Skip to content

Commit 53843b6

Browse files
authored
Merge pull request #259173 from ElazarK/WI181508-agentless-secret-scanning
agentless secret scanning
2 parents 0d4abea + 6fe9c8b commit 53843b6

File tree

4 files changed

+88
-17
lines changed

4 files changed

+88
-17
lines changed

articles/defender-for-cloud/concept-agentless-data-collection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Agentless scanning for VMs provides vulnerability assessment and software invent
2121
|---------|---------|
2222
|Release state:| GA |
2323
|Pricing:|Requires either [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features)|
24-
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: Vulnerability assessment (powered by Defender Vulnerability Management)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management)<br />:::image type="icon" source="./media/icons/yes-icon.png":::Secret scanning (Preview) |
24+
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: Vulnerability assessment (powered by Defender Vulnerability Management)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management)<br />:::image type="icon" source="./media/icons/yes-icon.png":::Secret scanning |
2525
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Commercial clouds<br> :::image type="icon" source="./media/icons/no-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/no-icon.png"::: Microsoft Azure operated by 21Vianet<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected GCP projects |
2626
| Operating systems: | :::image type="icon" source="./media/icons/yes-icon.png"::: Windows<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Linux |
2727
| Instance and disk types: | **Azure**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Standard VMs<br>:::image type="icon" source="./media/icons/no-icon.png"::: Unmanaged disks<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Virtual machine scale set - Flex<br>:::image type="icon" source="./media/icons/no-icon.png"::: Virtual machine scale set - Uniform<br><br>**AWS**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: EC2<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Auto Scale instances<br>:::image type="icon" source="./media/icons/no-icon.png"::: Instances with a ProductCode (Paid AMIs)<br><br>**GCP**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Compute instances<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Instance groups (managed and unmanaged) |

articles/defender-for-cloud/release-notes.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes
33
description: This page is updated frequently with the latest updates in Defender for Cloud.
44
ms.topic: overview
5-
ms.date: 11/23/2023
5+
ms.date: 11/27/2023
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -24,6 +24,7 @@ If you're looking for items older than six months, you can find them in the [Arc
2424

2525
| Date | Update |
2626
|--|--|
27+
| November 27 | [General availability of agentless secret scanning in Defender for Servers and Defender CSPM](#general-availability-of-agentless-secret-scanning-in-defender-for-servers-and-defender-cspm) |
2728
| November 22 | [Enable permissions management with Defender for Cloud (Preview)](#enable-permissions-management-with-defender-for-cloud-preview) |
2829
| November 22 | [Defender for Cloud integration with ServiceNow](#defender-for-cloud-integration-with-servicenow) |
2930
| November 20| [General Availability of the autoprovisioning process for SQL Servers on machines plan](#general-availability-of-the-autoprovisioning-process-for-sql-servers-on-machines-plan)|
@@ -38,6 +39,20 @@ If you're looking for items older than six months, you can find them in the [Arc
3839
| November 15 | [General Availability release of sensitive data discovery for databases](#general-availability-release-of-sensitive-data-discovery-for-databases) |
3940
| November 6 | [New version of the recommendation to find missing system updates is now GA](#new-version-of-the-recommendation-to-find-missing-system-updates-is-now-ga) |
4041

42+
### General availability of agentless secret scanning in Defender for Servers and Defender CSPM
43+
44+
November 27, 2023
45+
46+
Agentless secret scanning enhances the security cloud based Virtual Machines (VM) by identifying plaintext secrets on VM disks. Agentless secret scanning provides comprehensive information to help prioritize detected findings and mitigate lateral movement risks before they occur. This proactive approach prevents unauthorized access, ensuring your cloud environment remains secure.
47+
48+
We're announcing the General Availability (GA) of agentless secret scanning, which is included in both the [Defender for Servers P2](tutorial-enable-servers-plan.md) and the [Defender CSPM](tutorial-enable-cspm-plan.md) plans.
49+
50+
Agentless secret scanning utilizes cloud APIs to capture snapshots of your disks, conducting out-of-band analysis that ensures that there is no effect on your VM's performance. Agentless secret scanning broadens the coverage offered by Defender for Cloud over cloud assets across Azure, AWS, and GCP environments to enhance your cloud security.
51+
52+
With this release, Defender for Cloud's detection capabilities now support additional database types, data store signed URLs, access tokens, and more.
53+
54+
Learn how to [manage secrets with agentless secret scanning](secret-scanning.md).
55+
4156
### Enable permissions management with Defender for Cloud (Preview)
4257

