Skip to content

Commit 93bf7ba

Browse files
Merge pull request #226022 from TerryLanfear/sec-230201
Freshness update
2 parents 6991903 + e858092 commit 93bf7ba

File tree

3 files changed

+8780
-2915
lines changed

3 files changed

+8780
-2915
lines changed

articles/security/fundamentals/end-to-end.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,12 @@ author: TerryLanfear
77
manager: rkarlin
88

99
ms.assetid: a5a7f60a-97e2-49b4-a8c5-7c010ff27ef8
10-
ms.service: information-protection
11-
ms.subservice: aiplabels
10+
ms.service: security
11+
ms.subservice: security-fundamentals
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 1/06/2022
15+
ms.date: 01/29/2023
1616
ms.author: terrylan
1717

1818
---
@@ -29,8 +29,6 @@ The security services map organizes services by the resources they protect (colu
2929
- Detect threats – Services that identify suspicious activities and facilitate mitigating the threat.
3030
- Investigate and respond – Services that pull logging data so you can assess a suspicious activity and respond.
3131

32-
The diagram includes the Microsoft cloud security benchmark, a collection of high-impact security recommendations you can use to help secure the services you use in Azure.
33-
3432
:::image type="content" source="media/end-to-end/security-diagram.svg" alt-text="Diagram showing end-to-end security services in Azure." border="false":::
3533

3634
## Security controls and baselines
@@ -96,8 +94,7 @@ The [Microsoft cloud security benchmark](/security/benchmark/azure/introduction)
9694
| [Azure Network Watcher](../../network-watcher/network-watcher-monitoring-overview.md) | Provides tools to monitor, diagnose, view metrics, and enable or disable logs for resources in an Azure virtual network. Network Watcher is designed to monitor and repair the network health of IaaS products which includes virtual machines, virtual networks, application gateways, and load balancers. |
9795
| [Azure Policy](../../governance/policy/overview.md) | Helps to enforce organizational standards and to assess compliance at-scale. Azure Policy uses activity logs, which are automatically enabled to include event source, date, user, timestamp, source addresses, destination addresses, and other useful elements. |
9896
| **Data & Application** | |
99-
| [Microsoft Defender for container registries](../../security-center/defender-for-container-registries-introduction.md) | Includes a vulnerability scanner to scan the images in your Azure Resource Manager-based Azure Container Registry registries and provide deeper visibility into your images' vulnerabilities. |
100-
| [Microsoft Defender for Kubernetes](../../security-center/defender-for-kubernetes-introduction.md) | Provides cluster-level threat protection by monitoring your AKS-managed services through the logs retrieved by Azure Kubernetes Service (AKS). |
97+
| [Microsoft Defender for Containers](../../defender-for-cloud/defender-for-containers-introduction.md) | A cloud-native solution that is used to secure your containers so you can improve, monitor, and maintain the security of your clusters, containers, and their applications. |
10198
| [Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security) | A cloud access security broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services. |
10299

103100
## Investigate and respond

0 commit comments

Comments
 (0)