Skip to content

Commit 54696e9

Browse files
committed
implementing some feedback
1 parent 23f2b9f commit 54696e9

File tree

4 files changed

+12
-19
lines changed

4 files changed

+12
-19
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@
166166
href: concept-data-security-posture.md
167167
- name: Support and prerequisites
168168
href: concept-data-security-posture-prepare.md
169-
- name: Improve your cloud security posture
169+
- name: Improve your container security posture
170170
href: concept-agentless-containers.md
171171
- name: Security recommendations
172172
items:

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,7 @@ ms.custom: template-concept
1111

1212
Identify security risks in containers and Kubernetes realms with an agentless discovery and visibility capability across SDLC and runtime.
1313

14-
Agentless Container Posture offers container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#attack-paths) analysis.
15-
16-
Agentless Container Posture maximizes coverage on container posture issues and extends beyond the reach of agent-based assessments, providing a holistic approach to your posture improvement.
14+
With container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#attack-paths) analysis, you can maximize coverage on container posture issues and extend beyond the reach of agent-based assessments, providing a holistic approach to your posture improvement.
1715

1816
Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).
1917

@@ -24,15 +22,14 @@ Learn more about [Cloud Security Posture Management](concept-cloud-security-post
2422

2523
Agentless Container Posture provides the following capabilities:
2624

27-
- Enabling agentless discovery and visibility within Kubernetes parameters.
28-
- Enabling agentless container registry vulnerability assessment, using the image scanning results of your Azure Container Registry (ACR) to enable queries on the Cloud Security Explorer.
25+
- Using Kubernetes Attack Path analysis to visualize risks and threats to Kubernetes environments.
26+
- Using Cloud Security Explorer for risk hunting by querying various risk scenarios.
27+
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, search for "Kubernetes" in the [list of Insights](attack-path-reference.md#insights).
28+
- Agentless discovery and visibility within Kubernetes components.
29+
- Agentless container registry vulnerability assessment, using the image scanning results of your Azure Container Registry (ACR) with Cloud Security Explorer.
2930

3031
A [vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) for Containers in Defender Cloud Security Posture Management (CSPM) gives you frictionless, wide, and instant visibility on actionable posture issues without installed agents, network connectivity requirements, or container performance impact.
3132

32-
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, see the [list of Insights](attack-path-reference.md#insights).
33-
- Using Cloud Security Explorer for risk hunting by querying various risk scenarios.
34-
- Using Kubernetes Attack Path analysis to visualize risks and threats to Kubernetes environments.
35-
3633
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan.
3734

3835
## Availability
@@ -75,17 +72,17 @@ Learn more about [trusted versions that AKS supports](/azure/aks/supported-kuber
7572

7673
Verify that the settings were saved successfully - a notification message pops up in the top right corner.
7774

78-
### Image scanning intervals
75+
### Image refresh intervals
7976

8077
Agentless information in Defender CSPM is updated once an hour via snapshotting mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
8178

82-
Learn more about [agentless scanning](concept-agentless-data-collection.md).
79+
Recommendations are available based on vulnerability assessment timeline. Learn more about [agentless scanning](concept-agentless-data-collection.md).
8380

8481
## How agentless containers works
8582

8683
The system’s architecture is based on a snapshot mechanism at intervals.
8784

88-
:::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png":::
85+
<!--- :::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png"::: --->
8986

9087
By enabling the Agentless discovery for Kubernetes extension, the following process occurs:
9188

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,8 +63,8 @@ The following table summarizes each plan and their cloud availability.
6363
| [Cloud security explorer](how-to-manage-cloud-security-explorer.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
6464
| [Attack path analysis](how-to-manage-attack-path.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
6565
| [Agentless scanning for machines](concept-agentless-data-collection.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
66-
| Agentless discovery for Kubernetes | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure |
67-
| Agentless vulnerability assessments for container images, including registry scanning (\* Up to 20 unique images per billable resource) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure |
66+
| [Agentless discovery for Kubernetes](concept-agentless-containers.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure |
67+
| [Agentless vulnerability assessments for container images](defender-for-containers-vulnerability-assessment-azure.md), including registry scanning (\* Up to 20 unique images per billable resource) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure |
6868
| Sensitive data discovery | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
6969
| Data flows discovery | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
7070
| EASM insights in network exposure | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |

articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,6 @@ Learn more about [the cloud security graph, attack path analysis, and the cloud
2323

2424
- You must [enable Defender for CSPM](enable-enhanced-security.md).
2525

26-
- You must [enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers.
27-
28-
When you enable Defender for Containers, you also gain the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in the security explorer.
29-
3026
- Required roles and permissions:
3127
- Security Reader
3228
- Security Admin

0 commit comments

Comments
 (0)