Skip to content

Commit 72a052d

Browse files
secrets docs
1 parent 8fe8bb5 commit 72a052d

File tree

1 file changed

+5
-9
lines changed

1 file changed

+5
-9
lines changed

articles/defender-for-cloud/secrets-scanning-cloud-deployment.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Traditional secrets scanning solutions often detect misplaced secrets in code re
2424

2525
Scanning for cloud deployment secrets adds an extra layer of security, addressing scenarios such as:
2626

27-
- **Increased security coverage: In Defender for Cloud, DevOps security capabilities in Defender for Cloud [can identify exposed secrets](defender-for-devops-introduction.md) within source control management platforms. However, manually triggered cloud deployments from a developer’s workstation can lead to exposed secrets that might be overlooked. In addition, some secrets might only surface during deployment runtime, like those revealed in deployment outputs, or resolved from Azure Key Vault. Scanning for cloud deployment secrets bridges this gap.
27+
- **Increased security coverage**: In Defender for Cloud, DevOps security capabilities in Defender for Cloud [can identify exposed secrets](defender-for-devops-introduction.md) within source control management platforms. However, manually triggered cloud deployments from a developer’s workstation can lead to exposed secrets that might be overlooked. In addition, some secrets might only surface during deployment runtime, like those revealed in deployment outputs, or resolved from Azure Key Vault. Scanning for cloud deployment secrets bridges this gap.
2828
- **Preventing lateral movement**: Discovery of exposed secrets within deployment resources poses a significant risk of unauthorized access.
2929
- Threat actors can exploit these vulnerabilities to traverse laterally across an environment, ultimately compromising critical services
3030
- Using attack path analysis with cloud deployment secrets scanning will automatically discover attack paths involving an Azure deployment that might lead to a sensitive data breach.
@@ -68,17 +68,13 @@ The following cloud deployment secrets security recommendations are available:
6868

6969
### Attack path scenarios
7070

71-
The table summarizes supported attack paths.
72-
73-
**VM** | **Attack paths**
74-
--- | ---
75-
Azure | Exposed Vulnerable VM has an insecure SSH private key that is used to authenticate to a VM.<br/>Exposed Vulnerable VM has insecure secrets that are used to authenticate to a storage account.<br/>Vulnerable VM has insecure secrets that are used to authenticate to a storage account.<br/>Exposed Vulnerable VM has insecure secrets that are used to authenticate to an SQL server.
76-
AWS | Exposed Vulnerable EC2 instance has an insecure SSH private key that is used to authenticate to an EC2 instance.<br/>Exposed Vulnerable EC2 instance has an insecure secret that are used to authenticate to a storage account.<br/>Exposed Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.<br/>Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.
77-
GCP | Exposed Vulnerable GCP VM instance has an insecure SSH private key that is used to authenticate to a GCP VM instance.
71+
The table summarizes supported attack paths. Currently an attack path for Azure Resource Manager deployments in Azure is supported: Internet exposed Azure VM with
7872

73+
7974
### Predefined cloud security explorer queries
8075

81-
Defender for Cloud provides these predefined queries for investigating secrets security issues:
76+
In cloud security explorer, you can currently search for Azure Resource Manager deployments. For example, you might search for:
77+
Azure resource manager deployments, that contain secrets such as connection strings, SAS tokens, that can authenticate to
8278

8379
- VM with plaintext secret that can authenticate to another VM - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
8480
- VM with plaintext secret that can authenticate to a storage account - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts

0 commit comments

Comments
 (0)