Skip to content

Commit 9920577

Browse files
Apply suggestions from Elazar's review
Co-authored-by: Elazar Krieger <[email protected]>
1 parent f3d6af2 commit 9920577

File tree

3 files changed

+23
-22
lines changed

3 files changed

+23
-22
lines changed

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -3,32 +3,32 @@ title: Agentless Container Posture for Microsoft Defender for Cloud
33
description: Learn how Agentless Container Posture offers discovery and visibility for Containers without installing an agent on your machines.
44
ms.service: defender-for-cloud
55
ms.topic: conceptual
6-
ms.date: 04/03/2023
6+
ms.date: 04/16/2023
77
ms.custom: template-concept
88
---
99

1010
# Agentless Container Posture (Preview)
1111

12-
Identify security risks in containers and Kubernetes realms with an agentless discovery and visibility capability across SDLC and runtime.
12+
You can identify security risks that exist in containers and Kubernetes realms with the agentless discovery and visibility capability across SDLC and runtime.
1313

14-
With container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis, you can maximize coverage on container posture issues and extend beyond the reach of agent-based assessments, providing a holistic approach to your posture improvement.
14+
You can maximize the coverage of your container posture issues and extend your protection beyond the reach of agent-based assessments, with container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis, to provide a holistic approach to your posture improvement.
1515

1616
Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).
1717

1818
> [!IMPORTANT]
19-
> The Agentless Container Posture preview features are available on a self-service, opt-in basis. Previews are provided "as is" and "as available," and they're excluded from the service-level agreements and limited warranty. Agentless Container Posture previews are partially covered by customer support on a best-effort basis. As such, these features aren't meant for production use.
19+
> The Agentless Container Posture preview features are available on a self-service, opt-in basis. Previews are provided "as is" and "as available" and are excluded from the service-level agreements and limited warranty. Agentless Container Posture previews are partially covered by customer support on a best-effort basis. As such, these features aren't meant for production use.
2020
2121
## Capabilities
2222

2323
Agentless Container Posture provides the following capabilities:
2424

2525
- Using Kubernetes Attack Path analysis to visualize risks and threats to Kubernetes environments.
2626
- Using Cloud Security Explorer for risk hunting by querying various risk scenarios.
27-
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, search for "Kubernetes" in the [list of Insights](attack-path-reference.md#insights).
27+
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, search for `Kubernetes` in the [list of Insights](attack-path-reference.md#insights).
2828
- Agentless discovery and visibility within Kubernetes components.
2929
- Agentless container registry vulnerability assessment, using the image scanning results of your Azure Container Registry (ACR) with Cloud Security Explorer.
3030

31-
A [vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) for Containers in Defender Cloud Security Posture Management (CSPM) gives you frictionless, wide, and instant visibility on actionable posture issues without installed agents, network connectivity requirements, or container performance impact.
31+
[Vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) for Containers in Defender Cloud Security Posture Management (CSPM) gives you frictionless, wide, and instant visibility on actionable posture issues without the need for installed agents, network connectivity requirements, or container performance impact.
3232

3333
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan.
3434

@@ -46,27 +46,28 @@ All of these capabilities are available as part of the [Defender Cloud Security
4646

4747
You need to have access as a Subscription Owner, or, User Access Admin as well as Security Admin permissions for the Azure subscription used for onboarding.
4848

49-
### Environment requirements
5049

5150
You need to have a Defender for CSPM plan enabled. There's no dependency on Defender for Containers​.
5251

5352
Learn more about [trusted versions that AKS supports](/azure/aks/supported-kubernetes-versions?tabs=azure-cli).
5453

55-
## Onboarding Agentless Containers for CSPM
54+
## Onboard Agentless Containers for CSPM
5655

5756
Before starting the onboarding process, make sure you have [a subscription onboarded to the Defender CSPM plan](enable-enhanced-security.md#enable-enhanced-security-features-on-a-subscription).
5857

5958
1. In the Azure portal, navigate to the Defender for Cloud's **Environment Settings** page.
6059

6160
1. Select the subscription that's onboarded to the Defender CSPM plan, then select **Settings**.
6261

63-
1. Toggle on the **Agentless discovery for Kubernetes** and **Container registries vulnerability assessments** extensions, then select **Continue**. For example:
62+
1. Ensure the **Agentless discovery for Kubernetes** and **Container registries vulnerability assessments** extensions are toggled to **On**.
63+
64+
1. Select **Continue**.
6465

