Skip to content

Commit 489f50b

Browse files
Merge pull request #236634 from dcurwin/keyvault-alert-may2-2023
Key Vault alert
2 parents cbc6f9b + 7e7c834 commit 489f50b

File tree

2 files changed

+17
-6
lines changed

2 files changed

+17
-6
lines changed

articles/defender-for-cloud/alerts-reference.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Reference table for all security alerts in Microsoft Defender for Cloud
33
description: This article lists the security alerts visible in Microsoft Defender for Cloud
44
ms.topic: reference
5-
ms.date: 04/20/2023
5+
ms.date: 05/08/2023
66
---
77

88
# Security alerts - a reference guide
@@ -531,6 +531,7 @@ Microsoft Defender for Containers provides security alerts on the cluster level
531531
| **Unusual user-application pair accessed a key vault**<br>(KV_UserAppAnomaly) | A key vault has been accessed by a user-service principal pair that doesn't normally access it. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to the key vault in an attempt to access the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
532532
| **User accessed high volume of key vaults**<br>(KV_AccountVolumeAnomaly) | A user or service principal has accessed an anomalously high volume of key vaults. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to multiple key vaults in an attempt to access the secrets contained within them. We recommend further investigations. | Credential Access | Medium |
533533
| **Denied access from a suspicious IP to a key vault**<br>(KV_SuspiciousIPAccessDenied) | An unsuccessful key vault access has been attempted by an IP that has been identified by Microsoft Threat Intelligence as a suspicious IP address. Though this attempt was unsuccessful, it indicates that your infrastructure might have been compromised. We recommend further investigations. | Credential Access | Low |
534+
| **Unusual access to the key vault from a suspicious IP (Non-Microsoft or External)**<br>(KV_UnusualAccessSuspiciousIP) | A user or service principal has attempted anomalous access to key vaults from a non-Microsoft IP in the last 24 hours. This anomalous access pattern may be legitimate activity. It could be an indication of a possible attempt to gain access of the key vault and the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
534535

535536

536537
## <a name="alerts-azureddos"></a>Alerts for Azure DDoS Protection
@@ -581,7 +582,7 @@ Defender for Cloud's supported kill chain intents are based on [version 9 of the
581582
| **Command and Control** | V7, V9 | The command and control tactic represents how adversaries communicate with systems under their control within a target network. |
582583
| **Exfiltration** | V7, V9 | Exfiltration refers to techniques and attributes that result or aid in the adversary removing files and information from a target network. This category also covers locations on a system or network where the adversary may look for information to exfiltrate. |
583584
| **Impact** | V7, V9 | Impact events primarily try to directly reduce the availability or integrity of a system, service, or network; including manipulation of data to impact a business or operational process. This would often refer to techniques such as ransomware, defacement, data manipulation, and others.
584-
585+
585586
> [!NOTE]
586587
> For alerts that are in preview: [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]
587588

articles/defender-for-cloud/release-notes.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud
44
ms.topic: overview
5-
ms.date: 05/09/2023
5+
ms.date: 05/14/2023
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -20,6 +20,7 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
2020

2121
Updates in May include:
2222

23+
- [New alert in Defender for Key Vault](#new-alert-in-defender-for-key-vault)
2324
- [Agentless scanning now supports encrypted disks in AWS](#agentless-scanning-now-supports-encrypted-disks-in-aws)
2425
- [Revised JIT (Just-In-Time) rule naming conventions in Defender for Cloud](#revised-jit-just-in-time-rule-naming-conventions-in-defender-for-cloud)
2526
- [Onboard selected AWS regions](#onboard-selected-aws-regions)
@@ -28,6 +29,16 @@ Updates in May include:
2829
- [Two Defender for DevOps recommendations now include Azure DevOps scan findings](#two-defender-for-devops-recommendations-now-include-azure-devops-scan-findings)
2930
- [New default setting for Defender for Servers vulnerability assessment solution](#new-default-setting-for-defender-for-servers-vulnerability-assessment-solution)
3031

32+
### New alert in Defender for Key Vault
33+
34+
Defender for Key Vault has the following new alert:
35+
36+
| Alert (alert type) | Description | MITRE tactics | Severity |
37+
|---|---|:-:|---|
38+
| **Unusual access to the key vault from a suspicious IP (Non-Microsoft or External)**<br>(KV_UnusualAccessSuspiciousIP) | A user or service principal has attempted anomalous access to key vaults from a non-Microsoft IP in the last 24 hours. This anomalous access pattern may be legitimate activity. It could be an indication of a possible attempt to gain access of the key vault and the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
39+
40+
For all of the available alerts, see [Alerts for Azure Key Vault](alerts-reference.md#alerts-azurekv).
41+
3142
### Agentless scanning now supports encrypted disks in AWS
3243

3344
Agentless scanning for VMs now supports processing of instances with encrypted disks in AWS, using both CMK and PMK.
@@ -112,8 +123,8 @@ We recommend updating your custom scripts, workflows, and governance rules to co
112123

113124
### Deprecation of legacy standards in compliance dashboard
114125

115-
Legacy PCI DSS v3.2.1 and legacy SOC TSP have been fully deprecated in the Defender for Cloud compliance dashboard, and replaced by [SOC 2 Type 2](https://learn.microsoft.com/azure/compliance/offerings/offering-soc-2) initiative and [PCI DSS v4](https://learn.microsoft.com/azure/compliance/offerings/offering-pci-dss) initiative-based compliance standards.
116-
We have fully deprecated support of [PCI DSS](https://learn.microsoft.com/azure/compliance/offerings/offering-pci-dss) standard/initiative in Azure China 21Vianet.
126+
Legacy PCI DSS v3.2.1 and legacy SOC TSP have been fully deprecated in the Defender for Cloud compliance dashboard, and replaced by [SOC 2 Type 2](/azure/compliance/offerings/offering-soc-2) initiative and [PCI DSS v4](/azure/compliance/offerings/offering-pci-dss) initiative-based compliance standards.
127+
We have fully deprecated support of [PCI DSS](/azure/compliance/offerings/offering-pci-dss) standard/initiative in Azure China 21Vianet.
117128

118129
Learn how to [customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
119130

@@ -140,7 +151,6 @@ If a subscription has a VA solution enabled on any of it's VMs, no changes will
140151
Learn how to [Find vulnerabilities and collect software inventory with agentless scanning (Preview)](enable-vulnerability-assessment-agentless.md).
141152

142153
## April 2023
143-
144154
Updates in April include:
145155

146156
- [Agentless Container Posture in Defender CSPM (Preview)](#agentless-container-posture-in-defender-cspm-preview)

0 commit comments

Comments
 (0)