Skip to content

Commit 4ad1406

Browse files
Merge pull request #270137 from dcurwin/wi-213240-risk-prioritization-containers-march25-2024
Wi 213240 risk prioritization containers
2 parents af668c4 + dd1d799 commit 4ad1406

File tree

76 files changed

+597
-291
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+597
-291
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -945,6 +945,16 @@
945945
"redirect_url": "/azure/defender-for-cloud/create-custom-recommendations",
946946
"redirect_document_id": false
947947
},
948+
{
949+
"source_path_from_root": "/articles/defender-for-cloud/view-and-remediate-vulnerabilities-for-images.md",
950+
"redirect_url": "/azure/defender-for-cloud/view-and-remediate-vulnerabilities-containers",
951+
"redirect_document_id": false
952+
},
953+
{
954+
"source_path_from_root": "/articles/defender-for-cloud/view-and-remediate-vulnerability-assessment-findings.md",
955+
"redirect_url": "/azure/defender-for-cloud/view-and-remediate-vulnerability-registry-images",
956+
"redirect_document_id": false
957+
},
948958
{
949959
"source_path_from_root": "/articles/defender-for-cloud/how-to-migrate-to-built-in.md",
950960
"redirect_url": "/azure/defender-for-cloud/how-to-transition-to-built-in",

articles/defender-for-cloud/TOC.yml

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -305,8 +305,6 @@
305305
- name: Integrate security solutions
306306
displayName: security, solutions, integrate, integrated, data sources
307307
href: partner-integration.md
308-
- name: Enable Permissions Management
309-
href: enable-permissions-management.md
310308
- name: Data-aware security posture
311309
items:
312310
- name: Enable data-aware security posture
@@ -341,7 +339,7 @@
341339
displayName: security, recommendations, owner, azure, resource, graph, azure
342340
resource graph, csv report
343341
href: review-security-recommendations.md
344-
- name: Review exempted resources
342+
- name: Review resources exempted from recommendations
345343
href: review-exemptions.md
346344
- name: Remediate recommendations
347345
displayName: remediation, steps, recommendations, fix, actions, activity log
@@ -363,6 +361,9 @@
363361
- name: Identify and remediate attack paths
364362
displayName: attack paths, paths, investigate, easm,
365363
href: how-to-manage-attack-path.md
364+
- name: Retrieve attack path data with API
365+
displayName: attack paths, paths, investigate, easm, rest api
366+
href: attack-path-api.md
366367
- name: Build queries with cloud security explorer
367368
displayName: queries, security explorer, explorer, templates, query
368369
href: how-to-manage-cloud-security-explorer.md
@@ -650,13 +651,19 @@
650651
href: agentless-vulnerability-assessment-gcp.md
651652
- name: Enable vulnerability assessments
652653
href: enable-vulnerability-assessment.md
653-
- name: View and remediate vulnerabilities for registry images
654-
href: view-and-remediate-vulnerability-assessment-findings.md
655-
- name: View and remediate vulnerabilities for running images
656-
href: view-and-remediate-vulnerabilities-for-images.md
657-
- name: Disable vulnerabilities on images
654+
- name: View and remediate vulnerabilities for registry images (Risk based)
655+
href: view-and-remediate-vulnerability-registry-images.md
656+
- name: View and remediate vulnerabilities for running containers (Risk based)
657+
href: view-and-remediate-vulnerabilities-containers.md
658+
- name: Disable vulnerabilities on images (Risk based)
658659
href: disable-vulnerability-findings-containers.md
659-
- name: REST API
660+
- name: View and remediate vulnerabilities for registry images (Secure score)
661+
href: view-and-remediate-vulnerability-assessment-findings-secure-score.md
662+
- name: View and remediate vulnerabilities for running images (Secure score)
663+
href: view-and-remediate-vulnerabilities-for-images-secure-score.md
664+
- name: Disable vulnerabilities on images (Secure score)
665+
href: disable-vulnerability-findings-containers-secure-score.md
666+
- name: REST API (Secure score)
660667
href: subassessment-rest-api.md
661668
- name: Transition to Defender Vulnerability Management
662669
href: transition-to-defender-vulnerability-management.md

articles/defender-for-cloud/agentless-vulnerability-assessment-aws.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,19 @@ Container vulnerability assessment powered by Microsoft Defender Vulnerability M
2626

2727
- **Reporting** - Container Vulnerability Assessment for AWS powered by Microsoft Defender Vulnerability Management provides vulnerability reports using following recommendations:
2828

