You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-architecture.md
+26-1Lines changed: 26 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,8 +5,9 @@ author: dcurwin
5
5
ms.author: dacurwin
6
6
ms.topic: overview
7
7
ms.custom: ignite-2022
8
-
ms.date: 08/27/2023
8
+
ms.date: 09/03/2023
9
9
---
10
+
10
11
# Defender for Containers architecture
11
12
12
13
Defender for Containers is designed differently for each Kubernetes environment whether they're running in:
@@ -106,6 +107,30 @@ When Defender for Cloud protects a cluster hosted in Google Kubernetes Engine, t
106
107
107
108
---
108
109
110
+
## How does agentless discovery for Kubernetes work?
111
+
112
+
The discovery process is based on snapshots taken at intervals:
113
+
114
+
:::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png":::
115
+
116
+
When you enable the agentless discovery for Kubernetes extension, the following process occurs:
117
+
118
+
-**Create**:
119
+
- If the extension is enabled from Defender CSPM, Defender for Cloud creates an identity in customer environments called `CloudPosture/securityOperator/DefenderCSPMSecurityOperator`.
120
+
- If the extension is enabled from Defender for Containers, Defender for Cloud creates an identity in customer environments called `CloudPosture/securityOperator/DefenderForContainersSecurityOperator`.
121
+
-**Assign**: Defender for Cloud assigns a built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope. The role contains the following permissions:
122
+
123
+
- AKS read (Microsoft.ContainerService/managedClusters/read)
124
+
- AKS Trusted Access with the following permissions:
Learn more about [AKS Trusted Access](/azure/aks/trusted-access-feature).
130
+
131
+
-**Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
132
+
-**Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
133
+
109
134
## Next steps
110
135
111
136
In this overview, you learned about the architecture of container security in Microsoft Defender for Cloud. To enable the plan, see:
:::image type="content" source="media/defender-for-containers/risk-hunting.png" alt-text="Screenshot of risk hunting query." lightbox="media/defender-for-containers/risk-hunting.png":::
108
108
109
-
### How does agentless discovery for Kubernetes work?
110
-
111
-
The discovery process is based on snapshots taken at intervals:
112
-
113
-
:::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png":::
114
-
115
-
When you enable the agentless discovery for Kubernetes extension, the following process occurs:
116
-
117
-
-**Create**:
118
-
- If the extension is enabled from Defender CSPM, Defender for Cloud creates an identity in customer environments called `CloudPosture/securityOperator/DefenderCSPMSecurityOperator`.
119
-
- If the extension is enabled from Defender for Containers, Defender for Cloud creates an identity in customer environments called `CloudPosture/securityOperator/DefenderForContainersSecurityOperator`.
120
-
-**Assign**: Defender for Cloud assigns a built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope. The role contains the following permissions:
121
-
122
-
- AKS read (Microsoft.ContainerService/managedClusters/read)
123
-
- AKS Trusted Access with the following permissions:
Learn more about [AKS Trusted Access](/azure/aks/trusted-access-feature).
129
-
130
-
-**Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
131
-
-**Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
132
-
133
109
## Learn more
134
110
135
111
Learn more about Defender for Containers in the following blogs:
0 commit comments