You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/remediate-cloud-deployment-secrets.md
+4-12Lines changed: 4 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,7 @@ This article helps you to identify and remediate security risks with cloud deplo
18
18
- An Azure account. If you don't already have an Azure account, you can [create your Azure free account today](https://azure.microsoft.com/free/).
19
19
20
20
-[Defender for Cloud](get-started.md) must be available in your Azure subscription.
21
-
22
-
- One or either of these Defender for Cloud plans [must be enabled](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features) either or both of the following two plans:
23
-
-[Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md)
- The [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) plan.
26
22
-[Agentless machine scanning](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines) must be enabled. Learn more about [agentless scanning](concept-agentless-data-collection.md#availability).
27
23
28
24
@@ -44,7 +40,9 @@ Attack path analysis is a graph-based algorithm that scans your [cloud security
44
40
45
41
## Remediate secrets with recommendations
46
42
47
-
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the Remediate vulnerabilities security control on the Recommendations page. Defender for Cloud provides a [number of cloud deployment secrets security recommendations](secrets-scanning-cloud-deployment.md#security-recommendations).
43
+
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the **Remediate vulnerabilities** security control on the Defender for Cloud **Recommendations** page.
44
+
45
+
Defender for Cloud provides a [number of cloud deployment secrets security recommendations](secrets-scanning-cloud-deployment.md#security-recommendations).
48
46
49
47
50
48
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -55,16 +53,10 @@ If a secret is found on your resource, that resource triggers an affiliated reco
55
53
56
54
1. Select one of the relevant recommendations.
57
55
58
-
59
-
60
-
:::image type="content" source="media/secret-scanning/recommendation-findings.png" alt-text="Screenshot that shows either of the two results under the Remediate vulnerabilities security control." lightbox="media/secret-scanning/recommendation-findings.png":::
61
-
62
56
1. Expand **Affected resources** to review the list of all resources that contain secrets.
63
57
64
58
1. In the Findings section, select a secret to view detailed information about the secret.
65
59
66
-
:::image type="content" source="media/secret-scanning/select-findings.png" alt-text="Screenshot that shows the detailed information of a secret after you have selected the secret in the findings section." lightbox="media/secret-scanning/select-findings.png":::
67
-
68
60
1. Expand **Remediation steps** and follow the listed steps.
69
61
70
62
1. Expand **Affected resources** to review the resources affected by this secret.
0 commit comments