4358
November 22, 2023

articles/defender-for-cloud/secret-scanning.md

Lines changed: 69 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,82 @@
11
---
2-
title: Manage secrets with agentless secret scanning (preview)
2+
title: Manage secrets with agentless secret scanning
33
description: Learn how to scan your servers for secrets with Defender for Server's agentless secret scanning.
44
ms.topic: overview
5-
ms.date: 08/15/2023
5+
ms.date: 11/27/2023
66
---
77

8-
# Manage secrets with agentless secret scanning (preview)
8+
# Manage secrets with agentless secret scanning
99

1010
Attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing internet-facing workloads and exploiting exposed credentials and secrets.
1111

1212
Defender for Cloud's agentless secret scanning for Virtual Machines (VM) locates plaintext secrets that exist in your environment. If secrets are detected, Defender for Cloud can assist your security team to prioritize and take actionable remediation steps to minimize the risk of lateral movement, all without affecting your machine's performance.
1313

14-
By using agentless secret scanning, you can proactively discover the following types of secrets across your environments:
15-
16-
- **Insecure SSH private keys (Azure, AWS, GCP)** - supports RSA algorithm for PuTTy files, PKCS#8 and PKCS#1 standards
17-
- **Plaintext Azure SQL connection strings (Azure, AWS)** - supports SQL PAAS
18-
- **Plaintext Azure storage account connection strings (Azure, AWS)**
19-
- **Plaintext Azure storage account SAS tokens (Azure, AWS)**
20-
- **Plaintext AWS access keys (Azure, AWS)**
21-
- **Plaintext AWS RDS SQL connection string (Azure, AWS)** -supports SQL PAAS
22-
23-
In addition to detecting SSH private keys, the agentless scanner verifies whether they can be used to move laterally in the network. Keys that we didn't successfully verify are categorized as **unverified** in the **Recommendation** pane.
14+
By using agentless secret scanning, you can proactively discover the following types of secrets across your environments (in Azure, AWS and GCP cloud providers):
15+
16+
- Insecure SSH private keys:
17+
- Supports RSA algorithm for PuTTy files.
18+
- PKCS#8 and PKCS#1 standards.
19+
- OpenSSH standard.
20+
- Plaintext Azure SQL connection strings, supports SQL PAAS.
21+
- Plaintext Azure database for PostgreSQL.
22+
- Plaintext Azure database for MySQL.
23+
- Plaintext Azure database for MariaDB.
24+
- Plaintext Azure Cosmos DB, including PostgreSQL, MySQL and MariaDB.
25+
- Plaintext AWS RDS connection string, supports SQL PAAS:
26+
- Plaintext Amazon Aurora with Postgres and MySQL flavors.
27+
- Plaintext Amazon custom RDS with Oracle and SQL Server flavors.
28+
- Plaintext Azure storage account connection strings.
29+
- Plaintext Azure storage account SAS tokens.
30+
- Plaintext AWS access keys.
31+
- Plaintext AWS S3 pre-signed URL.
32+
- Plaintext Google storage signed URL.
33+
- Plaintext Azure AD Client Secret.
34+
- Plaintext Azure DevOps Personal Access Token.
35+
- Plaintext GitHub Personal Access Token.
36+
- Plaintext Azure App Configuration Access Key.
37+
- Plaintext Azure Cognitive Service Key.
38+
- Plaintext Azure AD User Credentials.
39+
- Plaintext Azure Container Registry Access Key.
40+
- Plaintext Azure App Service Deployment Password.
41+
