Skip to content

Commit 64646ff

Browse files
committed
Fixed all blocking issues
1 parent 578ce9f commit 64646ff

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed
20.5 KB
Loading

articles/defender-for-cloud/permissions-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Permissions management
2+
title: Permissions Management
33
description: Learn about Permissions Management in Microsoft Defender for Cloud.
44
ms.topic: conceptual
55
ms.date: 02/20/2024
66
---
77

8-
# Permissions management
8+
# Permissions Management
99

1010
Microsoft Defender for Cloud's integration with Microsoft [Microsoft Entra Permissions Management (CIEM)](/entra/permissions-management/overview) provides a Cloud Infrastructure Entitlement Management (CIEM) security model that helps organizations manage and control user access and entitlements in their cloud infrastructure. CIEM is a critical component of the Cloud Native Application Protection Platform (CNAPP) solution that provides visibility into who or what has access to specific resources. It ensures that access rights adhere to the principle of least privilege (PoLP), where users or workload identities, such as apps and services, receive only the minimum levels of access necessary to perform their tasks. CIEM also helps organizations to monitor and manage permissions across multiple cloud environments, including Azure, AWS, and GCP.
1111

@@ -21,7 +21,7 @@ The integration creates recommendations under the Manage Access and Permissions
2121

2222
## Known limitations
2323

24-
AWS and GCP accounts that were onboarded to Microsoft Entra Permissions Management before being onboarded to Defender for Cloud cannot be integrated through Microsoft Defender for Cloud.
24+
AWS and GCP accounts that were onboarded to Microsoft Entra Permissions Management before being onboarded to Defender for Cloud can't be integrated through Microsoft Defender for Cloud.
2525

2626
## Feature matrix
2727

articles/defender-for-cloud/recommendations-reference-gcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Your secure score is based on the number of security recommendations you complet
2626
### [Ensure 'Block Project-wide SSH keys' is enabled for VM instances](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/00f8a6a6-cf69-4c11-822e-3ebf4910e545)
2727

2828
**Description**: It's recommended to use Instance specific SSH key(s) instead of using common/shared project-wide SSH key(s) to access Instances.
29-
Project-wide SSH keys are stored in Compute/Project-meta-data. Project wide SSH keys can be used to login into all the instances within project. Using project-wide SSH keys eases the SSH key management but if compromised, poses the security risk that can affect all the instances within project.
29+
Project-wide SSH keys are stored in Compute/Project-meta-data. Project wide SSH keys can be used to log in into all the instances within project. Using project-wide SSH keys eases the SSH key management but if compromised, poses the security risk that can affect all the instances within project.
3030
It's recommended to use Instance specific SSH keys that can limit the attack surface if the SSH keys are compromised.
3131

3232
**Severity**: Medium

0 commit comments

Comments
 (0)