Skip to content

Commit 7606a71

Browse files
authored
Merge pull request #246323 from AlizaBernstein/WI-141466-add-standard-for-gcp
WI-141466-add-standard-for-gcp
2 parents 3d0ca01 + b51a43d commit 7606a71

File tree

5 files changed

+47
-22
lines changed

5 files changed

+47
-22
lines changed
67.9 KB
Loading
9.43 KB
Loading
89.1 KB
Loading
9.13 KB
Loading

articles/defender-for-cloud/update-regulatory-compliance-packages.md

Lines changed: 47 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: The regulatory compliance dashboard
3-
description: Learn how to add and remove regulatory standards from the regulatory compliance dashboard in Defender for Cloud
3+
description: Learn how to assign and remove regulatory standards from the regulatory compliance dashboard in Defender for Cloud
44
ms.topic: how-to
5-
ms.date: 06/18/2023
5+
ms.date: 09/11/2023
66
ms.custom: ignite-2022
77
---
88

@@ -26,24 +26,25 @@ Microsoft tracks the regulatory standards themselves and automatically improves
2626
## What regulatory compliance standards are available in Defender for Cloud?
2727

2828
By default:
29+
2930
- Azure subscriptions get the **Microsoft cloud security benchmark** assigned. This is the Microsoft-authored, cloud specific guidelines for security and compliance best practices based on common compliance frameworks. [Learn more about Microsoft cloud security benchmark](/security/benchmark/azure/introduction).
3031
- AWS accounts get the **AWS Foundational Security Best Practices** standard assigned. This is the AWS-specific guideline for security and compliance best practices based on common compliance frameworks.
3132
- GCP projects get the **GCP Default** standard assigned.
3233

33-
If a subscription, account, or project has *any* Defender plan enabled, additional standards can be applied.
34+
If a subscription, account, or project has *any* Defender plan enabled, more standards can be applied.
3435

3536
**Available regulatory standards**:
3637

3738
| Standards for Azure subscriptions | Standards for AWS accounts | Standards for GCP projects |
3839
| ----------------------------------| ------------------------------| ---------------------------|
39-
| PCI-DSS v3.2.1 **(deprecated)** | CIS 1.2.0 | CIS 1.1.0 |
40-
| PCI DSS v4 | CIS 1.5.0 | CIS 1.2.0 |
40+
| PCI-DSS v3.2.1 **(deprecated)** | CIS AWS Foundations v1.2.0 | CIS GCP Foundations v1.1.0 |
41+
| PCI DSS v4 | CIS AWS Foundations v1.5.0 | CIS GCP Foundations v1.2.0 |
4142
| SOC TSP | PCI DSS v3.2.1 | PCI DSS v3.2.1 |
4243
| SOC 2 Type 2 | | NIST 800-53 |
4344
| ISO 27001:2013 | | ISO 27001 |
44-
| Azure CIS 1.1.0 |||
45-
| Azure CIS 1.3.0 |||
46-
| Azure CIS 1.4.0 |||
45+
| CIS Azure Foundations v1.1.0 |||
46+
| CIS Azure Foundations v1.3.0 |||
47+
| CIS Azure Foundations v1.4.0 |||
4748
| NIST SP 800-53 R4 |||
4849
| NIST SP 800-53 R5 |||
4950
| NIST SP 800 171 R2 |||
@@ -70,12 +71,15 @@ The following steps explain how to add a package to monitor your compliance with
7071

7172
To add standards to your dashboard:
7273

73-
- The subscription must have Defender for Cloud's enhanced security features enabled
74+
- The subscription must have one or more [Defender plans enabled](connect-azure-subscription.md#enable-all-paid-plans-on-your-subscription).
7475
- The user must have owner or policy contributor permissions
7576

77+
> [!NOTE]
78+
> It may take a few hours for a newly added standard to appear in the compliance dashboard.
79+
7680
### Add a standard to your Azure subscriptions
7781

78-
1. From Defender for Cloud's menu, select **Regulatory compliance** to open the regulatory compliance dashboard. Here you'll see the compliance standards assigned to the currently selected subscriptions.
82+
1. From Defender for Cloud's menu, select **Regulatory compliance** to open the regulatory compliance dashboard. Here you can see the compliance standards assigned to the currently selected subscriptions.
7983

