Skip to content

Commit 833da1f

Browse files
authored
Merge pull request #243785 from AlizaBernstein/WI-WI-98098b-disable-vulnerability-findings-capability-release
WI-98098b-disable-vulnerability-findings-capability-release
2 parents f7bdb4d + ef6430c commit 833da1f

File tree

6 files changed

+93
-4
lines changed

6 files changed

+93
-4
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -305,6 +305,8 @@
305305
href: how-to-enable-agentless-containers.md
306306
- name: View and remediate vulnerability assessment findings for registry images
307307
href: view-and-remediate-vulnerability-assessment-findings.md
308+
- name: Disable vulnerability assessment findings on Container registry images
309+
href: disable-vulnerability-findings-containers.md
308310
- name: Security recommendations
309311
items:
310312
- name: Create custom Azure security initiatives and policies

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Agentless Container Posture for Microsoft Defender for Cloud
33
description: Learn how Agentless Container Posture offers discovery, visibility, and vulnerability assessment for Containers without installing an agent on your machines.
44
ms.service: defender-for-cloud
55
ms.topic: conceptual
6-
ms.date: 06/21/2023
6+
ms.date: 07/03/2023
77
ms.custom: template-concept
88
---
99

@@ -86,7 +86,8 @@ Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerabi
8686

8787
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via the ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
8888
- **Query vulnerability information via sub-assessment API** - You can get scan results via REST API. See the [subassessment list](/rest/api/defenderforcloud/sub-assessments/get?tabs=HTTP).
89-
- **Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](how-to-enable-agentless-containers.md#support-for-exemptions).
89+
- **Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](how-to-enable-agentless-containers.md#support-for-exemptions).
90+
- **Support for disabling vulnerability findings** - Learn how to [disable vulnerability assessment findings on Container registry images](disable-vulnerability-findings-containers.md).
9091

9192
### Scan Triggers
9293

Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
---
2+
title: Disable vulnerability assessment findings on Container registry images and running images in Microsoft Defender for Cloud
3+
description: Microsoft Defender for Cloud includes a fully integrated agentless vulnerability assessment solution powered by MDVM (Microsoft Defender Vulnerability Management).
4+
ms.topic: how-to
5+
ms.date: 07/09/2023
6+
---
7+
8+
# Disable vulnerability assessment findings on container registry images
9+
10+
If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't affect your secure score or generate unwanted noise.
11+
12+
When a finding matches the criteria you've defined in your disable rules, it doesn't appear in the list of findings. Typical scenario examples include:
13+
14+
- Disable findings with severity below medium
15+
- Disable findings for images that the vendor will not fix
16+
17+
> [!IMPORTANT]
18+
> To create a rule, you need permissions to edit a policy in Azure Policy.
19+
> Learn more in [Azure RBAC permissions in Azure Policy](../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy).
20+
21+
22+
You can use a combination of any of the following criteria:
23+
24+
- **CVE** - Enter the CVEs of the findings you want to exclude. Ensure the CVEs are valid. Separate multiple CVEs with a semicolon. For example, CVE-2020-1347; CVE-2020-1346.
25+
- **Image digest** - Specify images for which vulnerabilities should be excluded based on the image digest. Separate multiple digests with a semicolon, for example: sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c
26+
- **OS version** - Specify images for which vulnerabilities should be excluded based on the image OS. Separate multiple versions with a semicolon, for example: ubuntu_linux_20.04;alpine_3.17
27+
- **Minimum Severity** - Select low, medium, high, or critical to exclude vulnerabilities less than and equal to the specified severity level.
28+
- **Fix status** - Select the option to exclude vulnerabilities based on their fix status.
29+
30+
31+
Disable rules apply per recommendation, for example, to disable [CVE-2017-17512](https://github.com/advisories/GHSA-fc69-2v7r-7r95) both on the registry images and runtime images, the disable rule has to be configured in both places.
32+
33+
> [!NOTE]
34+
> The [Azure Preview Supplemental Terms](//azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
35+
36+
To create a rule:
37+
38+
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) or [Running container images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management
39+
](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5), select **Disable rule**.
40+
41+
1. Select the relevant scope.
42+
43+
1. Define your criteria. You can use any of the following criteria:
44+
45+
- **CVE** - Enter the CVEs of the findings you want to exclude. Ensure the CVEs are valid. Separate multiple CVEs with a semicolon. For example, CVE-2020-1347; CVE-2020-1346.
46+
- **Image digest** - Specify images for which vulnerabilities should be excluded based on the image digest. Separate multiple digests with a semicolon, for example: sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c
47+
- **OS version** - Specify images for which vulnerabilities should be excluded based on the image OS. Separate multiple versions with a semicolon, for example: ubuntu_linux_20.04;alpine_3.17
48+
- **Minimum Severity** - Select low, medium, high, or critical to exclude vulnerabilities less than and equal to the specified severity level.
49+
- **Fix status** - Select the option to exclude vulnerabilities based on their fix status.
50+
51+
1. In the justification text box, add your justification for why a specific vulnerability was disabled. This provides clarity and understanding for anyone reviewing the rule.
52+
53+
1. Select **Apply rule**.
54+
55+
:::image type="content" source="./media/disable-vulnerability-findings-containers/disable-rules.png" alt-text="Screenshot showing where to create a disable rule for vulnerability findings on registry images." lightbox="media/disable-vulnerability-findings-containers/disable-rules.png":::
56+
57+
> [!IMPORTANT]
58+
> Changes might take up to 24hrs to take effect.
59+
60+
**To view, override, or delete a rule:**
61+
62+
1. From the recommendations detail page, select **Disable rule**.
63+
1. From the scope list, subscriptions with active rules show as **Rule applied**.
64+
1. To view or delete the rule, select the ellipsis menu ("...").
65+
1. Do one of the following:
66+
- To view or override a disable rule - select **View rule**, make any changes you want, and select **Override rule**.
67+
- To delete a disable rule - select **Delete rule**.
68+
69+
:::image type="content" source="./media/disable-vulnerability-findings-containers/override-rules.png" alt-text="Screenshot showing where to view, delete or override a rule for vulnerability findings on registry images." lightbox="media/disable-vulnerability-findings-containers/override-rules.png":::
70+
71+
72+
## Next steps
73+
74+
- Learn how to [view and remediate vulnerability assessment findings for registry images](view-and-remediate-vulnerability-assessment-findings.md).
75+
- Learn about [agentless container posture](concept-agentless-containers.md).
76+
88.2 KB
Loading
21 KB
Loading

