Skip to content

Commit 6bb69c7

Browse files
authored
Merge pull request #203680 from ElazarK/episode-15-in-docs
episode 15 in the docs
2 parents 95912cc + b532935 commit 6bb69c7

File tree

4 files changed

+55
-2
lines changed

4 files changed

+55
-2
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -437,6 +437,8 @@
437437
href: episode-thirteen.md
438438
- name: Defender for Servers deployment in AWS and GCP
439439
href: episode-fourteen.md
440+
- name: Remediate security recommendations with governance
441+
href: episode-fifteen.md
440442
- name: Manage user data
441443
href: privacy.md
442444
- name: Microsoft Defender for IoT documentation
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
title: Remediate security recommendations with governance
3+
titleSuffix: Microsoft Defender for Cloud
4+
description: Learn about the new governance feature in Defender for Cloud, and how to drive security posture improvement.
5+
ms.topic: reference
6+
ms.date: 07/14/2022
7+
---
8+
9+
# Remediate security recommendations with governance
10+
11+
**Episode description**: In this episode of Defender for Cloud in the Field, Amit Biton joins Yuri Diogenes to talk about the new governance feature in Defender for Cloud. Amit explains the rationale behind this feature. Amit explains why it's important to have governance in place in order to drive security posture improvement and how this feature can help with that. Amit demonstrates how to create governance rules, how to monitor and take action to improve the secure score.
12+
13+
14+
<br>
15+
<br>
16+
<iframe src="https://aka.ms/docs/player?id=ceb3ef0e-257a-466a-9e90-dcfb08f54f8e" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
17+
18+
- [01:14](/shows/mdc-in-the-field/remediate-security-with-governance#time=01m14s) - What is the Governance feature?
19+
20+
- [05:54](/shows/mdc-in-the-field/remediate-security-with-governance#time=05m54s) - What are the permissions required to configure Governance rules?
21+
22+
- [06:51](/shows/mdc-in-the-field/remediate-security-with-governance#time=06m51s) - How workload owners receive notifications
23+
24+
- [10:13](/shows/mdc-in-the-field/remediate-security-with-governance#time=10m13s) - Understanding grace period
25+
26+
- [15:20](/shows/mdc-in-the-field/remediate-security-with-governance#time=15m20s) - Enabling Governance at scale
27+
28+
- [16:25](/shows/mdc-in-the-field/remediate-security-with-governance#time=16m25s) - Demonstration
29+
30+
## Recommended resources
31+
32+
[Driving your organization to remediate security issues with recommendation governance in Microsoft Defender for Cloud](governance-rules.md).
33+
34+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa0ZoTml2Qm9kZ2pjRzNMUXFqVUwyNl80YVNtd3xBQ3Jtc0trVm9QM2Z0NlpOeC1KSUE2UEd1cVJ5aHQ0MTN6WjJEYmNlOG9rWC1KZ1ZqaTNmcHdOOHMtWXRLSGhUTVBhQlhhYzlUc2xmTHZtaUpkd1c4LUQzLWt1YmRTbkVQVE5EcTJIM0Foc042SGdQZU5acVRJbw&q=https%3A%2F%2Faka.ms%2FSubscribeMicrosoftSecurity)
35+
36+
- Follow us on social media:
37+
[LinkedIn](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbFk5TXZuQld2NlpBRV9BQlJqMktYSm95WWhCZ3xBQ3Jtc0tsQU13MkNPWGNFZzVuem5zc05wcnp0VGxybHprVTkwS2todWw0b0VCWUl4a2ZKYVktNGM1TVFHTXpmajVLcjRKX0cwVFNJaDlzTld4MnhyenBuUGRCVmdoYzRZTjFmYXRTVlhpZGc4MHhoa3N6ZDhFMA&q=https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F)
38+
[Twitter](https://twitter.com/msftsecurity)
39+
40+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
41+
42+
- For more about [Microsoft Security](https://msft.it/6002T9HQY)
43+
44+
## Next steps
45+
46+
> [!div class="nextstepaction"]
47+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

articles/defender-for-cloud/episode-fourteen.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Defender for Servers deployment in AWS and GCP
3+
titleSuffix: Microsoft Defender for Cloud
34
description: Learn about the capabilities available for Defender for Servers deployment within AWS and GCP.
45
ms.topic: reference
56
ms.date: 06/26/2022
@@ -42,4 +43,4 @@ ms.date: 06/26/2022
4243
## Next steps
4344

4445
> [!div class="nextstepaction"]
45-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
46+
> [Remediate Security Recommendations with Governance](episode-fifteen.md)

articles/defender-for-cloud/governance-rules.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,17 @@ author: bmansheim
66
ms.author: benmansheim
77
ms.service: defender-for-cloud
88
ms.topic: how-to
9-
ms.date: 05/29/2022
9+
ms.date: 07/03/2022
1010
---
1111
# Drive your organization to remediate security recommendations with governance
1212

1313
Security teams are responsible for improving the security posture of their organizations but they may not have the resources or authority to actually implement security recommendations. [Assigning owners with due dates](#manually-assigning-owners-and-due-dates-for-recommendation-remediation) and [defining governance rules](#building-an-automated-process-for-improving-security-with-governance-rules) creates accountability and transparency so you can drive the process of improving the security posture in your organization.
1414

1515
Stay on top of the progress on the recommendations in the security posture. Weekly email notifications to the owners and managers make sure that they take timely action on the recommendations that can improve your security posture and recommendations.
1616

17+
You can learn more by watching this video from the Defender for Cloud in the Field video series:
18+
- [Remediate Security Recommendations with Governance](episode-fifteen.md)
19+
1720
## Building an automated process for improving security with governance rules
1821

1922
To make sure your organization is systematically improving its security posture, you can define rules that assign an owner and set the due date for resources in the specified recommendations. That way resource owners have a clear set of tasks and deadlines for remediating recommendations.

0 commit comments

Comments
 (0)