6566
:::image type="content" source="media/concept-agentless-containers/settings-continue.png" alt-text="Screenshot of selecting agentless discovery for Kubernetes and Container registries vulnerability assessments." lightbox="media/concept-agentless-containers/settings-continue.png":::
6667

67-
1. In the Defender plans page, select **Save**.
68+
1. Select **Save**.
6869

69-
Verify that the settings were saved successfully - a notification message pops up in the top right corner.
70+
A notification message pops up in the top right corner that will verify that the settings were saved successfully.
7071

7172
### Container registries vulnerability assessments recommendations
7273

@@ -82,9 +83,9 @@ The system’s architecture is based on a snapshot mechanism at intervals.
8283

8384
By enabling the Agentless discovery for Kubernetes extension, the following process occurs:
8485

85-
1. **Create**: MDC (Microsoft Defender for Cloud) creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator.
86+
- **Create**: MDC (Microsoft Defender for Cloud) creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator.
8687

87-
1. **Assign**: MDC assigns 1 built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope.
88+
- **Assign**: MDC assigns 1 built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope.
8889

8990
The role contains the following permissions:
9091
- AKS read (Microsoft.ContainerService/managedClusters/read)
@@ -95,13 +96,13 @@ By enabling the Agentless discovery for Kubernetes extension, the following proc
9596

9697
Learn more about [AKS Trusted Access](/azure/aks/trusted-access-feature).
9798

98-
1. **Discover**: Using the system assigned identity, MDC performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
99+
- **Discover**: Using the system assigned identity, MDC performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
99100

100-
1. **Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
101+
- **Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
101102

102103
## Refresh intervals
103104

104-
Agentless information in Defender CSPM is updated once an hour via snapshotting mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
105+
Agentless information in Defender CSPM is updated once an hour through a snapshot mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
105106

106107
## Next steps
107108

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,15 @@ When a scan is triggered, findings are available as Defender for Cloud recommend
3636

3737
Before you can scan your ACR images:
3838

39-
- Enable one of the following plans for your subscription:
39+
- YOu must enable one of the following plans on your subscription:
4040

41-
- [Defender CSPM](concept-cloud-security-posture-management.md). Make sure to also enable the Container registries vulnerability assessments (preview) extension.
42-
- [Defender for Containers](defender-for-containers-enable.md). Defender for Containers is now ready to scan images in your registries.
41+
- [Defender CSPM](concept-cloud-security-posture-management.md). When you enable this plan, ensure you enable the **Container registries vulnerability assessments (preview)** extension.
42+
- [Defender for Containers](defender-for-containers-enable.md).
4343

4444
>[!NOTE]
4545
> This feature is charged per image.
4646
47-
- If you want to find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
47+
To find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
4848

4949
Use the ACR tools to bring images to your registry from Docker Hub or Microsoft Container Registry. When the import completes, the imported images are scanned by the built-in vulnerability assessment solution.
5050

articles/defender-for-cloud/release-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ Updates in April include:
2626

2727
### Agentless Container Posture in Defender CSPM (Preview)
2828

29-
The new Agentless Container Posture (Preview) capabilities are available in preview as part of the Defender CSPM (Cloud Security Posture Management) plan.
29+
The new Agentless Container Posture (Preview) capabilities are available as part of the Defender CSPM (Cloud Security Posture Management) plan.
3030

3131
Agentless Container Posture allows security teams to identify security risks in containers and Kubernetes realms. An agentless approach allows security teams to gain visibility into their Kubernetes and containers registries across SDLC and runtime, removing friction and footprint from the workloads.
3232

33-
Agentless Container Posture offer out-of-the-box container vulnerability assessments that, combined with attack path analysis, enable security teams to prioritize and zoom into specific container vulnerabilities. You can also use cloud security explorer to uncover risks and hunt for container posture insights, such as discovery of applications running vulnerable images or exposed to the internet.
33+
Agentless Container Posture offers container vulnerability assessments that, combined with attack path analysis, enable security teams to prioritize and zoom into specific container vulnerabilities. You can also use cloud security explorer to uncover risks and hunt for container posture insights, such as discovery of applications running vulnerable images or exposed to the internet.
3434

3535
Learn more at [Agentless Container Posture (Preview)](concept-agentless-containers.md).
3636

0 commit comments

Comments
 (0)