articles/defender-for-cloud/release-notes.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: This page is updated frequently with the latest updates in Defender for Cloud.
44
ms.topic: overview
5-
ms.date: 06/28/2023
5+
ms.date: 07/09/2023
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -26,8 +26,18 @@ Updates in July include:
2626

2727
|Date |Update |
2828
|---------|---------|
29+
|July 9 | [Support for disabling specific vulnerability findings](#support-for-disabling-specific-vulnerability-findings)
2930
| July 1 | [Data Aware Security Posture is now Generally Available](#data-aware-security-posture-is-now-generally-available) |
3031

32+
### Support for disabling specific vulnerability findings
33+
34+
July 9, 2023
35+
36+
Release of support for disabling vulnerability findings for your container registry images or running images as part of agentless container posture. If you have an organizational need to ignore a vulnerability finding on your container registry image, rather than remediate it, you can optionally disable it. Disabled findings don't affect your secure score or generate unwanted noise.
37+
38+
Learn how to [disable vulnerability assessment findings on Container registry images](disable-vulnerability-findings-containers.md).
39+
40+
3141
### Data Aware Security Posture is now Generally Available
3242

3343
July 1, 2023
@@ -59,7 +69,7 @@ Updates in June include:
5969

6070
June 26, 2023
6171

62-
Defender for Cloud have improved the onboarding experience to include a new streamlined user interface and instructions in addition to new capabilities that allow you to onboard your AWS and GCP environments while providing access to advanced onboarding features.
72+
Defender for Cloud has improved the onboarding experience to include a new streamlined user interface and instructions in addition to new capabilities that allow you to onboard your AWS and GCP environments while providing access to advanced onboarding features.
6373

6474
For organizations that have adopted Hashicorp Terraform for automation, Defender for Cloud now includes the ability to use Terraform as the deployment method alongside AWS CloudFormation or GCP Cloud Shell. You can now customize the required role names when creating the integration. You can also select between:
6575

0 commit comments

Comments
 (0)