Skip to content

Commit 83c1f4c

Browse files
authored
Merge pull request #256251 from ElazarK/WI158655-&-WI158654
attack path and risk
2 parents 5baef7b + 27df5be commit 83c1f4c

35 files changed

+59
-291
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -884,6 +884,11 @@
884884
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
885885
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",
886886
"redirect_document_id": true
887+
},
888+
{
889+
"source_path_from_root": "/articles/defender-for-cloud/attack-path-reference.md",
890+
"redirect_url": "/azure/defender-for-cloud/how-to-manage-attack-path",
891+
"redirect_document_id": true
887892
}
888893
]
889894
}

articles/defender-for-cloud/TOC.yml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -250,9 +250,6 @@
250250
- name: Reference list of DevOps recommendations
251251
displayName: devops, recommendations
252252
href: recommendations-reference-devops.md
253-
- name: Reference list of attack paths and cloud security graph components
254-
displayName: attack, paths, security, graph, components
255-
href: attack-path-reference.md
256253
- name: Security alerts and incidents
257254
items:
258255
- name: About security alerts and incidents

articles/defender-for-cloud/attack-path-reference.md

Lines changed: 0 additions & 202 deletions
This file was deleted.

articles/defender-for-cloud/concept-data-security-posture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dcurwin
55
ms.author: dacurwin
66
ms.service: defender-for-cloud
77
ms.topic: conceptual
8-
ms.date: 09/05/2023
8+
ms.date: 10/26/2023
99
---
1010
# About data-aware security posture
1111

@@ -37,7 +37,7 @@ Defender CSPM provides visibility and contextual insights into your organization
3737

3838
Attack path analysis helps you to address security issues that pose immediate threats, and have the greatest potential for exploit in your environment. Defender for Cloud analyzes which security issues are part of potential attack paths that attackers could use to breach your environment. It also highlights the security recommendations that need to be resolved in order to mitigate the risks.
3939

40-
You can discover risk of data breaches by attack paths of internet-exposed VMs that have access to sensitive data stores. Hackers can exploit exposed VMs to move laterally across the enterprise to access these stores. Review [attack paths](attack-path-reference.md#attack-paths).
40+
You can discover risk of data breaches by attack paths of internet-exposed VMs that have access to sensitive data stores. Hackers can exploit exposed VMs to move laterally across the enterprise to access these stores.
4141

4242
### Cloud Security Explorer
4343

articles/defender-for-cloud/defender-for-cloud-glossary.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Defender for Cloud glossary
33
description: The glossary provides a brief description of important Defender for Cloud platform terms and concepts.
4-
ms.date: 07/18/2023
4+
ms.date: 11/08/2023
55
ms.topic: article
66
---
77

@@ -67,7 +67,7 @@ Azure Security Benchmark provides recommendations on how you can secure your clo
6767

6868
### **Attack Path Analysis**
6969

70-
A graph-based algorithm that scans the cloud security graph, exposes attack paths and suggests recommendations as to how best remediate issues that will break the attack path and prevent successful breach. See [What is attack path analysis?](concept-attack-path.md#what-is-attack-path-analysis).
70+
A graph-based algorithm that scans the cloud security graph, exposes attack paths and suggests recommendations as to how best remediate issues that break the attack path and prevent successful breach. See [What is attack path analysis?](concept-attack-path.md#what-is-attack-path-analysis).
7171

7272
### **Auto-provisioning**
7373

@@ -129,7 +129,7 @@ Data-aware security posture automatically discovers datastores containing sensit
129129

