Skip to content

Commit 511e9a1

Browse files
authored
Merge pull request #233299 from Shereen-Bhar/patch-36
update AWS encryption support and snapshot cost
2 parents 19982c9 + 796864e commit 511e9a1

File tree

1 file changed

+50
-13
lines changed

1 file changed

+50
-13
lines changed

articles/defender-for-cloud/concept-agentless-data-collection.md

Lines changed: 50 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Agentless scanning for VMs provides vulnerability assessment and software invent
2525
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Commercial clouds<br> :::image type="icon" source="./media/icons/no-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure China 21Vianet<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected GCP accounts |
2626
| Operating systems: | :::image type="icon" source="./media/icons/yes-icon.png"::: Windows<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Linux |
2727
| Instance types: | **Azure**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Standard VMs<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Virtual machine scale set - Flex<br>:::image type="icon" source="./media/icons/no-icon.png"::: Virtual machine scale set - Uniform<br><br>**AWS**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: EC2<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Auto Scale instances<br>:::image type="icon" source="./media/icons/no-icon.png"::: Instances with a ProductCode (Paid AMIs) |
28-
| Encryption: | **Azure**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Unencrypted<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Encrypted – managed disks using [Azure Storage encryption](../virtual-machines/disk-encryption.md) with platform-managed keys (PMK)<br>:::image type="icon" source="./media/icons/no-icon.png"::: Encrypted – other scenarios using platform-managed keys (PMK)<br>:::image type="icon" source="./media/icons/no-icon.png"::: Encrypted – customer-managed keys (CMK)<br><br>**AWS**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Unencrypted<br>:::image type="icon" source="./media/icons/no-icon.png"::: Encrypted |
28+
| Encryption: | **Azure**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Unencrypted<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Encrypted – managed disks using [Azure Storage encryption](../virtual-machines/disk-encryption.md) with platform-managed keys (PMK)<br>:::image type="icon" source="./media/icons/no-icon.png"::: Encrypted – other scenarios using platform-managed keys (PMK)<br>:::image type="icon" source="./media/icons/no-icon.png"::: Encrypted – customer-managed keys (CMK)<br><br>**AWS**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Unencrypted<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Encrypted - PMK<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Encrypted - CMK |
2929

3030
## How agentless scanning for VMs works
3131

@@ -70,16 +70,56 @@ The roles and permissions used by Defender for Cloud to perform agentless scanni
7070
- `Microsoft.Compute/virtualMachineScaleSets/virtualMachines/read`
7171
- `Microsoft.Compute/virtualMachineScaleSets/virtualMachines/instanceView/read`
7272

73-
- AWS permissions - The role “VmScanner” is assigned to the scanner when you enable agentless scanning. This role has the minimal permission set to create and clean up snapshots (scoped by tag) and to verify the current state of the VM. The detailed list of permissions is:
73+
- AWS permissions - The role “VmScanner” is assigned to the scanner when you enable agentless scanning. This role has the minimal permission set to create and clean up snapshots (scoped by tag) and to verify the current state of the VM. The detailed permissions are:
74+
75+
| Attribute | Value |
76+
|---------|---------|
77+
| SID | **VmScannerDeleteSnapshotAccess** |
78+
| Actions | ec2:DeleteSnapshot |
79+
| Conditions | "StringEquals":{"ec2:ResourceTag/CreatedBy”:<br>"Microsoft Defender for Cloud"} |
80+
| Resources | arn:aws:ec2:::snapshot/ |
81+
| Effect | Allow |
82+
83+
| Attribute | Value |
84+
|---------|---------|
85+
| SID | **VmScannerAccess** |
86+
| Actions | ec2:ModifySnapshotAttribute <br> ec2:DeleteTags <br> ec2:CreateTags <br> ec2:CreateSnapshots <br> ec2:CopySnapshots <br> ec2:CreateSnapshot |
87+
| Conditions | None |
88+
| Resources | arn:aws:ec2:::instance/ <br> arn:aws:ec2:::snapshot/ <br> arn:aws:ec2:::volume/ |
89+
| Effect | Allow |
90+
91+
| Attribute | Value |
92+
|---------|---------|
93+
| SID | **VmScannerVerificationAccess** |
94+
| Actions | ec2:DescribeSnapshots <br> ec2:DescribeInstanceStatus |
95+
| Conditions | None |
96+
| Resources | * |
97+
| Effect | Allow |
98+
99+
| Attribute | Value |
100+
|---------|---------|
101+
| SID | **VmScannerEncryptionKeyCreation** |
102+
| Actions | kms:CreateKey |
103+
| Conditions | None |
104+
| Resources | * |
105+
| Effect | Allow |
106+
107+
| Attribute | Value |
108+
|---------|---------|
109+
| SID | **VmScannerEncryptionKeyManagement** |
110+
| Actions | kms:TagResource <br> kms:GetKeyRotationStatus <br> kms:PutKeyPolicy <br> kms:GetKeyPolicy <br> kms:CreateAlias <br> kms:ListResourceTags |
111+
| Conditions | None |
112+
| Resources | arn:aws:kms::${AWS::AccountId}:key/ <br> arn:aws:kms:*:${AWS::AccountId}:alias/DefenderForCloudKey |
113+
| Effect | Allow |
114+
115+
| Attribute | Value |
116+
|---------|---------|
117+
| SID | **VmScannerEncryptionKeyUsage** |
118+
| Actions | kms:GenerateDataKeyWithoutPlaintext <br> kms:DescribeKey <br> kms:RetireGrant <br> kms:CreateGrant <br> kms:ReEncryptFrom |
119+
| Conditions | None |
120+
| Resources | arn:aws:kms::${AWS::AccountId}:key/ |
121+
| Effect | Allow |
74122

75-
- `ec2:DeleteSnapshot`
76-
- `ec2:ModifySnapshotAttribute`
77-
- `ec2:DeleteTags`
78-
- `ec2:CreateTags`
79-
- `ec2:CreateSnapshots`
80-
- `ec2:CreateSnapshot`
81-
- `ec2:DescribeSnapshots`
82-
- `ec2:DescribeInstanceStatus`
83123

84124
### Which data is collected from snapshots?
85125

@@ -103,9 +143,6 @@ Agentless scanning protects disk snapshots according to Microsoft’s highest se
103143
- Only metadata containing scan results is sent outside the isolated scanning environment.
104144
- All operations are audited.
105145

106-
### Does agentless scanning support encrypted disks?
107-
Agentless scanning doesn't currently support encrypted disks, except for Azure managed disks using [Azure Storage encryption](../virtual-machines/disk-encryption.md) with platform-managed keys (PMK).
108-
109146
## Next steps
110147

111148
This article explains how agentless scanning works and how it helps you collect data from your machines.

0 commit comments

Comments
 (0)