You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-regulatory-compliance-standards.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Regulatory compliance standards in Microsoft Defender for Cloud
3
3
description: Learn about regulatory compliance standards in Microsoft Defender for Cloud
4
4
ms.topic: conceptual
5
5
ms.custom: ignite-2022
6
-
ms.date: 01/10/2023
6
+
ms.date: 11/27/2023
7
7
---
8
8
9
9
# Regulatory compliance standards
@@ -61,7 +61,7 @@ You can drill down into controls to get information about resources that have pa
61
61
By default, when you enable Defender for Cloud, the following standards are enabled:
62
62
63
63
-**Azure**: The [Microsoft Cloud Security Benchmark (MCSB)](concept-regulatory-compliance.md) is enabled for Azure subscriptions.
64
-
-**AWS**: AWS accounts get the [AWS Foundational Security Best Practices standard](https://docs.aws.amazon.com/securityhub/latest/userguide/fsbp-standard.html) assigned. This standard contains AWS-specific guidelines for security and compliance best practices based on common compliance frameworks. AWS accounts also have MCSB assigned by default.
64
+
-**AWS**: AWS accounts get the [AWS Foundational Security Best Practices standard](https://docs.aws.amazon.com/securityhub/latest/userguide/fsbp-standard.html)and [Microsoft Cloud Security Benchmark (MCSB)](concept-regulatory-compliance.md)assigned by default. AWS Foundational Security Best Practices standard contains AWS-specific guidelines for security and compliance best practices based on common compliance frameworks.
65
65
-**GCP**: GCP projects get the GCP Default standard assigned.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/custom-security-policies.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Create custom security standards for Azure resources in Microsoft Defende
3
3
description: Learn how to create custom security standards for Azure resources in Microsoft Defender for Cloud
4
4
ms.topic: how-to
5
5
ms.custom: ignite-2023
6
-
ms.date: 10/30/2023
6
+
ms.date: 11/27/2023
7
7
zone_pivot_groups: manage-asc-initiatives
8
8
---
9
9
@@ -34,27 +34,28 @@ Security recommendations in Microsoft Defender for Cloud help you to improve and
34
34
35
35
:::image type="content" source="media/custom-security-policies/create-custom-standard.png" alt-text="Screenshot that shows how to create a custom security standard." lightbox="media/custom-security-policies/create-custom-standard.png":::
36
36
37
-
1. In **Create a new standard** > **Basics**, enter a name and description. Make sure the name is unique. If you create a custom standard with the same name as an existing standard, it causes a conflict in the information displayed in the dashboard.
37
+
1. Enter a name and description.
38
+
39
+
> [!IMPORTANT]
40
+
> Make sure the name is unique. If you create a custom standard with the same name as an existing standard, it causes a conflict in the information displayed in the dashboard.
38
41
39
42
1. Select **Next**.
40
43
41
44
1. In **Recommendations**, select the recommendations that you want to add to the custom standard.
42
45
43
46
:::image type="content" source="media/custom-security-policies/select-recommendations.png" alt-text="Screenshot that shows the list of all of the recommendations that are available to select for the custom standard." lightbox="media/custom-security-policies/select-recommendations.png":::
44
47
45
-
1. (Optional) Select **...** > **Manage effect and parameters** to manage the effects and parameters of each recommendation, and save the setting.
48
+
1. (Optional) Select the three dot button (**...**) > **Manage effect and parameters** to manage the effects and parameters of each recommendation, and save the setting.
46
49
47
50
1. Select **Next**.
48
51
49
52
1. In **Review + create**, select **Create**.
50
53
51
-
Your new standard takes effect after you create it. Here's what you'll see:
54
+
Your new standard takes effect after you create it. You can see the effects of your new standard:
52
55
53
-
-In Defender for Cloud > **Regulatory compliance**, the compliance dashboard shows the new custom standard alongside existing standards.
56
+
-On the Regulatory compliance page, you will see the new custom standard alongside existing standards.
54
57
- If your environment doesn't align with the custom standard, you begin to receive recommendations to fix issues found in the **Recommendations** page.
55
58
56
-
57
-
58
59
## Create a custom recommendation
59
60
60
61
If you want to create a custom recommendation for Azure resources, you currently need to do that in Azure Policy, as follows:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/exempt-resource.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,9 +74,6 @@ After creating the exemption it can take up to 30 minutes to take effect. After
74
74
- If you've exempted specific resources, they'll be listed in the **Not applicable** tab of the recommendation details page.
75
75
- If you've exempted a recommendation, it will be hidden by default on Defender for Cloud's recommendations page. This is because the default options of the **Recommendation status** filter on that page are to exclude **Not applicable** recommendations. The same is true if you exempt all recommendations in a security control.
