You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secret-scanning.md
+21-12Lines changed: 21 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,24 +1,24 @@
1
1
---
2
-
title: Manage secrets with agentless secret scanning
2
+
title: Manage secrets with agentless secret scanning (preview)
3
3
description: Learn how to scan your servers for secrets with Defender for Server's agentless secret scanning.
4
4
ms.topic: overview
5
-
ms.date: 07/18/2023
5
+
ms.date: 08/15/2023
6
6
---
7
7
8
-
# Manage secrets with agentless secret scanning
8
+
# Manage secrets with agentless secret scanning (preview)
9
9
10
10
Attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing internet-facing workloads and exploiting exposed credentials and secrets.
11
11
12
12
Defender for Cloud's agentless secret scanning for Virtual Machines (VM) locates plaintext secrets that exist in your environment. If secrets are detected, Defender for Cloud can assist your security team to prioritize and take actionable remediation steps to minimize the risk of lateral movement, all without affecting your machine's performance.
13
13
14
14
By using agentless secret scanning, you can proactively discover the following types of secrets across your environments:
15
15
16
-
-**Insecure SSH private keys** - supports RSA algorithm for PuTTy files, PKCS#8 and PKCS#1 standards
In addition to detecting SSH private keys, the agentless scanner verifies whether they can be used to move laterally in the network. Keys that we didn't successfully verify are categorized as **unverified** in the **Recommendation** pane.
24
24
@@ -68,6 +68,12 @@ Agentless secret scanning for AWS instances supports the following attack path s
68
68
69
69
-`Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server`.
70
70
71
+
### GCP instances supported attack path scenarios
72
+
73
+
Agentless secret scanning for GCP VM instances supports the following attack path scenarios:
74
+
75
+
-`Exposed Vulnerable GCP VM instance has an insecure SSH private key that is used to authenticate to a GCP VM instance`.
76
+
71
77
**To investigate secrets with Attack path**:
72
78
73
79
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -88,6 +94,8 @@ If a secret is found on your resource, that resource triggers an affiliated reco
88
94
89
95
-**AWS resources**: `EC2 instances should have secret findings resolved`
90
96
97
+
-**GCP resources**: `VM instances should have secret findings resolved`
98
+
91
99
**To remediate secrets from the recommendations page**:
92
100
93
101
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -101,6 +109,7 @@ If a secret is found on your resource, that resource triggers an affiliated reco
101
109
-**Azure resources**: `Machines should have secrets findings resolved`
102
110
103
111
-**AWS resources**: `EC2 instances should have secret findings resolved`
112
+
-**GCP resources**: `VM instances should have secret findings resolved`
104
113
105
114
:::image type="content" source="media/secret-scanning/recommendation-findings.png" alt-text="Screenshot that shows either of the two results under the Remediate vulnerabilities security control." lightbox="media/secret-scanning/recommendation-findings.png":::
106
115
@@ -130,9 +139,9 @@ The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-expl
130
139
131
140
1. Select one of the following templates:
132
141
133
-
-**VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access other VMs or EC2s.
134
-
-**VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access storage accounts.
135
-
-**VM with plaintext secret that can authenticate to a SQL database** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access SQL databases.
142
+
-**VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
143
+
-**VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts.
144
+
-**VM with plaintext secret that can authenticate to a SQL database** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access SQL databases.
136
145
137
146
If you don't want to use any of the available templates, you can also [build your own query](how-to-manage-cloud-security-explorer.md) on the cloud security explorer.
0 commit comments