Skip to content

Commit 3e8a257

Browse files
Merge pull request #248291 from dcurwin/update-secret-scanning-aug15-2023
Add GCP to secrets scanning doc
2 parents 1079c97 + 978fa14 commit 3e8a257

File tree

1 file changed

+21
-12
lines changed

1 file changed

+21
-12
lines changed

articles/defender-for-cloud/secret-scanning.md

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
title: Manage secrets with agentless secret scanning
2+
title: Manage secrets with agentless secret scanning (preview)
33
description: Learn how to scan your servers for secrets with Defender for Server's agentless secret scanning.
44
ms.topic: overview
5-
ms.date: 07/18/2023
5+
ms.date: 08/15/2023
66
---
77

8-
# Manage secrets with agentless secret scanning
8+
# Manage secrets with agentless secret scanning (preview)
99

1010
Attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing internet-facing workloads and exploiting exposed credentials and secrets.
1111

1212
Defender for Cloud's agentless secret scanning for Virtual Machines (VM) locates plaintext secrets that exist in your environment. If secrets are detected, Defender for Cloud can assist your security team to prioritize and take actionable remediation steps to minimize the risk of lateral movement, all without affecting your machine's performance.
1313

1414
By using agentless secret scanning, you can proactively discover the following types of secrets across your environments:
1515

16-
- **Insecure SSH private keys** - supports RSA algorithm for PuTTy files, PKCS#8 and PKCS#1 standards
17-
- **Plaintext Azure SQL connection strings** - supports SQL PAAS
18-
- **Plaintext Azure storage account connection strings**
19-
- **Plaintext Azure storage account SAS tokens**
20-
- **Plaintext AWS access keys**
21-
- **Plaintext AWS RDS SQL connection string** -supports SQL PAAS
16+
- **Insecure SSH private keys (Azure, AWS, GCP)** - supports RSA algorithm for PuTTy files, PKCS#8 and PKCS#1 standards
17+
- **Plaintext Azure SQL connection strings (Azure, AWS)** - supports SQL PAAS
18+
- **Plaintext Azure storage account connection strings (Azure, AWS)**
19+
- **Plaintext Azure storage account SAS tokens (Azure, AWS)**
20+
- **Plaintext AWS access keys (Azure, AWS)**
21+
- **Plaintext AWS RDS SQL connection string (Azure, AWS)** -supports SQL PAAS
2222

2323
In addition to detecting SSH private keys, the agentless scanner verifies whether they can be used to move laterally in the network. Keys that we didn't successfully verify are categorized as **unverified** in the **Recommendation** pane.
2424

@@ -68,6 +68,12 @@ Agentless secret scanning for AWS instances supports the following attack path s
6868

6969
- `Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server`.
7070

71+
### GCP instances supported attack path scenarios
72+
73+
Agentless secret scanning for GCP VM instances supports the following attack path scenarios:
74+
75+
- `Exposed Vulnerable GCP VM instance has an insecure SSH private key that is used to authenticate to a GCP VM instance`.
76+
7177
**To investigate secrets with Attack path**:
7278

7379
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -88,6 +94,8 @@ If a secret is found on your resource, that resource triggers an affiliated reco
8894

8995
- **AWS resources**: `EC2 instances should have secret findings resolved`
9096

97+
- **GCP resources**: `VM instances should have secret findings resolved`
98+
9199
**To remediate secrets from the recommendations page**:
92100

93101
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -101,6 +109,7 @@ If a secret is found on your resource, that resource triggers an affiliated reco
101109
- **Azure resources**: `Machines should have secrets findings resolved`
102110

103111
- **AWS resources**: `EC2 instances should have secret findings resolved`
112+
- **GCP resources**: `VM instances should have secret findings resolved`
104113

105114
:::image type="content" source="media/secret-scanning/recommendation-findings.png" alt-text="Screenshot that shows either of the two results under the Remediate vulnerabilities security control." lightbox="media/secret-scanning/recommendation-findings.png":::
106115

@@ -130,9 +139,9 @@ The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-expl
130139

131140
1. Select one of the following templates:
132141

133-
- **VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access other VMs or EC2s.
134-
- **VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access storage accounts.
135-
- **VM with plaintext secret that can authenticate to a SQL database** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access SQL databases.
142+
- **VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
143+
- **VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts.
144+
- **VM with plaintext secret that can authenticate to a SQL database** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access SQL databases.
136145

137146
If you don't want to use any of the available templates, you can also [build your own query](how-to-manage-cloud-security-explorer.md) on the cloud security explorer.
138147

0 commit comments

Comments
 (0)