29-
| Recommendation | Description | Assessment Key|
30-
|--|--|--|
31-
| [AWS registry container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/AwsContainerRegistryRecommendationDetailsBlade/assessmentKey/c27441ae-775c-45be-8ffa-655de37362ce) | Scans your AWS registries container images for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c27441ae-775c-45be-8ffa-655de37362ce |
32-
| [AWS running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/AwsContainersRuntimeRecommendationDetailsBlade/assessmentKey/682b2595-d045-4cff-b5aa-46624eb2dd8f)| Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Elastic Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | 682b2595-d045-4cff-b5aa-46624eb2dd8f |
29+
These are the new recommendations that report on runtime container vulnerabilities and registry image vulnerabilities. They are currently in preview, but are intended to replace the old recommendations. These new recommendations do not count toward secure score while in preview. The scan engine for both sets of recommendations is the same.
30+
31+
| Recommendation | Description | Assessment Key|
32+
|--|--|--|
33+
| [[Preview] Container images in AWS registry should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/2a139383-ec7e-462a-90ac-b1b60e87d576) | Defender for Cloud scans your registry images for known vulnerabilities (CVEs) and provides detailed findings for each scanned image. Scanning and remediating vulnerabilities for container images in the registry helps maintain a secure and reliable software supply chain, reduces the risk of security incidents, and ensures compliance with industry standards. | 2a139383-ec7e-462a-90ac-b1b60e87d576 |
34+
| [[Preview] Containers running in AWS should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/d5d1e526-363a-4223-b860-f4b6e710859f)| Defender for Cloud creates an inventory of all container workloads currently running in your Kubernetes clusters and provides vulnerability reports for those workloads by matching the images being used and the vulnerability reports created for the registry images. Scanning and remediating vulnerabilities of container workloads is critical to ensure a robust and secure software supply chain, reduce the risk of security incidents, and ensures compliance with industry standards. | d5d1e526-363a-4223-b860-f4b6e710859f |
35+
36+
These are the older recommendations that are currently on a retirement path:
37+
38+
| Recommendation | Description | Assessment Key|
39+
|--|--|--|
40+
| [AWS registry container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/AwsContainerRegistryRecommendationDetailsBlade/assessmentKey/c27441ae-775c-45be-8ffa-655de37362ce) | Scans your AWS registries container images for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c27441ae-775c-45be-8ffa-655de37362ce |
41+
| [AWS running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/AwsContainersRuntimeRecommendationDetailsBlade/assessmentKey/682b2595-d045-4cff-b5aa-46624eb2dd8f)| Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Elastic Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | 682b2595-d045-4cff-b5aa-46624eb2dd8f |
3342

3443
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](../governance/resource-graph/overview.md#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via ARG](review-security-recommendations.md).
3544

@@ -59,8 +68,8 @@ A detailed description of the scan process is described as follows:
5968

6069
- All newly discovered images are pulled, and an inventory is created for each image. Image inventory is kept to avoid further image pulls, unless required by new scanner capabilities.​
6170
- Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [Agentless discovery for Kubernetes](defender-for-containers-enable.md#enablement-method-per-capability) and [inventory collected via the Defender sensor running on EKS nodes](defender-for-containers-enable.md#enablement-method-per-capability)
62-
- Vulnerability reports for registry container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/AwsContainerRegistryRecommendationDetailsBlade/assessmentKey/c27441ae-775c-45be-8ffa-655de37362ce).
63-
- For customers using either [Agentless discovery for Kubernetes](defender-for-containers-enable.md#enablement-method-per-capability) or [inventory collected via the Defender sensor running on EKS nodes](defender-for-containers-enable.md#enablement-method-per-capability), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an EKS cluster. For customers using only [Agentless discovery for Kubernetes](defender-for-containers-enable.md#enablement-method-per-capability), the refresh time for inventory in this recommendation is once every seven hours. Clusters that are also running the [Defender sensor](defender-for-containers-enable.md#enablement-method-per-capability) benefit from a two hour inventory refresh rate. Image scan results are updated based on registry scan in both cases, and are therefore only refreshed every 24 hours.
71+
- Vulnerability reports for registry container images are provided as a [recommendation](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/2a139383-ec7e-462a-90ac-b1b60e87d576).
72+
- For customers using either [Agentless discovery for Kubernetes](defender-for-containers-enable.md#enablement-method-per-capability) or [inventory collected via the Defender sensor running on EKS nodes](defender-for-containers-enable.md#enablement-method-per-capability), Defender for Cloud also creates a [recommendation](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/d5d1e526-363a-4223-b860-f4b6e710859f) for remediating vulnerabilities for vulnerable images running on an EKS cluster. For customers using only [Agentless discovery for Kubernetes](defender-for-containers-enable.md#enablement-method-per-capability), the refresh time for inventory in this recommendation is once every seven hours. Clusters that are also running the [Defender sensor](defender-for-containers-enable.md#enablement-method-per-capability) benefit from a two hour inventory refresh rate. Image scan results are updated based on registry scan in both cases, and are therefore only refreshed every 24 hours.
6473

6574
> [!NOTE]
6675
> For [Defender for Container Registries (deprecated)](defender-for-container-registries-introduction.md), images are scanned once on push, on pull, and rescanned only once a week.

0 commit comments

Comments
 (0)