76
76
77
-
78
-
79
-
80
77
## Next steps
81
78
82
79
[Review exempted resources](review-exemptions.md) in Defender for Cloud.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/governance-rules.md
+52-30Lines changed: 52 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to drive remediation of security recommendations with gov
4
4
services: defender-for-cloud
5
5
ms.service: defender-for-cloud
6
6
ms.topic: how-to
7
-
ms.date: 10/29/2023
7
+
ms.date: 11/27/2023
8
8
---
9
9
10
10
# Drive remediation with governance rules
@@ -35,80 +35,102 @@ For tracking, you can review the progress of the remediation tasks by subscripti
35
35
36
36
## Before you begin
37
37
38
-
-To use governance rules, the[Defender Cloud Security Posture Management (CSPM) plan](concept-cloud-security-posture-management.md) must be enabled.
39
-
- You need **Contributor**, **Security Admin**, or **Owner** permissions on Azure subscriptions.
40
-
- For AWS accounts and GCP projects, you need **Contributor**, **Security Admin**, or **Owner** permissions on the Defender for Cloud AWS/GCP connectors.
38
+
-The[Defender Cloud Security Posture Management (CSPM) plan](concept-cloud-security-posture-management.md) must be enabled.
39
+
- You need **Contributor**, **Security Admin**, or **Owner** permissions on the Azure subscriptions.
40
+
- For AWS accounts and GCP projects, you need **Contributor**, **Security Admin**, or **Owner** permissions on the Defender for Cloud AWS or GCP connectors.
41
41
42
42
43
43
## Define a governance rule
44
44
45
-
Define a governance rule as follows.
45
+
**You can define a governance rule as follows**:
46
+
47
+
1. Sign in to the [Azure portal](https://portal.azure.com).
48
+
49
+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** > **Governance rules**.
46
50
47
-
1. In Defender for Cloud, open the **Environment settings** page, and select **Governance rules**.
48
51
1. Select **Create governance rule**.
49
-
1. In **Create governance rule** > **General details**, specify a rule name, and the scope in which the rule applies.
52
+
53
+
:::image type="content" source="./media/governance-rules/add-rule.png" alt-text="Screenshot of page for adding a governance rule." lightbox="media/governance-rules/add-rule.png":::
54
+
55
+
1. Specify a rule name and scope in which to apply the rule.
50
56
51
57
- Rules for management scope (Azure management groups, AWS master accounts, GCP organizations) are applied prior to the rules on a single scope.
52
58
- You can define exclusions within the scope as needed.
53
59
54
-
1. Priority is assigned automatically. Rules are run in priority order from the highest (1) to the lowest (1000).
55
-
1. Specify a description to help you identify the rule. Then select **Next**.
60
+
1. Set a priority level.
56
61
57
-
:::image type="content" source="./media/governance-rules/add-rule.png" alt-text="Screenshot of page for adding a governance rule." lightbox="media/governance-rules/add-rule.png":::
62
+
Rules are run in priority order from the highest (1) to the lowest (1000).
63
+
64
+
1. Specify a description to help you identify the rule.
65
+
66
+
1. Select **Next**
67
+
68
+
1. Specify how recommendations are impacted by the rule.
58
69
59
-
1. In the **Conditions** tab, specify how recommendations are impacted by the rule.
60
70
-**By severity** - The rule assigns the owner and due date to any recommendation in the subscription that doesn't already have them assigned.
61
71
-**By specific recommendations** - Select the specific built-in or custom recommendations that the rule applies to.
62
-
1. In **Set owner**, specify who's responsible for fixing recommendations covered by the rule.
72
+
73
+
:::image type="content" source="./media/governance-rules/create-rule-conditions.png" alt-text="Screenshot of page for adding conditions for a governance rule." lightbox="media/governance-rules/create-rule-conditions.png":::
74
+
75
+
1. Set the owner to specify who's responsible for fixing recommendations covered by the rule.
76
+
63
77
-**By resource tag** - Enter the resource tag on your resources that defines the resource owner.
64
78
-**By email address** - Enter the email address of the owner to assign to the recommendations.
65
79
66
-
1. In **Set remediation timeframe**, specify the time that can elapse between when resources are identified as requiring remediation, and the time that the remediation is due.
67
-
1. For recommendations issued by MCSB, if you don't want the resources to affect your secure score until they're overdue, select **Apply grace period**.
68
-
1. By default owners and their managers are notified weekly about open and overdue tasks. If you don't want them to receive these weekly emails, clear the notification options.