130130
### Defender agent
131131

132-
The DaemonSet that is deployed on each node, collects signals from hosts using eBPF technology, and provides runtime protection. The agent is registered with a Log Analytics workspace, and used as a data pipeline. However, the audit log data isn't stored in the Log Analytics workspace. It is deployed under AKS Security profile in AKS clusters and as an Arc extension in Arc enabled Kubernetes clusters. For more information, see [Architecture for each Kubernetes environment](defender-for-containers-architecture.md#architecture-for-each-kubernetes-environment).
132+
The DaemonSet that is deployed on each node, collects signals from hosts using eBPF technology, and provides runtime protection. The agent is registered with a Log Analytics workspace, and used as a data pipeline. However, the audit log data isn't stored in the Log Analytics workspace. It's deployed under AKS Security profile in AKS clusters and as an Arc extension in Arc enabled Kubernetes clusters. For more information, see [Architecture for each Kubernetes environment](defender-for-containers-architecture.md#architecture-for-each-kubernetes-environment).
133133

134134
### **DDOS Attack**
135135

@@ -139,7 +139,7 @@ Distributed denial-of-service, a type of attack where an attacker sends more req
139139

140140
### **EASM**
141141

142-
External Attack Surface Management. See [EASM Overview](how-to-manage-attack-path.md#external-attack-surface-management-easm).
142+
External Attack Surface Management. See [EASM Overview](concept-easm.md).
143143

144144
### **EDR**
145145

@@ -229,7 +229,7 @@ Microsoft Defender Vulnerability Management. Learn how to [enable vulnerability
229229

230230
### **MFA**
231231

232-
Multi-factor authentication, a process in which users are prompted during the sign-in process for an extra form of identification, such as a code on their cellphone or a fingerprint scan.[How it works: Azure Multi Factor Authentication](../active-directory/authentication/concept-mfa-howitworks.md).
232+
Multifactor authentication, a process in which users are prompted during the sign-in process for an extra form of identification, such as a code on their cellphone or a fingerprint scan.[How it works: Azure multifactor authentication](../active-directory/authentication/concept-mfa-howitworks.md).
233233

234234
### **MITRE ATT&CK**
235235

@@ -301,7 +301,7 @@ Security alerts are the notifications generated by Defender for Cloud and Defend
301301

302302
### **Security Initiative**
303303

304-
A collection of Azure Policy Definitions, or rules, that are grouped together towards a specific goal or purpose. [What are security policies, initiatives, and recommendations?](security-policy-concept.md)
304+
A collection of Azure Policy Definitions, or rules that are grouped together towards a specific goal or purpose. [What are security policies, initiatives, and recommendations?](security-policy-concept.md)
305305

306306
### **Security Policy**
307307

articles/defender-for-cloud/how-to-manage-attack-path.md

Lines changed: 13 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Identify and remediate attack paths in Microsoft Defender for Cloud
33
description: Learn how to identify and remediate attack paths in Microsoft Defender for Cloud
44
ms.topic: how-to
5-
ms.custom: ignite-2022
5+
ms.custom: ignite-2023
66
ms.date: 11/01/2023
77
---
88

@@ -30,11 +30,11 @@ The attack path page shows you an overview of all of your attack paths. You can
3030

3131
:::image type="content" source="media/concept-cloud-map/attack-path-homepage.png" alt-text="Screenshot of a sample attack path homepage." lightbox="media/concept-cloud-map/attack-path-homepage.png":::
3232

33-
On this page you can organize your attack paths based on name, environment, paths count, risk categories.
33+
On this page you can organize your attack paths based on risk level, name, environment, paths count, risk factors, entry point, target, the number of affected resources, or the number of active recommendations.
3434

35-
For each attack path, you can see all of risk categories and any affected resources.
35+
For each attack path, you can see all of risk factors and any affected resources.
3636

37-
The potential risk categories include credentials exposure, compute abuse, data exposure, subscription and account takeover.
37+
The potential risk factors include credentials exposure, compute abuse, data exposure, subscription and account takeover.
3838

3939
Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md).
4040

@@ -48,15 +48,10 @@ You can use Attack path analysis to locate the biggest risks to your environmen
4848

4949
1. Navigate to **Microsoft Defender for Cloud** > **Attack path analysis**.
5050

