Skip to content

Commit 74bf531

Browse files
authored
Merge pull request #214834 from ElazarK/capitals
capitalization
2 parents 0bac163 + fd8a169 commit 74bf531

19 files changed

+80
-80
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,10 @@
122122
- name: Cloud Security Posture Management (CSPM)
123123
displayName: CSPM, cloud security, posture, management
124124
href: concept-cloud-security-posture-management.md
125-
- name: Microsoft Cloud Security Benchmark (MCSB)
125+
- name: Microsoft cloud security benchmark (MCSB)
126126
href: concept-regulatory-compliance.md
127-
- name: What is the Cloud Security Graph
128-
displayName: What are the Cloud Security Graph, Attack Path Analysis, and the Cloud Security Explorer?
127+
- name: What is the cloud security graph
128+
displayName: What are the cloud security graph, attack path analysis, and the cloud security explorer?
129129
href: concept-attack-path.md
130130
- name: External attack surface management (EASM)
131131
displayName: EASM, attack surface management
@@ -167,7 +167,7 @@
167167
items:
168168
- name: Identify and remediate attack paths
169169
href: how-to-manage-attack-path.md
170-
- name: Build queries with Cloud Security Explorer
170+
- name: Build queries with cloud security explorer
171171
href: how-to-manage-cloud-security-explorer.md
172172
- name: Security recommendations
173173
items:

articles/defender-for-cloud/apply-security-baseline.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Harden your Windows and Linux OS with Azure security baseline and Microsoft Defender for Cloud
3-
description: Learn how Microsoft Defender for Cloud uses the guest configuration to compare your OS hardening with the guidance from Microsoft Cloud Security Benchmark
3+
description: Learn how Microsoft Defender for Cloud uses the guest configuration to compare your OS hardening with the guidance from Microsoft cloud security benchmark
44
ms.topic: how-to
55
ms.custom: ignite-2022
66
ms.author: benmansheim
@@ -11,7 +11,7 @@ ms.date: 11/09/2021
1111

1212
To reduce a machine's attack surface and avoid known risks, it's important to configure the operating system (OS) as securely as possible.
1313

14-
The Microsoft Cloud Security Benchmark has guidance for OS hardening which has led to security baseline documents for [Windows](../governance/policy/samples/guest-configuration-baseline-windows.md) and [Linux](../governance/policy/samples/guest-configuration-baseline-linux.md).
14+
The Microsoft cloud security benchmark has guidance for OS hardening which has led to security baseline documents for [Windows](../governance/policy/samples/guest-configuration-baseline-windows.md) and [Linux](../governance/policy/samples/guest-configuration-baseline-linux.md).
1515

1616
Use the security recommendations described in this article to assess the machines in your environment and:
1717

@@ -35,7 +35,7 @@ Microsoft Defender for Cloud includes two recommendations that check whether the
3535
- For **Windows** machines, [Vulnerabilities in security configuration on your Windows machines should be remediated (powered by Guest Configuration)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/8c3d9ad0-3639-4686-9cd2-2b2ab2609bda) compares the configuration with the [Windows security baseline](../governance/policy/samples/guest-configuration-baseline-windows.md).
3636
- For **Linux** machines, [Vulnerabilities in security configuration on your Linux machines should be remediated (powered by Guest Configuration)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/1f655fb7-63ca-4980-91a3-56dbc2b715c6) compares the configuration with the [Linux security baseline](../governance/policy/samples/guest-configuration-baseline-linux.md).
3737

38-
These recommendations use the guest configuration feature of Azure Policy to compare the OS configuration of a machine with the baseline defined in the [Microsoft Cloud Security Benchmark](/security/benchmark/azure/overview).
38+
These recommendations use the guest configuration feature of Azure Policy to compare the OS configuration of a machine with the baseline defined in the [Microsoft cloud security benchmark](/security/benchmark/azure/overview).
3939

4040
## Compare machines in your subscriptions with the OS security baselines
4141

@@ -103,4 +103,4 @@ To learn more about these configuration settings, see:
103103

104104
- [Windows security baseline](../governance/policy/samples/guest-configuration-baseline-windows.md)
105105
- [Linux security baseline](../governance/policy/samples/guest-configuration-baseline-linux.md)
106-
- [Microsoft Cloud Security Benchmark](/security/benchmark/azure/overview)
106+
- [Microsoft cloud security benchmark](/security/benchmark/azure/overview)

articles/defender-for-cloud/attack-path-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,6 @@ To learn about how to respond to these attack paths, see [Identify and remediate
104104
## Next steps
105105