- Plaintext Azure Databricks Personal Access Token.
42+
- Plaintext Azure SignalR Access Key.
43+
- Plaintext Azure API Management Subscription Key.
44+
- Plaintext Azure Bot Framework Secret Key.
45+
- Plaintext Azure Machine Learning Web Service API Key.
46+
- Plaintext Azure Communication Services Access Key.
47+
- Plaintext Azure EventGrid Access Key.
48+
- Plaintext Amazon Marketplace Web Service (MWS) Access Key.
49+
- Plaintext Azure Maps Subscription Key.
50+
- Plaintext Azure Web PubSub Access Key.
51+
- Plaintext OpenAI API Key.
52+
- Plaintext Azure Batch Shared Access Key.
53+
- Plaintext NPM Author Token.
54+
- Plaintext Azure Subscription Management Certificate.
55+
56+
Secret findings can be found using the [Cloud Security Explorer](#remediate-secrets-with-cloud-security-explorer) and the [Secrets tab](#remediate-secrets-from-your-asset-inventory) with their metadata like secret type, file name, file path, last access time, and more.
57+
58+
The following secrets can also be accessed from the `Security Recommendations` and `Attack Path`, across Azure, AWS and GCP cloud providers:
59+
60+
- Insecure SSH private keys:
61+
- Supporting RSA algorithm for PuTTy files.
62+
- PKCS#8 and PKCS#1 standards.
63+
- OpenSSH standard.
64+
- Plaintext Azure database connection string:
65+
- Plaintext Azure SQL connection strings, supports SQL PAAS.
66+
- Plaintext Azure database for PostgreSQL.
67+
- Plaintext Azure database for MySQL.
68+
- Plaintext Azure database for MariaDB.
69+
- Plaintext Azure Cosmos DB, including PostgreSQL, MySQL and MariaDB.
70+
- Plaintext AWS RDS connection string, supports SQL PAAS:
71+
- Plaintext Amazon Aurora with Postgres and MySQL flavors.
72+
- Plaintext Amazon custom RDS with Oracle and SQL Server flavors.
73+
- Plaintext Azure storage account connection strings.
74+
- Plaintext Azure storage account SAS tokens.
75+
- Plaintext AWS access keys.
76+
- Plaintext AWS S3 pre-signed URL.
77+
- Plaintext Google storage signed URL.
78+
79+
The agentless scanner verifies whether SSH private keys can be used to move laterally in your network. Keys that aren't successfully verified are categorized as `unverified` on the Recommendation page.
2480

2581
## Prerequisites
2682

articles/defender-for-cloud/support-matrix-defender-for-servers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ This table summarizes Azure cloud support for Defender for Servers features.
4949
[Adaptive application controls](./adaptive-application-controls.md) | GA | GA | GA
5050
[Adaptive network hardening](./adaptive-network-hardening.md) | GA | NA | NA
5151
[Docker host hardening](./harden-docker-hosts.md) | GA | GA | GA
52-
[Agentless secret scanning](secret-scanning.md) | Preview | NA | NA
52+
[Agentless secret scanning](secret-scanning.md) | GA | NA | NA
5353

5454
## Windows machine support
5555

@@ -126,7 +126,7 @@ The following table shows feature support for AWS and GCP machines.
126126
| Third-party vulnerability assessment | - | - |
127127
| [Network security assessment](protect-network-resources.md) | - | - |
128128
| [Cloud security explorer](how-to-manage-cloud-security-explorer.md) || - |
129-
| [Agentless secret scanning](secret-scanning.md) || - |
129+
| [Agentless secret scanning](secret-scanning.md) || |
130130

131131
## Endpoint protection support
132132

0 commit comments

Comments
 (0)