51-
:::image type="content" source="media/how-to-manage-attack-path/attack-path-blade.png" alt-text="Screenshot that shows the attack path analysis blade on the main screen." lightbox="media/how-to-manage-attack-path/attack-path-blade.png":::
51+
:::image type="content" source="media/how-to-manage-attack-path/attack-path-blade.png" alt-text="Screenshot that shows the attack path analysis page on the main screen." lightbox="media/how-to-manage-attack-path/attack-path-blade.png":::
5252

5353
1. Select an attack path.
5454

55-
:::image type="content" source="media/how-to-manage-cloud-map/attack-path.png" alt-text="Screenshot that shows a sample of attack paths." lightbox="media/how-to-manage-cloud-map/attack-path.png" :::
56-
57-
> [!NOTE]
58-
> An attack path might have more than one path that is at risk. The path count will tell you how many paths need to be remediated. If the attack path has more than one path, you will need to select each path within that attack path to remediate all risks.
59-
6055
1. Select a node.
6156

6257
:::image type="content" source="media/how-to-manage-cloud-map/node-select.png" alt-text="Screenshot of the attack path screen that shows you where the nodes are located for selection." lightbox="media/how-to-manage-cloud-map/node-select.png":::
@@ -81,6 +76,11 @@ Once an attack path is resolved, it can take up to 24 hours for an attack path t
8176

8277
Attack path analysis also gives you the ability to see all recommendations by attack path without having to check each node individually. You can resolve all recommendations without having to view each node individually.
8378

79+
The remediation path contains two types of recommendation:
80+
81+
- **Recommendations** - Recommendations that mitigate the attack path.
82+
- **Additional recommendations** - Recommendations that reduce the exploitation risks, but don’t mitigate the attack path.
83+
8484
**To resolve all recommendations**:
8585

8686
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -89,7 +89,7 @@ Attack path analysis also gives you the ability to see all recommendations by at
8989

9090
1. Select an attack path.
9191

92-
1. Select **Recommendations**.
92+
1. Select **Remediation**.
9393

9494
:::image type="content" source="media/how-to-manage-cloud-map/bulk-recommendations.png" alt-text="Screenshot that shows where to select on the screen to see the attack paths full list of recommendations." lightbox="media/how-to-manage-cloud-map/bulk-recommendations.png":::
9595

@@ -115,7 +115,7 @@ securityresources
115115
```
116116

117117
**Get all instances for a specific attack path**:
118-
For example, Internet exposed VM with high severity vulnerabilities and read permission to a Key Vault.
118+
For example, `Internet exposed VM with high severity vulnerabilities and read permission to a Key Vault`.
119119

120120
```kusto
121121
securityresources
@@ -133,7 +133,7 @@ The following table lists the data fields returned from the API response:
133133
|--|--|
134134
| ID | The Azure resource ID of the attack path instance|
135135
| Name | The Unique identifier of the attack path instance|
136-
| Type | The Azure resource type, always equals microsoft.security/attackpaths|
136+
| Type | The Azure resource type, always equals `microsoft.security/attackpaths`|
137137
| Tenant ID | The tenant ID of the attack path instance |
138138
| Location | The location of the attack path |
139139
| Subscription ID | The subscription of the attack path |
@@ -153,33 +153,6 @@ The following table lists the data fields returned from the API response:
153153
| Properties.graphComponent.connections | List of connections graph components related to the attack path |
154154
| Properties.AttackPathID | The unique identifier of the attack path instance |
155155

