Skip to content

Commit 717decc

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 5b8d41d + 986d9a2 commit 717decc

File tree

8 files changed

+125
-36
lines changed

8 files changed

+125
-36
lines changed

articles/azure-resource-manager/templates/template-specs-create-linked.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Create the main template and the linked template.
2323

2424
To link a template, add a [deployments resource](/azure/templates/microsoft.resources/deployments) to your main template. In the `templateLink` property, specify the relative path of the linked template in accordance with the path of the parent template.
2525

26-
The linked template is called **linkedTemplate.json**, and is stored in a subfolder called **artifacts** in the path where the main template is stored. You can use one of the follow values for the relativePath:
26+
The linked template is called **linkedTemplate.json**, and is stored in a subfolder called **artifacts** in the path where the main template is stored. You can use one of the following values for the relativePath:
2727

2828
- `./artifacts/linkedTemplate.json`
2929
- `/artifacts/linkedTemplate.json`

articles/iot-hub-device-update/device-update-agent-provisioning.md

Lines changed: 26 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,25 @@ Follow these instructions to provision the Device Update agent on [IoT Edge enab
7676

7777
1. Follow the instructions to [Install and provision the Azure IoT Edge runtime](https://docs.microsoft.com/azure/iot-edge/how-to-install-iot-edge?view=iotedge-2020-11&preserve-view=true).
7878

79-
1. Then install the Device Update agent from [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) and you are now ready to start the Device Update agent on your IoT Edge device.
80-
79+
1. Install the Device Update image update agent
80+
- We provide sample images in [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) to try image update rollouts to different versions using a base image (adu-base-image) and one update image (adu-update-image). See example of [how to flash the image to your IoT Hub device](https://docs.microsoft.com/azure/iot-hub-device-update/device-update-raspberry-pi#flash-sd-card-with-image).
81+
82+
1. Install the Device Update package update agent
83+
- For latest agent versions from packages.miscrosoft.com: Update package lists on your device and install the Device Update agent package and its dependencies using:
84+
```shell
85+
sudo apt-get update
86+
```
87+
88+
```shell
89+
sudo apt-get install deviceupdate-agent deliveryoptimization-plugin-apt
90+
```
91+
92+
- For upcoming release candidate versions from [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) : Download the .dep file to the machine you want to install the Device Update agent on, then:
93+
```shell
94+
Sudo apt-get install -y ./"<PATH TO FILE>"/"<.DEP FILE NAME>"
95+
```
96+
97+
1. You are now ready to start the Device Update agent on your IoT Edge device.
8198

