Skip to content

Commit 6eea3f9

Browse files
author
David Curwin
committed
Remove incorrect April 2 release notes
1 parent e4b59e8 commit 6eea3f9

File tree

1 file changed

+0
-30
lines changed

1 file changed

+0
-30
lines changed

articles/defender-for-cloud/release-notes.md

Lines changed: 0 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,6 @@ Learn more about [Defender for open-source databases](defender-for-databases-int
165165
| April 3 | [Defender for open-source relational databases updates](#defender-for-open-source-relational-databases-updates) |
166166
| April 2 | [Update to recommendations to align with Azure AI Services resources](#update-to-recommendations-to-align-with-azure-ai-services-resources) |
167167
| April 2 | [Deprecation of Cognitive Services recommendation](#deprecation-of-cognitive-services-recommendation) |
168-
| April 2 | [Containers multicloud recommendations (GA)](#containers-multicloud-recommendations-ga) |
169168

170169
### Defender for Containers is now generally available (GA) for AWS and GCP
171170

@@ -255,35 +254,6 @@ This recommendation is already being covered by another networking recommendatio
255254

256255
See the [list of security recommendations](recommendations-reference.md).
257256

258-
### Containers multicloud recommendations (GA)
259-
260-
April 2, 2024
261-
262-
As part of Defender for Containers multicloud general availability, the following recommendations are announced GA as well:
263-
264-
- For Azure
265-
266-
| **Recommendation** | **Description** | **Assessment Key** |
267-
| ------------------ | --------------- | ------------------ |
268-
| Azure registry container images should have vulnerabilities resolved| Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c0b7cfc6-3172-465a-b378-53c7ff2cc0d5 |
269-
| Azure running container images should have vulnerabilities resolved| Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5 |
270-
271-
- For GCP
272-
273-
| **Recommendation** | **Description** | **Assessment Key** |
274-
| ------------------ | --------------- | ------------------ |
275-
| GCP registry container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) - Microsoft Azure | Scans your GCP registries container images for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c27441ae-775c-45be-8ffa-655de37362ce |
276-
| GCP running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) - Microsoft Azure | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Google Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | 5cc3a2c1-8397-456f-8792-fe9d0d4c9145 |
277-
278-
- For AWS
279-
280-
| **Recommendation** | **Description** | **Assessment Key** |
281-
| ------------------ | --------------- | ------------------ |
282-
| AWS registry container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) | Scans your GCP registries container images for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. Scans your AWS registries container images for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c27441ae-775c-45be-8ffa-655de37362ce |
283-
| AWS running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Elastic Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | 682b2595-d045-4cff-b5aa-46624eb2dd8f |
284-
285-
The recommendations affect the secure score calculation.
286-
287257
## March 2024
288258

289259
|Date | Update |

0 commit comments

Comments
 (0)