156-
## External attack surface management (EASM)
157-
158-
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. An organization's attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
159-
160-
While you're [investigating and remediating an attack path](#investigate-and-remediate-attack-paths), you can also view your EASM if it's available, and if you've enabled Defender EASM to your subscription.
161-
162-
> [!NOTE]
163-
> To manage your EASM, you must [deploy the Defender EASM Azure resource](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md) to your subscription. Defender EASM has its own cost and is separate from Defender for Cloud. To learn more about Defender for EASM pricing options, you can check out the [pricing page](https://azure.microsoft.com/pricing/details/defender-external-attack-surface-management/).
164-
165-
**To manage your EASM**:
166-
167-
1. Sign in to the [Azure portal](https://portal.azure.com).
168-
169-
1. Navigate to **Microsoft Defender for Cloud** > **Attack path analysis**.
170-
171-
1. Select an attack path.
172-
173-
1. Select a resource.
174-
175-
1. Select **Insights**.
176-
177-
1. Select **Open EASM**.
178-
179-
:::image type="content" source="media/how-to-manage-attack-path/open-easm.png" alt-text="Screenshot that shows you where on the screen you need to select open Defender EASM from." lightbox="media/how-to-manage-attack-path/easm-zoom.png":::
180-
181-
1. Follow the [Using and managing discovery](../external-attack-surface-management/using-and-managing-discovery.md) instructions.
182-
183156
## Next Steps
184157

185158
Learn how to [build queries with cloud security explorer](how-to-manage-cloud-security-explorer.md).

articles/defender-for-cloud/how-to-test-attack-path-and-security-explorer-with-vulnerable-container-image.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Test attack paths and cloud security explorer in Microsoft Defender for C
33
description: Learn how to test attack paths and cloud security explorer in Microsoft Defender for Cloud
44
ms.service: defender-for-cloud
55
ms.topic: how-to
6-
ms.date: 07/17/2023
6+
ms.date: 11/08/2023
77
---
88

99
# Test attack paths and cloud security explorer
1010

1111

12-
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers might use to breach your environment to reach your high-impact assets. Attack path analysis exposes attack paths and suggests recommendations as to how best remediate issues that will break the attack path and prevent successful breach.
12+
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers might use to breach your environment to reach your high-impact assets. Attack path analysis exposes attack paths and suggests recommendations as to how best remediate issues that break the attack path and prevent successful breach.
1313

14-
Explore and investigate [attack paths](how-to-manage-attack-path.md) by sorting them based on name, environment, path count, and risk categories. Explore cloud security graph Insights on the resource. Examples of Insight types are:
14+
Explore and investigate [attack paths](how-to-manage-attack-path.md) by sorting them based on risk level, name, environment, and risk factors, entry point, target, affected resources and active recommendations. Explore cloud security graph Insights on the resource. Examples of Insight types are:
1515

1616
- Pod exposed to the internet
1717
- Privileged container
@@ -73,14 +73,13 @@ You can build queries in one of the following ways:
7373
7474
### Find the security issue under attack paths
7575
76-
1.Go to **Recommendations** in the Defender for Cloud menu.
77-
1. Select the **Attack Path** link to open the attack paths view.
76+
1. Sign in to the [Azure portal](https://portal.azure.com).
7877
79-
:::image type="content" source="media/how-to-test-attack-path/attack-path.png" alt-text="Screenshot of showing where to select Attack Path." lightbox="media/how-to-test-attack-path/attack-path.png":::
78+
1. Navigate to **Attack path analysis**.
8079
81-
1. Locate the entry that details this security issue under “Internet exposed Kubernetes pod is running a container with high severity vulnerabilities.”
80+
1. Select an attack path.
8281
83-
:::image type="content" source="media/how-to-test-attack-path/attack-path-kubernetes-pods-vulnerabilities.png" alt-text="Screenshot showing the security issue details." lightbox="media/how-to-test-attack-path/attack-path-kubernetes-pods-vulnerabilities.png":::
82+
1. Locate the entry that details this security issue under `Internet exposed Kubernetes pod is running a container with high severity vulnerabilities`.
8483
8584
### Explore risks with cloud security explorer templates
8685

articles/defender-for-cloud/implement-security-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to remediate security recommendations in Microsoft Defend
44
ms.topic: how-to
55
ms.author: dacurwin
66
author: dcurwin
7-
ms.date: 10/20/2022
7+
ms.date: 11/08/2023
88
---
99
# Remediate security recommendations
1010

157 KB
Loading
-591 KB
Loading

0 commit comments

Comments
 (0)