Skip to content

Commit 980b7d5

Browse files
Merge pull request #234667 from rayne-wiselman/rayne-dataposture
fixing Moran's changes
2 parents d58f6c9 + c17e330 commit 980b7d5

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/defender-for-cloud/concept-data-security-posture-prepare.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Sensitive data discovery is available in the Defender CSPM and Defender for Stor
1818

1919
- When you enable one of the plans, the sensitive data discovery extension is turned on as part of the plan.
2020
- If you have existing plans running, the extension is available, but turned off by default.
21-
- Existing plan status shows as “Partial” rather than “Full” until the feature is turned on manually.
21+
- Existing plan status shows as “Partial” rather than “Full” if one or more extensions aren't turned on.
2222
- The feature is turned on at the subscription level.
2323

2424

@@ -36,7 +36,7 @@ What Azure regions are supported? | You can discover Azure storage accounts in:<
3636
What AWS regions are supported? | Asia Pacific (Mumbai); Asia Pacific (Singapore); Asia Pacific (Sydney); Asia Pacific (Tokyo); Canada (Central); Europe (Frankfurt); Europe (Ireland); Europe (London); Europe (Paris); South America (São Paulo); US East (Ohio); US East (N. Virginia); US West (N. California): US West (Oregon).<br/><br/> Discovery is done locally in the region.
3737
Do I need to install an agent? | No, discovery is agentless.
3838
What's the cost? | The feature is included with the Defender CSPM and Defender for Storage plans, and doesn’t include other costs except for the respective plan costs.
39-
What permissions do I need to edit data sensitivity settings? | You need one of these permissions: Global Administrator, Compliance Administrator, Compliance Data Administrator, Security Administrator, Security Operator.
39+
What permissions do I need to view/edit data sensitivity settings? | You need one of these permissions: Global Administrator, Compliance Administrator, Compliance Data Administrator, Security Administrator, Security Operator.
4040

4141

4242
## Configuring data sensitivity settings
@@ -57,12 +57,12 @@ Defender for Cloud starts discovering data immediately after enabling a plan, or
5757
- A new Azure storage account that's added to an already discovered subscription is discovered within 24 hours or less.
5858
- A new AWS S3 bucket that's added to an already discovered AWS account is discovered within 48 hours or less.
5959

60-
### Discovering AWS storage
60+
### Discovering AWS S3 buckets
6161

6262
In order to protect AWS resources in Defender for Cloud, you set up an AWS connector, using a CloudFormation template to onboard the AWS account.
6363

6464
- To discover AWS data resources, Defender for Cloud updates the CloudFormation template.
65-
- The CloudFormation template creates a new role in AWS IAM, to allow permission for the Defender for Cloud scanner to access data in the S3 buckets.
65+
- The CloudFormation template creates a new role in AWS IAM, to allow permission for the Defender for Cloud scanner to access data in the S3 buckets.
6666
- To connect AWS accounts, you need Administrator permissions on the account.
6767
- The role allows these permissions: S3 read only; KMS decrypt.
6868

articles/defender-for-cloud/data-security-posture-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Follow these steps to enable data-aware security posture. Don't forget to review
3434

3535
### Before you start
3636

37-
- Don't forget to: [review the requirements](concept-data-security-posture-prepare.md#discovering-aws-storage) for AWS discovery, and [required permissions](concept-data-security-posture-prepare.md#whats-supported).
37+
- Don't forget to: [review the requirements](concept-data-security-posture-prepare.md#discovering-aws-s3-buckets) for AWS discovery, and [required permissions](concept-data-security-posture-prepare.md#whats-supported).
3838
- Check that there's no policy that blocks the connection to your Amazon S3 buckets.
3939

4040
### Enable for AWS resources

0 commit comments

Comments
 (0)