|
1 | 1 | ---
|
2 |
| -title: What are the Cloud Security Graph, Attack Path Analysis, and the Cloud Security Explorer? |
| 2 | +title: What are the cloud security graph, attack path analysis, and the cloud security explorer? |
3 | 3 | description: Learn how to prioritize remediation of cloud misconfigurations and vulnerabilities based on risk.
|
4 | 4 | titleSuffix: Defender for Cloud attack path.
|
5 | 5 | ms.topic: conceptual
|
6 | 6 | ms.custom: ignite-2022
|
7 | 7 | ms.date: 09/21/2022
|
8 | 8 | ---
|
9 | 9 |
|
10 |
| -# What are the Cloud Security Graph, Attack Path Analysis, and the Cloud Security Explorer? |
| 10 | +# What are the cloud security graph, attack path analysis, and the cloud security explorer? |
11 | 11 |
|
12 | 12 | One of the biggest challenges that security teams face today is the number of security issues they face on a daily basis. There are numerous security issues that need to be resolve and never enough resources to address them all.
|
13 | 13 |
|
14 | 14 | Defender for Cloud's contextual security capabilities assists security teams to assess the risk behind each security issue, and identify the highest risk issues that need to be resolved soonest. Defender for Cloud assists security teams to reduce the risk of an impactful breach to their environment in the most effective way.
|
15 | 15 |
|
16 |
| -## What is Cloud Security Graph? |
| 16 | +## What is cloud security graph? |
17 | 17 |
|
18 |
| -The Cloud Security Graph is a graph-based context engine that exists within Defender for Cloud. The Cloud Security Graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected is then used to build a graph representing your multicloud environment. |
| 18 | +The cloud security graph is a graph-based context engine that exists within Defender for Cloud. The cloud security graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected is then used to build a graph representing your multicloud environment. |
19 | 19 |
|
20 |
| -Defender for Cloud then uses the generated graph to perform an Attack Path Analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the Cloud Security Explorer. |
| 20 | +Defender for Cloud then uses the generated graph to perform an attack path analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the cloud security explorer. |
21 | 21 |
|
22 | 22 | :::image type="content" source="media/concept-cloud-map/security-map.png" alt-text="Screenshot of a conceptualized graph that shows the complexity of security graphing." lightbox="media/concept-cloud-map/security-map.png":::
|
23 | 23 |
|
24 |
| -## What is Attack Path Analysis? |
| 24 | +## What is attack path analysis? |
25 | 25 |
|
26 |
| -Attack Path Analysis is a graph-based algorithm that scans the Cloud Security Graph. The scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack Path Analysis exposes those attack paths and suggests recommendations as to how best remediate the issues that will break the attack path and prevent successful breach. |
| 26 | +Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack path analysis exposes those attack paths and suggests recommendations as to how best remediate the issues that will break the attack path and prevent successful breach. |
27 | 27 |
|
28 |
| -By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more. Attack Path Analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first. |
| 28 | +By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more. Attack path analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first. |
29 | 29 |
|
30 | 30 | :::image type="content" source="media/concept-cloud-map/attack-path.png" alt-text="Image that shows a sample attack path from attacker to your sensitive data.":::
|
31 | 31 |
|
32 |
| -Learn how to use [Attack Path Analysis](how-to-manage-attack-path.md). |
| 32 | +Learn how to use [attack path analysis](how-to-manage-attack-path.md). |
33 | 33 |
|
34 |
| -## What is Cloud Security Explorer? |
| 34 | +## What is cloud security explorer? |
35 | 35 |
|
36 |
| -Using the Cloud Security Explorer, you can proactively identify security risks in your multicloud environment by running graph-based queries on the Cloud Security Graph. Your security team can use the query builder to search for and locate risks, while taking your organization's specific contextual and conventional information into account. |
| 36 | +Using the cloud security explorer, you can proactively identify security risks in your multicloud environment by running graph-based queries on the cloud security graph. Your security team can use the query builder to search for and locate risks, while taking your organization's specific contextual and conventional information into account. |
37 | 37 |
|
38 |
| -Cloud Security Explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud. Such as, cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more. |
| 38 | +Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud. Such as, cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more. |
39 | 39 |
|
40 |
| -Learn how to use the [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md), or check out the list of [insights and connections](attack-path-reference.md#insights-and-connections). |
| 40 | +Learn how to use the [cloud security explorer](how-to-manage-cloud-security-explorer.md), or check out the list of [insights and connections](attack-path-reference.md#insights-and-connections). |
41 | 41 |
|
42 | 42 | ## Next steps
|
43 | 43 |
|
|
0 commit comments