Skip to content

Commit 3b974cd

Browse files
authored
Capitalization in attack paths reference page
Fixed unnecessary capitalizations in the table headings. | Attack Path Display Name | Attack Path Description | --> | Attack path display name | Attack path description | ------- cc: @ElazarK
1 parent 6ebfa6c commit 3b974cd

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/defender-for-cloud/attack-path-reference.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 04/13/2023
99

1010
# Reference list of attack paths and cloud security graph components
1111

12-
This article lists the attack paths, connections, and insights used in Defender for Cloud Security Posture Management (CSPM).
12+
This article lists the attack paths, connections, and insights used in Defender Cloud Security Posture Management (CSPM).
1313

1414
- You need to [enable Defender CSPM](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features) to view attack paths.
1515
- What you see in your environment depends on the resources you're protecting, and your customized configuration.
@@ -22,7 +22,7 @@ Learn more about [the cloud security graph, attack path analysis, and the cloud
2222

2323
Prerequisite: For a list of prerequisites, see the [Availability table](how-to-manage-attack-path.md#availability) for attack paths.
2424

25-
| Attack Path Display Name | Attack Path Description |
25+
| Attack path display name | Attack path description |
2626
|--|--|
2727
| Internet exposed VM has high severity vulnerabilities | A virtual machine is reachable from the internet and has high severity vulnerabilities. |
2828
| Internet exposed VM has high severity vulnerabilities and high permission to a subscription | A virtual machine is reachable from the internet, has high severity vulnerabilities, and identity and permission to a subscription. |
@@ -34,11 +34,11 @@ Prerequisite: For a list of prerequisites, see the [Availability table](how-to-m
3434
| VM has high severity vulnerabilities and read permission to a key vault | A virtual machine has high severity vulnerabilities and read permission to a key vault. |
3535
| VM has high severity vulnerabilities and read permission to a data store | A virtual machine has high severity vulnerabilities and read permission to a data store. |
3636

37-
### AWS Instances
37+
### AWS EC2 instances
3838

3939
Prerequisite: [Enable agentless scanning](enable-vulnerability-assessment-agentless.md).
4040

41-
| Attack Path Display Name | Attack Path Description |
41+
| Attack path display name | Attack path description |
4242
|--|--|
4343
| Internet exposed EC2 instance has high severity vulnerabilities and high permission to an account | An AWS EC2 instance is reachable from the internet, has high severity vulnerabilities and has permission to an account. |
4444
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to a DB | An AWS EC2 instance is reachable from the internet, has high severity vulnerabilities and has permission to a database. |
@@ -53,7 +53,7 @@ Prerequisite: [Enable agentless scanning](enable-vulnerability-assessment-agentl
5353

5454
### Azure data
5555

56-
| Attack Path Display Name | Attack Path Description |
56+
| Attack path display name | Attack path description |
5757
|--|--|
5858
| Internet exposed SQL on VM has a user account with commonly used username and allows code execution on the VM (Preview) | SQL on VM is reachable from the internet, has a local user account with a commonly used username (which is prone to brute force attacks), and has vulnerabilities allowing code execution and lateral movement to the underlying VM. <br/> Prerequisite: [Enable Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md) |
5959
| Internet exposed SQL on VM has a user account with commonly used username and known vulnerabilities (Preview) | SQL on VM is reachable from the internet, has a local user account with a commonly used username (which is prone to brute force attacks), and has known vulnerabilities (CVEs). <br/> Prerequisite: [Enable Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md) |
@@ -66,7 +66,7 @@ Prerequisite: [Enable agentless scanning](enable-vulnerability-assessment-agentl
6666

6767
### AWS data
6868

69-
| Attack Path Display Name | Attack Path Description |
69+
| Attack path display name | Attack path description |
7070
|--|--|
7171
| Internet exposed AWS S3 Bucket with sensitive data is publicly accessible (Preview) | An S3 bucket with sensitive data is reachable from the internet and allows public read access without authorization required. <br/> Prerequisite: [Enable data-aware security for S3 buckets in Defender CSPM](data-security-posture-enable.md), or [leverage Microsoft Purview Data Catalog to protect sensitive data](information-protection.md). |
7272
|Internet exposed SQL on EC2 instance has a user account with commonly used username and allows code execution on the underlying compute (Preview) | Internet exposed SQL on EC2 instance has a user account with commonly used username and allows code execution on the underlying compute. <br/> Prerequisite: [Enable Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md). |
@@ -90,7 +90,7 @@ Prerequisite: [Enable agentless scanning](enable-vulnerability-assessment-agentl
9090

9191
Prerequisite: [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer.
9292

93-
| Attack Path Display Name | Attack Path Description |
93+
| Attack path display name | Attack path description |
9494
|--|--|
9595
| Internet exposed Kubernetes pod is running a container with RCE vulnerabilities | An internet exposed Kubernetes pod in a namespace is running a container using an image that has vulnerabilities allowing remote code execution. |
9696
| Kubernetes pod running on an internet exposed node uses host network is running a container with RCE vulnerabilities | A Kubernetes pod in a namespace with host network access enabled is exposed to the internet via the host network. The pod is running a container using an image that has vulnerabilities allowing remote code execution. |
@@ -99,13 +99,13 @@ Prerequisite: [Enable Defender for Containers](defender-for-containers-enable.md
9999

100100
Prerequisite: [Enable Defender for DevOps](defender-for-devops-introduction.md).
101101

102-
| Attack Path Display Name | Attack Path Description |
102+
| Attack path display name | Attack path description |
103103
|--|--|
104104
| Internet exposed GitHub repository with plaintext secret is publicly accessible (Preview) | A GitHub repository is reachable from the internet, allows public read access without authorization required, and holds plaintext secrets. |
105105

106106
## Cloud security graph components list
107107

108-
This section lists all of the cloud security graph components (connections and insights) that can be used in queries with the [cloud security explorer](concept-attack-path.md).
108+
This section lists all of the cloud security graph components (connections and insights) that can be used in queries with the [cloud security explorer](concept-attack-path.md).
109109

110110
### Insights
111111

0 commit comments

Comments
 (0)