Skip to content

Commit 5826985

Browse files
author
David Curwin
committed
Replace DASP with DSPM
1 parent 5d54915 commit 5826985

9 files changed

+33
-33
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -246,7 +246,7 @@
246246
href: faq-cspm.yml
247247
- name: Improve your data security posture
248248
items:
249-
- name: About data-aware security posture
249+
- name: About data security posture management
250250
href: concept-data-security-posture.md
251251
- name: Support and prerequisites
252252
href: concept-data-security-posture-prepare.md
@@ -333,9 +333,9 @@
333333
- name: Explore risks to pre-deployment generative AI artifacts
334334
displayName: AI, risks, generative, applications, apps
335335
href: explore-ai-risk.md
336-
- name: Data-aware security posture
336+
- name: Data security posture management
337337
items:
338-
- name: Enable data-aware security posture
338+
- name: Enable data security posture management
339339
href: data-security-posture-enable.md
340340
- name: Explore risks to sensitive data
341341
href: data-security-review-risks.md
@@ -1036,7 +1036,7 @@
10361036
href: episode-twenty-nine.md
10371037
- name: New Custom Recommendations for AWS and GCP in Defender for Cloud
10381038
href: episode-thirty.md
1039-
- name: Understanding data aware security posture capability
1039+
- name: Understanding data security posture management capability
10401040
href: episode-thirty-one.md
10411041
- name: API Security with Defender for APIs
10421042
href: episode-thirty-two.md

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ The following table summarizes each plan and their cloud availability.
5454
| [ServiceNow Integration](integration-servicenow.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5555
| [Critical assets protection](critical-assets-protection.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5656
| [Governance to drive remediation at-scale](governance-rules.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
57-
| [Data-aware security posture, Sensitive data scanning](concept-data-security-posture.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
57+
| [Data security posture management, Sensitive data scanning](concept-data-security-posture.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5858
| [Agentless discovery for Kubernetes](concept-agentless-containers.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5959
| [Agentless code-to-cloud containers vulnerability assessment](agentless-vulnerability-assessment-azure.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
6060

articles/defender-for-cloud/concept-data-security-posture-prepare.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Support and prerequisites for data-aware security posture
3-
description: Learn about the requirements for data-aware security posture in Microsoft Defender for Cloud.
2+
title: Support and prerequisites for data security posture management
3+
description: Learn about the requirements for data security posture management in Microsoft Defender for Cloud.
44
author: dcurwin
55
ms.author: dacurwin
66
ms.service: defender-for-cloud
@@ -9,9 +9,9 @@ ms.date: 03/04/2024
99
ms.custom: references_regions
1010
---
1111

12-
# Support and prerequisites for data-aware security posture
12+
# Support and prerequisites for data security posture management
1313

14-
Review the requirements on this page before setting up [data-aware security posture](concept-data-security-posture.md) in Microsoft Defender for Cloud.
14+
Review the requirements on this page before setting up [data security posture management](concept-data-security-posture.md) in Microsoft Defender for Cloud.
1515

1616
## Enabling sensitive data discovery
1717

@@ -140,4 +140,4 @@ AWS:
140140
141141
## Next step
142142

143-
[Enable](data-security-posture-enable.md) data-aware security posture.
143+
[Enable](data-security-posture-enable.md) data security posture management.

articles/defender-for-cloud/concept-data-security-posture.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Data-aware security posture
2+
title: Data security posture management
33
description: Learn how Defender for Cloud helps improve data security posture in a multicloud environment.
44
author: dcurwin
55
ms.author: dacurwin
66
ms.service: defender-for-cloud
77
ms.topic: conceptual
88
ms.date: 01/28/2024
99
---
10-
# About data-aware security posture
10+
# About data security posture management
1111

12-
As digital transformation accelerates, organizations move data to the cloud at an exponential rate using multiple data stores such as object stores and managed/hosted databases. The dynamic and complex nature of the cloud has increased data threat surfaces and risks. This causes challenges for security teams around data visibility and protecting the cloud data estate.
12+
As digital transformation accelerates, organizations move data to the cloud at an exponential rate using multiple data stores such as object stores and managed/hosted databases. The dynamic and complex nature of the cloud increases data threat surfaces and risks. This causes challenges for security teams around data visibility and protecting the cloud data estate.
1313

14-
Data-aware security in Microsoft Defender for Cloud helps you to reduce risk to data, and respond to data breaches. Using data-aware security posture you can:
14+
Data security posture management in Microsoft Defender for Cloud helps you to reduce risk to data, and respond to data breaches. Using data security posture management you can:
1515