69
-
1. Select **Create**.
80
+
1. Specify remediation time frame to set the time that can elapse between when resources are identified as requiring remediation, and the time that the remediation is due.
70
81
71
-
:::image type="content" source="./media/governance-rules/create-rule-conditions.png" alt-text="Screenshot of page for adding conditions for a governance rule." lightbox="media/governance-rules/create-rule-conditions.png":::
82
+
For recommendations issued by MCSB, if you don't want the resources to affect your secure score until they're overdue, select **Apply grace period**.
72
83
84
+
1. (Optional) By default owners and their managers are notified weekly about open and overdue tasks. If you don't want them to receive these weekly emails, clear the notification options.
73
85
74
-
- If there are existing recommendations that match the definition of the governance rule, you can either:
86
+
1. Select **Create**.
87
+
88
+
If there are existing recommendations that match the definition of the governance rule, you can either:
75
89
76
-
- Assign an owner and due date to recommendations that don't already have an owner or due date.
77
-
- Overwrite the owner and due date of existing recommendations.
78
-
- When you delete or disable a rule, all existing assignments and notifications remain.
90
+
- Assign an owner and due date to recommendations that don't already have an owner or due date.
79
91
92
+
- Overwrite the owner and due date of existing recommendations.
93
+
94
+
When you delete or disable a rule, all existing assignments and notifications remain.
80
95
81
96
## View effective rules
82
97
83
98
You can view the effect of government rules in your environment.
84
99
85
-
1. In the Defender for Cloud portal, open the **Governance rules** page.
100
+
1. Sign in to the [Azure portal](https://portal.azure.com).
101
+
102
+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** > **Governance rules**.
103
+
86
104
1. Review governance rules. The default list shows all the governance rules applicable in your environment.
105
+
87
106
1. You can search for rules, or filter rules.
107
+
88
108
- Filter on **Environment** to identify rules for Azure, AWS, and GCP.
109
+
89
110
- Filter on rule name, owner, or time between the recommendation being issued and due date.
111
+
90
112
- Filter on **Grace period** to find MCSB recommendations that won't affect your secure score.
113
+
91
114
- Identify by status.
92
115
93
116
:::image type="content" source="./media/governance-rules/view-filter-rules.png" alt-text="Screenshot of page for viewing and filtering rules." lightbox="media/governance-rules/view-filter-rules.png":::
94
117
118
+
## Review the governance report
95
119
120
+
The governance report lets you select subscriptions that have governance rules and, for each rule and owner, shows you how many recommendations are completed, on time, overdue, or unassigned.
96
121
122
+
1. Sign in to the [Azure portal](https://portal.azure.com).
97
123
124
+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** > **Governance rules** >**Governance report**.
98
125
99
-
## Review the governance report
126
+
:::image type="content" source="media/governance-rules/governance-report.png" alt-text="Screenshot of the governance rules page that shows where the governance report button is located." lightbox="media/governance-rules/governance-report.png":::
100
127
101
-
The governance report lets you select subscriptions that have governance rules and, for each rule and owner, shows you how many recommendations are completed, on time, overdue, or unassigned.
102
-
103
-
1. In Defender for Cloud > **Environment settings** > **Governance rules**, select **Governance report**.
104
-
1. In **Governance**, select a subscription.
128
+
1. Select a subscription.
105
129
106
130
:::image type="content" source="./media/governance-rules/governance-in-workbook.png" alt-text="Screenshot of governance status by rule and owner in the governance workbook." lightbox="media/governance-rules/governance-in-workbook.png":::
107
131
108
-
1. From the governance report, you drill down into recommendations by rule and owner.
109
-
132
+
From the governance report, you can drill down into recommendations by scope, display name, priority, remediation timeframe, owner type, owner details, grace period and cloud.
110
133
111
134
## Next steps
112
135
113
-
114
136
Learn how to [Implement security recommendations](implement-security-recommendations.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/implement-security-recommendations.md
+25-16Lines changed: 25 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,9 @@ description: Learn how to remediate security recommendations in Microsoft Defend
4
4
ms.topic: how-to
5
5
ms.author: dacurwin
6
6
author: dcurwin
7
-
ms.date: 11/08/2023
7
+
ms.date: 11/22/2023
8
8
---
9
+
9
10
# Remediate security recommendations
10
11
11
12
Resources and workloads protected by Microsoft Defender for Cloud are assessed against built-in and custom security standards enabled in your Azure subscriptions, AWS accounts, and GCP projects. Based on those assessments, security recommendations provide practical steps to remediate security issues, and improve security posture.
@@ -16,6 +17,11 @@ This article describes how to remediate security recommendations in your Defende
16
17
17
18
Before you attempt to remediate a recommendation you should review it in detail. Learn how to [review security recommendations](review-security-recommendations.md).
