Skip to content

Commit 82b40dd

Browse files
secrets docs
1 parent 28af26e commit 82b40dd

File tree

2 files changed

+9
-15
lines changed

2 files changed

+9
-15
lines changed

articles/defender-for-cloud/remediate-cloud-deployment-secrets.md

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,7 @@ This article helps you to identify and remediate security risks with cloud deplo
1818
- An Azure account. If you don't already have an Azure account, you can [create your Azure free account today](https://azure.microsoft.com/free/).
1919

2020
- [Defender for Cloud](get-started.md) must be available in your Azure subscription.
21-
22-
- One or either of these Defender for Cloud plans [must be enabled](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features) either or both of the following two plans:
23-
- [Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md)
24-
- [Defender CSPM](concept-cloud-security-posture-management.md)
25-
21+
- The [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) plan.
2622
- [Agentless machine scanning](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines) must be enabled. Learn more about [agentless scanning](concept-agentless-data-collection.md#availability).
2723

2824

@@ -44,7 +40,9 @@ Attack path analysis is a graph-based algorithm that scans your [cloud security
4440

4541
## Remediate secrets with recommendations
4642

47-
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the Remediate vulnerabilities security control on the Recommendations page. Defender for Cloud provides a [number of cloud deployment secrets security recommendations](secrets-scanning-cloud-deployment.md#security-recommendations).
43+
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the **Remediate vulnerabilities** security control on the Defender for Cloud **Recommendations** page.
44+
45+
Defender for Cloud provides a [number of cloud deployment secrets security recommendations](secrets-scanning-cloud-deployment.md#security-recommendations).
4846

4947

5048
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -55,16 +53,10 @@ If a secret is found on your resource, that resource triggers an affiliated reco
5553

5654
1. Select one of the relevant recommendations.
5755

58-
59-
60-
:::image type="content" source="media/secret-scanning/recommendation-findings.png" alt-text="Screenshot that shows either of the two results under the Remediate vulnerabilities security control." lightbox="media/secret-scanning/recommendation-findings.png":::
61-
6256
1. Expand **Affected resources** to review the list of all resources that contain secrets.
6357

6458
1. In the Findings section, select a secret to view detailed information about the secret.
6559

66-
:::image type="content" source="media/secret-scanning/select-findings.png" alt-text="Screenshot that shows the detailed information of a secret after you have selected the secret in the findings section." lightbox="media/secret-scanning/select-findings.png":::
67-
6860
1. Expand **Remediation steps** and follow the listed steps.
6961

7062
1. Expand **Affected resources** to review the resources affected by this secret.

articles/defender-for-cloud/secrets-scanning.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,15 +21,17 @@ Defender for Cloud provides secrets scanning for virtual machines, and for cloud
2121

2222
- **Virtual machines (VMs)**: Agentless secrets scanning on multicloud VMs.
2323
- **Cloud deployments**: Agentless secrets scanning across multicloud infrastructure-as-code deployment resources.
24-
- **Azure DevOps**: Scanning to discover exposed secrets in Azure DevOps.
24+
- **Azure DevOps**: [Scanning to discover exposed secrets in Azure DevOps](defender-for-devops-introduction.md).
25+
2526

2627

2728

2829
## Deploying secrets scanning
2930

3031
Secrets scanning is provided as a feature in Defender for Cloud plans:
31-
- VM scanning: Provided with Defender for Cloud Security Posture Management (CSPM) plan, or with Defender for Servers Plan 2.
32-
- Cloud deployment resource scanning: Provided with Defender CSPM
32+
- **VM scanning**: Provided with Defender for Cloud Security Posture Management (CSPM) plan, or with Defender for Servers Plan 2.
33+
- **Cloud deployment resource scanning** Provided with Defender CSPM.
34+
- **DevOps scanning**: Provided with Defender CSPM.
3335

3436
## Reviewing secrets findings
3537

0 commit comments

Comments
 (0)