8084
1. From the top of the page, select **Manage compliance policies**.
8185

@@ -95,26 +99,47 @@ To add standards to your dashboard:
9599

96100
1. From Defender for Cloud's menu, select **Regulatory compliance** again to go back to the regulatory compliance dashboard.
97101

98-
Your new standard appears in your list of Industry & regulatory standards.
102+
The selected standard appears on the dashboard.
99103

100-
> [!NOTE]
101-
> It may take a few hours for a newly added standard to appear in the compliance dashboard.
104+
:::image type="content" source="media/concept-regulatory-compliance/compliance-dashboard.png" alt-text="Screenshot showing regulatory compliance dashboard." lightbox="media/concept-regulatory-compliance/compliance-dashboard.png":::
105+
106+
### Assign a standard to your AWS accounts
107+
108+
To assign regulatory compliance standards on AWS accounts:
109+
110+
1. Navigate to **Environment settings**.
111+
1. Select the relevant AWS account.
112+
1. Select **Standards**.
113+
1. Select the three dots alongside an unassigned standard and select **Assign standard**.
102114

103-
:::image type="content" source="media/concept-regulatory-compliance/compliance-dashboard.png" alt-text="Screenshot showing regulatory compliance dashboard." lightbox="media/concept-regulatory-compliance/compliance-dashboard.png":::
115+
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-aws-from-list.png" alt-text="Screenshot that shows where to select a standard to assign." lightbox="media/update-regulatory-compliance-packages/assign-standard-aws-from-list.png":::
104116

105-
### Add a standard to your AWS accounts
117+
1. At the prompt, select **Yes**. The standard is assigned to your AWS account.
106118

107-
To add regulatory compliance standards on AWS accounts:
119+
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-aws.png" alt-text="Screenshot of the prompt to assign a regulatory compliance standard to the AWS account." lightbox="media/update-regulatory-compliance-packages/assign-standard-aws.png":::
120+
121+
1. From Defender for Cloud's menu, select **Regulatory compliance** again to go back to the regulatory compliance dashboard.
122+
123+
The selected standard appears on the dashboard.
124+
125+
### Assign a standard to your GCP projects
126+
127+
To assign regulatory compliance standards on GCP projects:
108128

109129
1. Navigate to **Environment settings**.
110-
1. Select the relevant account.
130+
1. Select the relevant GCP project.
111131
1. Select **Standards**.
112-
1. Select **Add** and choose **Standard**.
113-
1. Choose a standard from the drop-down menu.
114-
1. Select **Save**.
132+
1. Select the three dots alongside an unassigned standard and select **Assign standard**.
133+
134+
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-gcp-from-list.png" alt-text="Screenshot that shows where to select a GCP standard to assign." lightbox="media/update-regulatory-compliance-packages/assign-standard-gcp-from-list.png":::
135+
136+
1. At the prompt, select **Yes**. The standard is assigned to your GCP project.
115137

116-
:::image type="content" source="media/update-regulatory-compliance-packages/add-aws-regulatory-compliance.png" alt-text="Screenshot of adding regulatory compliance standard to AWS account." lightbox="media/update-regulatory-compliance-packages/add-aws-regulatory-compliance.png":::
138+
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-gcp.png" alt-text="Screenshot of the prompt to assign a regulatory compliance standard to the GCP project." lightbox="media/update-regulatory-compliance-packages/assign-standard-gcp.png":::
139+
140+
1. From Defender for Cloud's menu, select **Regulatory compliance** again to go back to the regulatory compliance dashboard.
117141

142+
The selected standard appears on the dashboard.
118143

119144
## Remove a standard from your dashboard
120145

@@ -131,7 +156,7 @@ To remove a standard:
131156
132157
The security policy page opens. For the selected subscription, it shows the default policy, the industry and regulatory standards, and any custom initiatives you've created.
133158

134-
:::image type="content" source="./media/update-regulatory-compliance-packages/remove-standard.png" alt-text="Remove a regulatory standard from your regulatory compliance dashboard in Microsoft Defender for Cloud.":::
159+
:::image type="content" source="./media/update-regulatory-compliance-packages/remove-standard.png" alt-text="Remove a regulatory standard from your regulatory compliance dashboard in Microsoft Defender for Cloud." lightbox="media/update-regulatory-compliance-packages/remove-standard.png":::
135160

136161
1. For the standard you want to remove, select **Disable**. A confirmation window appears.
137162

0 commit comments

Comments
 (0)