106106
For related information, see the following:
107-
- [What are the Cloud Security Graph, Attack Path Analysis, and the Cloud Security Explorer?](concept-attack-path.md)
107+
- [What are the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md)
108108
- [Identify and remediate attack paths](how-to-manage-attack-path.md)
109-
- [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md)
109+
- [Cloud security explorer](how-to-manage-cloud-security-explorer.md)

articles/defender-for-cloud/concept-attack-path.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,43 +1,43 @@
11
---
2-
title: What are the Cloud Security Graph, Attack Path Analysis, and the Cloud Security Explorer?
2+
title: What are the cloud security graph, attack path analysis, and the cloud security explorer?
33
description: Learn how to prioritize remediation of cloud misconfigurations and vulnerabilities based on risk.
44
titleSuffix: Defender for Cloud attack path.
55
ms.topic: conceptual
66
ms.custom: ignite-2022
77
ms.date: 09/21/2022
88
---
99

10-
# What are the Cloud Security Graph, Attack Path Analysis, and the Cloud Security Explorer?
10+
# What are the cloud security graph, attack path analysis, and the cloud security explorer?
1111

1212
One of the biggest challenges that security teams face today is the number of security issues they face on a daily basis. There are numerous security issues that need to be resolve and never enough resources to address them all.
1313

1414
Defender for Cloud's contextual security capabilities assists security teams to assess the risk behind each security issue, and identify the highest risk issues that need to be resolved soonest. Defender for Cloud assists security teams to reduce the risk of an impactful breach to their environment in the most effective way.
1515

16-
## What is Cloud Security Graph?
16+
## What is cloud security graph?
1717

18-
The Cloud Security Graph is a graph-based context engine that exists within Defender for Cloud. The Cloud Security Graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected is then used to build a graph representing your multicloud environment.
18+
The cloud security graph is a graph-based context engine that exists within Defender for Cloud. The cloud security graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected is then used to build a graph representing your multicloud environment.
1919

20-
Defender for Cloud then uses the generated graph to perform an Attack Path Analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the Cloud Security Explorer.
20+
Defender for Cloud then uses the generated graph to perform an attack path analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the cloud security explorer.
2121

2222
:::image type="content" source="media/concept-cloud-map/security-map.png" alt-text="Screenshot of a conceptualized graph that shows the complexity of security graphing." lightbox="media/concept-cloud-map/security-map.png":::
2323

24-
## What is Attack Path Analysis?
24+
## What is attack path analysis?
2525

26-
Attack Path Analysis is a graph-based algorithm that scans the Cloud Security Graph. The scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack Path Analysis exposes those attack paths and suggests recommendations as to how best remediate the issues that will break the attack path and prevent successful breach.
26+
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack path analysis exposes those attack paths and suggests recommendations as to how best remediate the issues that will break the attack path and prevent successful breach.
2727

28-
By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more. Attack Path Analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.
28+
By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more. Attack path analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.
2929

3030
:::image type="content" source="media/concept-cloud-map/attack-path.png" alt-text="Image that shows a sample attack path from attacker to your sensitive data.":::
3131

32-
Learn how to use [Attack Path Analysis](how-to-manage-attack-path.md).
32+
Learn how to use [attack path analysis](how-to-manage-attack-path.md).
3333

34-
## What is Cloud Security Explorer?
34+
## What is cloud security explorer?
3535

36-
Using the Cloud Security Explorer, you can proactively identify security risks in your multicloud environment by running graph-based queries on the Cloud Security Graph. Your security team can use the query builder to search for and locate risks, while taking your organization's specific contextual and conventional information into account.
36+
Using the cloud security explorer, you can proactively identify security risks in your multicloud environment by running graph-based queries on the cloud security graph. Your security team can use the query builder to search for and locate risks, while taking your organization's specific contextual and conventional information into account.
3737

38-
Cloud Security Explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud. Such as, cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.
38+
Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud. Such as, cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.
3939

40-
Learn how to use the [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md), or check out the list of [insights and connections](attack-path-reference.md#insights-and-connections).
40+
Learn how to use the [cloud security explorer](how-to-manage-cloud-security-explorer.md), or check out the list of [insights and connections](attack-path-reference.md#insights-and-connections).
4141

4242
## Next steps
4343

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Overview of Cloud Security Posture Management (CSPM)
33
description: Learn more about the new Defender CSPM plan and the other enhanced security features that can be enabled for your multicloud environment through the Defender Cloud Security Posture Management (CSPM) plan.
44
ms.topic: conceptual
55
ms.custom: ignite-2022
6-
ms.date: 09/20/2022
6+
ms.date: 10/18/2022
77
---
88

99
# Cloud Security Posture Management (CSPM)
@@ -32,13 +32,13 @@ The following table summarizes what's included in each plan and their cloud avai
3232
| [Secure score](secure-score-access-and-track.md) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
3333
| [Governance](#security-governance-and-regulatory-compliance) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
3434
| [Regulatory compliance](#security-governance-and-regulatory-compliance) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
35-
| [Cloud Security Explorer](#cloud-security-explorer) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
36-
| [Attack Path Analysis](#attack-path-analysis) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
35+
| [Cloud security explorer](#cloud-security-explorer) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
36+
| [Attack path analysis](#attack-path-analysis) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
3737
| [Agentless scanning for machines](#agentless-scanning-for-machines) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
3838

