You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secrets-scanning-cloud-deployment.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Traditional secrets scanning solutions often detect misplaced secrets in code re
24
24
25
25
Scanning for cloud deployment secrets adds an extra layer of security, addressing scenarios such as:
26
26
27
-
-**Increased security coverage: In Defender for Cloud, DevOps security capabilities in Defender for Cloud [can identify exposed secrets](defender-for-devops-introduction.md) within source control management platforms. However, manually triggered cloud deployments from a developer’s workstation can lead to exposed secrets that might be overlooked. In addition, some secrets might only surface during deployment runtime, like those revealed in deployment outputs, or resolved from Azure Key Vault. Scanning for cloud deployment secrets bridges this gap.
27
+
-**Increased security coverage**: In Defender for Cloud, DevOps security capabilities in Defender for Cloud [can identify exposed secrets](defender-for-devops-introduction.md) within source control management platforms. However, manually triggered cloud deployments from a developer’s workstation can lead to exposed secrets that might be overlooked. In addition, some secrets might only surface during deployment runtime, like those revealed in deployment outputs, or resolved from Azure Key Vault. Scanning for cloud deployment secrets bridges this gap.
28
28
-**Preventing lateral movement**: Discovery of exposed secrets within deployment resources poses a significant risk of unauthorized access.
29
29
- Threat actors can exploit these vulnerabilities to traverse laterally across an environment, ultimately compromising critical services
30
30
- Using attack path analysis with cloud deployment secrets scanning will automatically discover attack paths involving an Azure deployment that might lead to a sensitive data breach.
@@ -68,17 +68,13 @@ The following cloud deployment secrets security recommendations are available:
68
68
69
69
### Attack path scenarios
70
70
71
-
The table summarizes supported attack paths.
72
-
73
-
**VM** | **Attack paths**
74
-
--- | ---
75
-
Azure | Exposed Vulnerable VM has an insecure SSH private key that is used to authenticate to a VM.<br/>Exposed Vulnerable VM has insecure secrets that are used to authenticate to a storage account.<br/>Vulnerable VM has insecure secrets that are used to authenticate to a storage account.<br/>Exposed Vulnerable VM has insecure secrets that are used to authenticate to an SQL server.
76
-
AWS | Exposed Vulnerable EC2 instance has an insecure SSH private key that is used to authenticate to an EC2 instance.<br/>Exposed Vulnerable EC2 instance has an insecure secret that are used to authenticate to a storage account.<br/>Exposed Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.<br/>Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server.
77
-
GCP | Exposed Vulnerable GCP VM instance has an insecure SSH private key that is used to authenticate to a GCP VM instance.
71
+
The table summarizes supported attack paths. Currently an attack path for Azure Resource Manager deployments in Azure is supported: Internet exposed Azure VM with
78
72
73
+
79
74
### Predefined cloud security explorer queries
80
75
81
-
Defender for Cloud provides these predefined queries for investigating secrets security issues:
76
+
In cloud security explorer, you can currently search for Azure Resource Manager deployments. For example, you might search for:
77
+
Azure resource manager deployments, that contain secrets such as connection strings, SAS tokens, that can authenticate to
82
78
83
79
- VM with plaintext secret that can authenticate to another VM - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
84
80
- VM with plaintext secret that can authenticate to a storage account - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts
0 commit comments