8299
### On non-Edge IoT Linux devices
83100

@@ -125,14 +142,15 @@ Follow these instructions to provision the Device Update agent on your IoT Linux
125142
sudo aziotctl config apply
126143
```
127144

128-
1. Finally install the Device Update agent from [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) and you are now ready to start the Device Update agent on your IoT Edge device.
145+
1. Finally install the Device Update agent. We provide sample images in [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) to try image update rollouts to different versions using a base image (adu-base-image) and one update image (adu-update-image). See example of [how to flash the image to your IoT Hub device](https://docs.microsoft.com/azure/iot-hub-device-update/device-update-raspberry-pi#flash-sd-card-with-image).
129146

147+
1. You are now ready to start the Device Update agent on your IoT device.
130148

131149
### Other IoT devices
132150

133151
The Device Update agent can also be configured without the IoT Identity service for testing or on constrained devices. Follow the below steps to provision the Device Update agent using a connection string (from the Module or Device).
134152

135-
1. Install Device Update agent from [Artifacts](https://github.com/Azure/iot-hub-device-update/releases).
153+
1. We provide sample images in [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) to try image update rollouts to different versions using a base image (adu-base-image) and one update image (adu-update-image). See example of [how to flash the image to your IoT Hub device](https://docs.microsoft.com/azure/iot-hub-device-update/device-update-raspberry-pi#flash-sd-card-with-image).
136154

137155
1. Log onto the machine or IoT Edge device/IoT device.
138156

@@ -145,16 +163,16 @@ The Device Update agent can also be configured without the IoT Identity service
145163

146164
1. You should see a window open with some text in it. Delete the entire string following 'connection_String=' the first-time you provision the Device Update agent on the IoT device. It is just place holder text.
147165

148-
1. In the terminal, replace <your-connection-string> with the connection string of the device for your instance of Device Update agent.
166+
1. In the terminal, replace "<your-connection-string>" with the connection string of the device for your instance of Device Update agent.
149167

150168
> [!Important]
151169
> Do not add quotes around the connection string.
152170

153-
- connection_string=<your-connection-string>
171+
- connection_string= "<ADD CONNECTION STRING HERE>"
154172

155173
1. Enter and save.
156174

157-
1. Now you are now ready to start the Device Update agent on your IoT Edge device.
175+
1. Now you are now ready to start the Device Update agent on your IoT device.
158176

159177

160178
## How to start the Device Update Agent
@@ -187,7 +205,7 @@ You can also build and modify your own customer Device Update agent.
187205
Follow the instructions to [build](https://github.com/Azure/iot-hub-device-update/blob/main/docs/agent-reference/how-to-build-agent-code.md) the Device Update Agent
188206
from source.
189207

190-
Once the agent is successfully building, it's time [run](https://github.com/Azure/iot-hub-device-update/blob/main/docs/agent-reference/how-to-run-agent.md)
208+
Once the agent is successfully building, it's time to [run](https://github.com/Azure/iot-hub-device-update/blob/main/docs/agent-reference/how-to-run-agent.md)
191209
the agent.
192210
193211
Now, make the changes needed to incorporate the agent into your image. Look at how to
71.3 KB
Loading

articles/purview/register-scan-amazon-s3.md

Lines changed: 23 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -112,10 +112,31 @@ This procedure describes how to create a new Purview credential to use when scan
112112

113113
Select **Create** when you're done to finish creating the credential.
114114

115-
For more information about Purview credentials, see the [Azure Purview public preview documentation](manage-credentials.md).
115+
1. If you haven't yet, copy and paste the **Microsoft account ID** and **External ID** values for use when [creating a new AWS role for Purview](#create-a-new-aws-role-for-purview), which is your next step.
116+
117+
For more information about Purview credentials, see [Credentials for source authentication in Azure Purview](manage-credentials.md).
116118

117119
### Create a new AWS role for Purview
118120

121+
This procedure requires that you enter the values for your Azure Account ID and External ID when creating your AWS role.
122+
123+
If you don't have these values, locate them first in your [Purview credential](#create-a-purview-credential-for-your-aws-bucket-scan).
124+
125+
**To locate your Microsoft Account ID and External ID**:
126+
127+
1. In Purview, navigate to the **Management Center** > **Security and access** > **Credentials**.
128+
129+
1. Select the credential that you [created for your AWS bucket scan](#create-a-purview-credential-for-your-aws-bucket-scan), and then in the toolbar, select **Edit**.
130+
131+
1. In the **Edit credential** pane that appears on the right, copy the **Microsoft account ID** and **External ID** values to a separate file, or have them handy for pasting into the relevant field in AWS.
132+
133+
For example:
134+
135+
[ ![Locate your Microsoft account ID and External ID values.](./media/register-scan-amazon-s3/locate-account-id-external-id.png) ](./media/register-scan-amazon-s3/locate-account-id-external-id.png#lightbox)
