for CSPM:** |
| 55 | + |
| 56 | +1. In the Azure portal, navigate to the Defender for Cloud's **Environment Settings** page. |
| 57 | + |
| 58 | +1. Select the subscription that's onboarded to the Defender CSPM plan, then select **Settings**. |
| 59 | + |
| 60 | +1. Ensure the **Agentless discovery for Kubernetes** and **Container registries vulnerability assessments** extensions are toggled to **On**. |
| 61 | + |
| 62 | +1. Select **Continue**. |
| 63 | + |
| 64 | + :::image type="content" source="media/concept-agentless-containers/settings-continue.png" alt-text="Screenshot of selecting agentless discovery for Kubernetes and Container registries vulnerability assessments." lightbox="media/concept-agentless-containers/settings-continue.png"::: |
| 65 | + |
| 66 | +1. Select **Save**. |
| 67 | + |
| 68 | +A notification message pops up in the top right corner that will verify that the settings were saved successfully. |
| 69 | + |
| 70 | +## Agentless Container Posture extensions |
| 71 | + |
| 72 | +### Container registries vulnerability assessments |
| 73 | + |
| 74 | +For container registries vulnerability assessments, recommendations are available based on the vulnerability assessment timeline. |
| 75 | + |
| 76 | +Learn more about [image scanning](defender-for-containers-vulnerability-assessment-azure.md). |
| 77 | + |
| 78 | +### Agentless discovery for Kubernetes |
| 79 | + |
| 80 | +The system’s architecture is based on a snapshot mechanism at intervals. |
| 81 | + |
| 82 | +:::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png"::: |
| 83 | + |
| 84 | +By enabling the Agentless discovery for Kubernetes extension, the following process occurs: |
| 85 | + |
| 86 | +- **Create**: MDC (Microsoft Defender for Cloud) creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator. |
| 87 | + |
| 88 | +- **Assign**: MDC assigns 1 built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope. |
| 89 | + |
| 90 | + The role contains the following permissions: |
| 91 | + - AKS read (Microsoft.ContainerService/managedClusters/read) |
| 92 | + - AKS Trusted Access with the following permissions: |
| 93 | + - Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write |
| 94 | + - Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read |
| 95 | + - Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete |
| 96 | + |
| 97 | + Learn more about [AKS Trusted Access](/azure/aks/trusted-access-feature). |
| 98 | + |
| 99 | +- **Discover**: Using the system assigned identity, MDC performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS. |
| 100 | + |
| 101 | +- **Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster. |
| 102 | + |
| 103 | +### Refresh intervals |
| 104 | + |
| 105 | +Agentless information in Defender CSPM is updated once an hour through a snapshot mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path. |
| 106 | + |
| 107 | +## FAQs |
| 108 | + |
| 109 | +### Why don't I see results from my clusters? |
| 110 | + |
| 111 | +If you don't see results from your clusters, check the following: |
| 112 | + |
| 113 | +- Do you have [stopped clusters](#what-do-i-do-if-i-have-stopped-clusters)? |
| 114 | +- Are your clusters [Read only (locked)](#what-do-i-do-if-i-have-read-only-clusters-locked)? |
| 115 | + |
| 116 | +### What do I do if I have stopped clusters? |
| 117 | + |
| 118 | +We suggest that you rerun the cluster to solve this issue. |
| 119 | + |
| 120 | +### What do I do if I have Read only clusters (locked)? |
| 121 | + |
| 122 | +We suggest that you do one of the following: |
| 123 | + |
| 124 | +- Remove the lock. |
| 125 | +- Perform the bind operation manually by doing an API request. |
| 126 | + |
| 127 | +Learn more about [locked resources](/azure/azure-resource-manager/management/lock-resources?tabs=json). |
| 128 | + |
| 129 | +## Next steps |
| 130 | + |
| 131 | +Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md). |
0 commit comments