3939

4040
> [!NOTE]
41-
> If you have enabled Defender for DevOps, you will only gain Cloud Security Graph and Attack Path Analysis to the artifacts that arrive through those connectors.
41+
> If you have enabled Defender for DevOps, you will only gain cloud security graph and attack path analysis to the artifacts that arrive through those connectors.
4242
>
4343
> To enable Governance for for DevOps related recommendations, the Defender Cloud Security Posture Management (CSPM) plan needs to be enabled on the Azure subscription that hosts the DevOps connector.
4444
@@ -50,24 +50,24 @@ Defender for Cloud continuously assesses your hybrid cloud environment to analyz
5050

5151
Learn more about [security and regulatory compliance in Defender for Cloud](concept-regulatory-compliance.md).
5252

53-
## Cloud Security Explorer
53+
## Cloud security explorer
5454

55-
The Cloud Security Graph is a graph-based context engine that exists within Defender for Cloud. The Cloud Security Graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected is then used to build a graph representing your multicloud environment.
55+
The cloud security graph is a graph-based context engine that exists within Defender for Cloud. The cloud security graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected is then used to build a graph representing your multicloud environment.
5656

57-
Defender for Cloud then uses the generated graph to perform an Attack Path Analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the Cloud Security Explorer.
57+
Defender for Cloud then uses the generated graph to perform an attack path analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the cloud security explorer.
5858

59-
Learn more about [Cloud Security Explorer](concept-attack-path.md#what-is-cloud-security-explorer)
59+
Learn more about [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer)
6060

61-
## Attack Path Analysis
61+
## Attack path analysis
6262

63-
Attack Path Analysis is a graph-based algorithm that scans the Cloud Security Graph. The scans:
63+
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans:
6464

6565
- expose exploitable paths that attackers may use to breach your environment and reach your high-impact assets
6666
- provide recommendations for ways to prevent successful breaches
6767

6868
By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more, this analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.
6969

70-
Learn more about [Attack Path Analysis](concept-attack-path.md#what-is-attack-path-analysis).
70+
Learn more about [attack path analysis](concept-attack-path.md#what-is-attack-path-analysis).
7171

7272
## Agentless scanning for machines
7373

articles/defender-for-cloud/concept-easm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,4 +30,4 @@ You can also learn how to [deploy Defender for EASM](../external-attack-surface-
3030

3131
## Next step
3232

33-
[What are the Cloud Security Graph, Attack Path Analysis, and the Cloud Security Explorer?](concept-attack-path.md)
33+
[What are the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md)

articles/defender-for-cloud/concept-regulatory-compliance.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Regulatory compliance Microsoft Cloud Security Benchmark
3-
description: Learn about the Microsoft Cloud Security Benchmark and the benefits it can bring to your compliance standards across your multicloud environments.
4-
titleSuffix: Microsoft Cloud Security Benchmark
2+
title: Regulatory compliance Microsoft cloud security benchmark
3+
description: Learn about the Microsoft cloud security benchmark and the benefits it can bring to your compliance standards across your multicloud environments.
4+
titleSuffix: Microsoft cloud security benchmark
55
ms.topic: conceptual
66
ms.custom: ignite-2022
77
ms.date: 09/21/2022
88
---
99

10-
# Microsoft Cloud Security Benchmark in Defender for Cloud
10+
# Microsoft cloud security benchmark in Defender for Cloud
1111

1212
Microsoft Defender for Cloud streamlines the process for meeting regulatory compliance requirements, using the **regulatory compliance dashboard**. Defender for Cloud continuously assesses your hybrid cloud environment to analyze the risk factors according to the controls and best practices in the standards that you've applied to your subscriptions. The dashboard reflects the status of your compliance with these standards.
1313

14-
The [Microsoft Cloud Security Benchmark](/security/benchmark/azure/introduction) (MCSB) is automatically assigned to your subscriptions and accounts when you onboard Defender for Cloud. This benchmark builds on the cloud security principles defined by the Azure Security Benchmark and applies these principles with detailed technical implementation guidance for Azure, for other cloud providers (such as AWS and GCP), and for other Microsoft clouds.
14+
The [Microsoft cloud security benchmark](/security/benchmark/azure/introduction) (MCSB) is automatically assigned to your subscriptions and accounts when you onboard Defender for Cloud. This benchmark builds on the cloud security principles defined by the Azure Security Benchmark and applies these principles with detailed technical implementation guidance for Azure, for other cloud providers (such as AWS and GCP), and for other Microsoft clouds.
1515

16-
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft Cloud Security Benchmark.":::
16+
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark.":::
1717

1818
The compliance dashboard gives you a view of your overall compliance standing. Security for non-Azure platforms follows the same cloud-neutral security principles as Azure. Each control within the benchmark provides the same granularity and scope of technical guidance across Azure and other cloud resources.
1919

0 commit comments

Comments
 (0)