18
19
20
+
> [!IMPORTANT]
21
+
> This page discusses how to use the new recommendations experience where you have the ability to prioritize your recommendations by their effective risk level. To view this experience, you must select **Try it now**.
22
+
>
23
+
> :::image type="content" source="media/review-security-recommendations/try-it-now.png" alt-text="Screenshot that shows where the try it now button is located on the recommendation page." lightbox="media/review-security-recommendations/try-it-now.png":::
24
+
19
25
## Group recommendations by risk level
20
26
21
27
Before you start remediating, we recommend grouping your recommendations by risk level in order to remediate the most critical recommendations first.
@@ -30,43 +36,46 @@ Before you start remediating, we recommend grouping your recommendations by risk
30
36
31
37
Recommendations are displayed in groups of risk levels.
32
38
33
-
1. Review critical and other recommendations to understand the recommendation and remediation steps. Use the graph to understand the risk to your business, including which resources are exploitable, and the effect that the recommendation has on your business.
34
-
39
+
You can now review critical and other recommendations to understand the recommendation and remediation steps. Use the graph to understand the risk to your business, including which resources are exploitable, and the effect that the recommendation has on your business.
35
40
36
41
## Remediate recommendations
37
42
38
43
After reviewing recommendations by risk, decide which one to remediate first.
39
44
40
45
In addition to risk level, we recommend that you prioritize the security controls in the default [Microsoft Cloud Security Benchmark (MCSB)](concept-regulatory-compliance.md) standard in Defender for Cloud, since these controls affect your [secure score](secure-score-security-controls.md).
41
46
47
+
1. Sign in to the [Azure portal](https://portal.azure.com).
42
48
43
-
1.In the**Recommendations** page, select the recommendation you want to remediate.
49
+
1.Navigate to**Microsoft Defender for Cloud** > **Recommendations**.
44
50
45
-
1. In the recommendation details page, select **Take action** > **Remediate**.
46
-
1. Follow the remediation instructions.
51
+
1. Select a recommendation to remediate.
47
52
48
-
As an example, the following screenshot shows remediation steps for configuring applications to only allow traffic over HTTPS.
53
+
1. Select **Take action**
49
54
50
-
:::image type="content" source="./media/implement-security-recommendations/security-center-remediate-recommendation.png" alt-text="This screenshots shows manual remediation steps for a recommendation." lightbox="./media/implement-security-recommendations/security-center-remediate-recommendation.png":::
55
+
1. Locate the Remediate section and follow the remediation instructions.
51
56
52
-
1. Once completed, a notification appears informing you whether the issue is resolved.
57
+
:::image type="content" source="./media/implement-security-recommendations/security-center-remediate-recommendation.png" alt-text="This screenshot shows manual remediation steps for a recommendation." lightbox="./media/implement-security-recommendations/security-center-remediate-recommendation.png":::
53
58
54
59
## Use the Fix option
55
60
56
-
To simplify remediation and improve your environment's security (and increase your secure score), many recommendations include a **Fix** option to help you quickly remediate a recommendation on multiple resources.
61
+
To simplify remediation and improve your environment's security (and increase your secure score), many recommendations include a **Fix** option to help you quickly remediate a recommendation on multiple resources. If the Fix button is not present in the recommendation, then there is no option to apply a quick fix.
62
+
63
+
**To remediate a recommendation with the Fix button**:
64
+
65
+
1. Sign in to the [Azure portal](https://portal.azure.com).
66
+
67
+
1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**.
68
+
69
+
1. Select a recommendation to remediate.
57
70
58
-
1.In the **Recommendations** page, select a recommendation that shows the **Fix** action icon: :::image type="icon" source="media/implement-security-recommendations/fix-icon.png" border="false":::.
71
+
1.Select **Take action**> **Fix**.
59
72
60
73
:::image type="content" source="./media/implement-security-recommendations/microsoft-defender-for-cloud-recommendations-fix-action.png" alt-text="This screenshot shows recommendations with the Fix action" lightbox="./media/implement-security-recommendations/microsoft-defender-for-cloud-recommendations-fix-action.png":::
61
74
62
-
1. In **Take action**, select **Fix**.
63
75
1. Follow the rest of the remediation steps.
64
76
65
-
66
-
After remediation completes, it can take several minutes to see the resources appear in the **Findings** tab when the status is filtered to view **Healthy** resources.
77
+
After remediation completes, it can take several minutes for the change to take place.
67
78
68
79
## Next steps
69
80
70
81
[Learn about](governance-rules.md) using governance rules in your remediation processes.
0 commit comments