136+
137+
138+
**To create your AWS role for Purview**:
139+
119140
1. Open your **Amazon Web Services** console, and under **Security, Identity, and Compliance**, select **IAM**.
120141

121142
1. Select **Roles** and then **Create role**.
@@ -125,13 +146,9 @@ For more information about Purview credentials, see the [Azure Purview public pr
125146
|Field |Description |
126147
|---------|---------|
127148
|**Account ID** | Enter your Microsoft Account ID. For example: `615019938638` |
128-
|**External ID** | Under options, select **Require external ID...**, and then enter your External ID in the designated field. <br>For example: `e7e2b8a3-0a9f-414f-a065-afaf4ac6d994` <br><br>You can find this external ID when you . |
149+
|**External ID** | Under options, select **Require external ID...**, and then enter your External ID in the designated field. <br>For example: `e7e2b8a3-0a9f-414f-a065-afaf4ac6d994` |
129150
| | |
130151

131-
> [!NOTE]
132-
> You can find the values for both the **Microsoft Account ID** and **External ID** in the Purview **Management Center** > **Credentials** area, where you [created your Purview credentials](#create-a-purview-credential-for-your-aws-bucket-scan).
133-
>
134-
135152
For example:
136153

137154
![Add the Microsoft Account ID to your AWS account.](./media/register-scan-amazon-s3/aws-create-role-amazon-s3.png)

articles/security-center/kubernetes-workload-protections.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,6 @@ spec:
150150
labels:
151151
app: redis
152152
annotations:
153-
apparmor.security.beta.kubernetes.io/pod: runtime/default
154153
container.apparmor.security.beta.kubernetes.io/redis: runtime/default
155154
spec:
156155
containers:
@@ -251,4 +250,4 @@ For other related material, see the following pages:
251250
252251
- [Security Center recommendations for compute](recommendations-reference.md#recs-compute)
253252
- [Alerts for AKS cluster level](alerts-reference.md#alerts-akscluster)
254-
- [Alerts for Container host level](alerts-reference.md#alerts-containerhost)
253+
- [Alerts for Container host level](alerts-reference.md#alerts-containerhost)

articles/security-center/release-notes.md

Lines changed: 43 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: memildin
55
manager: rkarlin
66
ms.service: security-center
77
ms.topic: reference
8-
ms.date: 04/06/2021
8+
ms.date: 04/11/2021
99
ms.author: memildin
1010

1111
---
@@ -24,26 +24,22 @@ To learn about *planned* changes that are coming soon to Security Center, see [I
2424
## April 2021
2525

2626
Updates in April include:
27-
- [Four new recommendations related to guest configuration (preview)](#four-new-recommendations-related-to-guest-configuration-preview)
27+
- [Recently pulled container registry images are now rescanned weekly (General Availability)](#recently-pulled-container-registry-images-are-now-rescanned-weekly-general-availability)
2828
- [Use Azure Defender for Kubernetes to protect hybrid and multi-cloud Kubernetes deployments (preview)](#use-azure-defender-for-kubernetes-to-protect-hybrid-and-multi-cloud-kubernetes-deployments-preview)
29+
- [Four new recommendations related to guest configuration (preview)](#four-new-recommendations-related-to-guest-configuration-preview)
30+
- [CMK recommendations moved to best practices security control](#cmk-recommendations-moved-to-best-practices-security-control)
2931
- [11 Azure Defender alerts deprecated](#11-azure-defender-alerts-deprecated)
3032
- [Two recommendations from "Apply system updates" security control were deprecated](#two-recommendations-from-apply-system-updates-security-control-were-deprecated)
3133

32-
### Four new recommendations related to guest configuration (preview)
34+
### Recently pulled container registry images are now rescanned weekly (General Availability)
3335

34-
Azure's [Guest Configuration extension](../governance/policy/concepts/guest-configuration.md) reports to Security Center to help ensure your virtual machines' in-guest settings are hardened. The extension isn't required for Arc enabled servers because it's included in the Arc Connected Machine agent. The extension requires a system-managed identity on the machine.
36+
Azure Defender for container registries includes a built-in vulnerability scanner. This scanner immediately scans any image you push to your registry and any image pulled within the last 30 days.
3537

36-
We've added four new recommendations to Security Center to make the most of this extension.
37-
38-
- Two recommendations prompt you to install the extension and its required system-managed identity:
39-
- **Guest Configuration extension should be installed on your machines**
40-
- **Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity**
38+
New vulnerabilities are discovered every day. With this update, container images that were pulled from your registries during the last 30 days will be **rescanned** every week. This ensures that newly discovered vulnerabilities are identified in your images.
4139

42-
- When the extension is installed and running, it'll begin auditing your machines and you'll be prompted to harden settings such as configuration of the operating system and environment settings. These two recommendations will prompt you to harden your Windows and Linux machines as described:
43-
- **Windows Defender Exploit Guard should be enabled on your machines**
44-
- **Authentication to Linux machines should require SSH keys**