1616
- Automatically discover sensitive data resources across multiple clouds.
1717
- Evaluate data sensitivity, data exposure, and how data flows across the organization.
@@ -20,7 +20,7 @@ Data-aware security in Microsoft Defender for Cloud helps you to reduce risk to
2020

2121
## Automatic discovery
2222

23-
Data-aware security posture automatically and continuously discovers managed and shadow data resources across clouds, including different types of objects stores and databases.
23+
Data security posture management automatically and continuously discovers managed and shadow data resources across clouds, including different types of objects stores and databases.
2424

2525
- Discover sensitive data using the sensitive data discovery extension included in the Defender Cloud Security Posture Management (CSPM) and Defender for Storage plans.
2626
- In addition, you can discover hosted databases and data flows in Cloud Security Explorer and Attack Paths. This functionality is available in the Defender CSPM plan, and isn't dependent on the sensitive data discovery extension.
@@ -31,7 +31,7 @@ Defender for Cloud uses smart sampling to discover a selected number of assets i
3131

3232
## Data security in Defender CSPM
3333

34-
Defender CSPM provides visibility and contextual insights into your organizational security posture. The addition of data-aware security posture to the Defender CSPM plan enables you to proactively identify and prioritize critical data risks, distinguishing them from less risky issues.
34+
Defender CSPM provides visibility and contextual insights into your organizational security posture. The addition of data security posture management to the Defender CSPM plan enables you to proactively identify and prioritize critical data risks, distinguishing them from less risky issues.
3535

3636
### Attack paths
3737

@@ -65,11 +65,11 @@ Data sensitivity settings define what's considered sensitive data in your organi
6565

6666
When discovering resources for data sensitivity, results are based on these settings.
6767

68-
When you enable data-aware security capabilities with the sensitive data discovery component in the Defender CSPM or Defender for Storage plans, Defender for Cloud uses algorithms to identify data resources that appear to contain sensitive data. Resources are labeled in accordance with data sensitivity settings.
68+
When you enable data security posture management capabilities with the sensitive data discovery component in the Defender CSPM or Defender for Storage plans, Defender for Cloud uses algorithms to identify data resources that appear to contain sensitive data. Resources are labeled in accordance with data sensitivity settings.
6969

7070
Changes in sensitivity settings take effect the next time that resources are discovered.
7171

7272
## Next steps
7373

74-
- [Prepare and review requirements](concept-data-security-posture-prepare.md) for data-aware security posture management.
75-
- [Understanding data aware security posture - Defender for Cloud in the Field video](episode-thirty-one.md).
74+
- [Prepare and review requirements](concept-data-security-posture-prepare.md) for data security posture management.
75+
- [Understanding data security posture management - Defender for Cloud in the Field video](episode-thirty-one.md).

articles/defender-for-cloud/data-aware-security-dashboard-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: The data-aware security dashboard
3-
description: Learn about the capabilities and functions of the data-aware security view in Microsoft Defender for Cloud.
2+
title: The data security posture management dashboard
3+
description: Learn about the capabilities and functions of the data security posture management view in Microsoft Defender for Cloud.
44
ms.topic: conceptual
55
ms.date: 02/11/2024
66
---
@@ -96,5 +96,5 @@ You can select the **Manage data sensitivity settings** to get to the **Data sen
9696

9797
## Next steps
9898

99-
- Learn more about [data-aware security posture](concept-data-security-posture.md).
99+
- Learn more about [data security posture management](concept-data-security-posture.md).
100100
- Learn how to [enable Defender CSPM](tutorial-enable-cspm-plan.md).

articles/defender-for-cloud/data-security-posture-enable.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Enable data-aware security posture for Azure datastores
3-
description: Learn how to enable data-aware security posture in Defender for Cloud
2+
title: Enable data security posture management for Azure datastores
3+
description: Learn how to enable data security posture management in Defender for Cloud
44
author: dcurwin
55
ms.author: dacurwin
66
ms.service: defender-for-cloud
@@ -9,20 +9,20 @@ ms.date: 09/05/2023
99
ms.custom: template-how-to-pattern
1010
---
1111

12-
# Enable data-aware security posture
12+
# Enable data security posture management
1313

14-
This article describes how to enable [data-aware security posture](data-security-posture-enable.md) in Microsoft Defender for Cloud.
14+
This article describes how to enable [data security posture management](data-security-posture-enable.md) in Microsoft Defender for Cloud.
1515

1616
## Before you start
1717

18-
- Before you enable data-aware security posture, [review support and prerequisites](concept-data-security-posture-prepare.md).
19-
- When you enable Defender CSPM or Defender for Storage plans, the sensitive data discovery extension is automatically enabled. You can disable this setting if you don't want to use data-aware security posture, but we recommend that you use the feature to get the most value from Defender for Cloud.
18+
- Before you enable data security posture management, [review support and prerequisites](concept-data-security-posture-prepare.md).
19+
- When you enable Defender CSPM or Defender for Storage plans, the sensitive data discovery extension is automatically enabled. You can disable this setting if you don't want to use data security posture management, but we recommend that you use the feature to get the most value from Defender for Cloud.
2020
- Sensitive data is identified based on the data sensitivity settings in Defender for Cloud. You can [customize the data sensitivity settings](data-sensitivity-settings.md) to identify the data that your organization considers sensitive.
2121
- It takes up to 24 hours to see the results of a first discovery after enabling the feature.
2222

2323
## Enable in Defender CSPM (Azure)
2424

25-
Follow these steps to enable data-aware security posture. Don't forget to review [required permissions](concept-data-security-posture-prepare.md#whats-supported) before you start.
25+
Follow these steps to enable data security posture management. Don't forget to review [required permissions](concept-data-security-posture-prepare.md#whats-supported) before you start.
2626

2727
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
2828
1. Select the relevant Azure subscription.

articles/defender-for-cloud/defender-for-cloud-glossary.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,9 +123,9 @@ Cloud Workload Protection Platform. See [CWPP](./overview-page.md).
123123

124124
## D
125125

126-
### Data Aware Security Posture
126+
### Data Security Posture Management
127127

128-
Data-aware security posture automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. Learn about [data-aware security posture](concept-data-security-posture.md).
128+
Data security posture management automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. Learn about [data security posture management](concept-data-security-posture.md).
129129

130130
### Defender sensor
131131

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Defender for Cloud includes Foundational CSPM capabilities for free. You can als
4747
| [Multicloud coverage](plan-multicloud-security-get-started.md) | Connect to your multicloud environments with agentless methods for CSPM insight and CWP protection. | Connect your [Amazon AWS](quickstart-onboard-aws.md) and [Google GCP](quickstart-onboard-gcp.md) cloud resources to Defender for Cloud | Foundational CSPM (Free) |
4848
| [Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) | Use the dashboard to see weaknesses in your security posture. | [Enable CSPM tools](enable-enhanced-security.md) | Foundational CSPM (Free) |
4949
| [Advanced Cloud Security Posture Management](concept-cloud-security-posture-management.md) | Get advanced tools to identify weaknesses in your security posture, including:</br>- Governance to drive actions to improve your security posture</br>- Regulatory compliance to verify compliance with security standards</br>- Cloud security explorer to build a comprehensive view of your environment | [Enable CSPM tools](enable-enhanced-security.md) | Defender CSPM |
50-
| [Data-aware Security Posture](concept-data-security-posture.md) | Data-aware security posture automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. | [Enable data-aware security posture](data-security-posture-enable.md) | Defender CSPM or Defender for Storage |
50+
| [Data Security Posture Management](concept-data-security-posture.md) | Data security posture management automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. | [Enable data security posture management](data-security-posture-enable.md) | Defender CSPM or Defender for Storage |
5151
| [Attack path analysis](concept-attack-path.md#what-is-attack-path-analysis) | Model traffic on your network to identify potential risks before you implement changes to your environment. | [Build queries to analyze paths](how-to-manage-attack-path.md) | Defender CSPM |
5252
| [Cloud Security Explorer](concept-attack-path.md#what-is-cloud-security-explorer) | A map of your cloud environment that lets you build queries to find security risks. | [Build queries to find security risks](how-to-manage-cloud-security-explorer.md) | Defender CSPM |
5353
| [Security governance](governance-rules.md) | Drive security improvements through your organization by assigning tasks to resource owners and tracking progress in aligning your security state with your security policy. | [Define governance rules](governance-rules.md) | Defender CSPM |

articles/defender-for-cloud/information-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Note that:
2424
- Purview Catalog provides data context **only** for resources in subscriptions not onboarded to sensitive data discovery feature or resource types not supported by this feature.
2525
- Data context provided by Purview Catalog is provided as is and does **not** consider the [data sensitivity settings](data-sensitivity-settings.md).
2626

27-
Learn more in [Data-aware security posture (preview)](concept-data-security-posture.md).
27+
Learn more in [Data security posture management](concept-data-security-posture.md).
2828

2929
## Availability
3030

0 commit comments

Comments
 (0)