40+
Scanning is charged on a per image basis, so there's no additional charge for these rescans.
4541

46-
Learn more in [Understand Azure Policy's Guest Configuration](../governance/policy/concepts/guest-configuration.md).
42+
Learn more about this scanner in [Use Azure Defender for container registries to scan your images for vulnerabilities](defender-for-container-registries-usage.md).
4743

4844

4945
### Use Azure Defender for Kubernetes to protect hybrid and multi-cloud Kubernetes deployments (preview)
@@ -66,6 +62,40 @@ Learn more in [Use Azure Defender for Kubernetes with your on-premises and multi
6662

6763
:::image type="content" source="media/defender-for-kubernetes-azure-arc/extension-recommendation.png" alt-text="Azure Security Center's recommendation for deploying the Azure Defender extension for Azure Arc enabled Kubernetes clusters." lightbox="media/defender-for-kubernetes-azure-arc/extension-recommendation.png":::
6864

65+
### Four new recommendations related to guest configuration (preview)
66+
67+
Azure's [Guest Configuration extension](../governance/policy/concepts/guest-configuration.md) reports to Security Center to help ensure your virtual machines' in-guest settings are hardened. The extension isn't required for Arc enabled servers because it's included in the Arc Connected Machine agent. The extension requires a system-managed identity on the machine.
68+
69+
We've added four new recommendations to Security Center to make the most of this extension.
70+
71+
- Two recommendations prompt you to install the extension and its required system-managed identity:
72+
- **Guest Configuration extension should be installed on your machines**
73+
- **Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity**
74+
75+
- When the extension is installed and running, it'll begin auditing your machines and you'll be prompted to harden settings such as configuration of the operating system and environment settings. These two recommendations will prompt you to harden your Windows and Linux machines as described:
76+
- **Windows Defender Exploit Guard should be enabled on your machines**
77+
- **Authentication to Linux machines should require SSH keys**
78+
79+
Learn more in [Understand Azure Policy's Guest Configuration](../governance/policy/concepts/guest-configuration.md).
80+
81+
### CMK recommendations moved to best practices security control
82+
83+
Every organization's security program includes data encryption requirements. By default, Azure customers' data is encrypted at rest with service-managed keys. However, customer-managed keys (CMK) are commonly required to meet regulatory compliance standards. CMKs let you encrypt your data with an [Azure Key Vault](../key-vault/general/overview.md) key created and owned by you. This gives you full control and responsibility for the key lifecycle, including rotation and management.
84+
85+
Azure Security Center's security controls are logical groups of related security recommendations, and reflect your vulnerable attack surfaces. Each control has a maximum number of points you can add to your secure score if you remediate all of the recommendations listed in the control, for all of your resources. The **Implement security best practices** security control is worth zero points. So recommendations in this control don't affect your secure score.
86+
87+
The recommendations listed below are being moved to the **Implement security best practices** security control to better reflect their optional nature. This move ensures that these recommendations are in the most appropriate control to meet their objective.
88+
89+
- Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest
90+
- Azure Machine Learning workspaces should be encrypted with a customer-managed key (CMK)
91+
- Cognitive Services accounts should enable data encryption with a customer-managed key (CMK)
92+
- Container registries should be encrypted with a customer-managed key (CMK)
93+
- SQL managed instances should use customer-managed keys to encrypt data at rest
94+
- SQL servers should use customer-managed keys to encrypt data at rest
95+
- Storage accounts should use customer-managed key (CMK) for encryption
96+
97+
Learn which recommendations are in each security control in [Security controls and their recommendations](secure-score-security-controls.md#security-controls-and-their-recommendations).
98+
6999

70100
### 11 Azure Defender alerts deprecated
71101

articles/security/breadcrumb/TOC.yml

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,35 @@
55
- name: Security
66
tocHref: /azure/
77
topicHref: /azure/security/index
8+
89
- name: Azure
910
tocHref: /azure/
1011
topicHref: /azure/index
1112
items:
1213
- name: Security
1314
tocHref: /azure/architecture/
14-
topicHref: /azure/security/index
15+
topicHref: /azure/security/index
16+
17+
- name: Azure
18+
tocHref: /azure/
19+
topicHref: /azure/index
20+
items:
21+
- name: Security
22+
tocHref: /azure/active-directory/
23+
topicHref: /azure/Security/index
24+
items:
25+
- name: Fundamentals
26+
tocHref: /azure/active-directory/authentication
27+
topicHref: /azure/security/fundamentals/index
28+
29+
- name: Azure
30+
tocHref: /azure/
31+
topicHref: /azure/index
32+
items:
33+
- name: Security
34+
tocHref: /azure/architecture/
35+
topicHref: /azure/Security/index
36+
items:
37+
- name: Fundamentals
38+
tocHref: /azure/architecture/framework/security
39+
topicHref: /azure/security/fundamentals/index

0 commit comments

Comments
 (0)