You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-agentless-containers.md
+17-16Lines changed: 17 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,32 +3,32 @@ title: Agentless Container Posture for Microsoft Defender for Cloud
3
3
description: Learn how Agentless Container Posture offers discovery and visibility for Containers without installing an agent on your machines.
4
4
ms.service: defender-for-cloud
5
5
ms.topic: conceptual
6
-
ms.date: 04/03/2023
6
+
ms.date: 04/16/2023
7
7
ms.custom: template-concept
8
8
---
9
9
10
10
# Agentless Container Posture (Preview)
11
11
12
-
Identify security risks in containers and Kubernetes realms with an agentless discovery and visibility capability across SDLC and runtime.
12
+
You can identify security risks that exist in containers and Kubernetes realms with the agentless discovery and visibility capability across SDLC and runtime.
13
13
14
-
With container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis, you can maximize coverage on container posture issues and extend beyond the reach of agent-based assessments, providing a holistic approach to your posture improvement.
14
+
You can maximize the coverage of your container posture issues and extend your protection beyond the reach of agent-based assessments, with container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis, to provide a holistic approach to your posture improvement.
15
15
16
16
Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).
17
17
18
18
> [!IMPORTANT]
19
-
> The Agentless Container Posture preview features are available on a self-service, opt-in basis. Previews are provided "as is" and "as available," and they're excluded from the service-level agreements and limited warranty. Agentless Container Posture previews are partially covered by customer support on a best-effort basis. As such, these features aren't meant for production use.
19
+
> The Agentless Container Posture preview features are available on a self-service, opt-in basis. Previews are provided "as is" and "as available" and are excluded from the service-level agreements and limited warranty. Agentless Container Posture previews are partially covered by customer support on a best-effort basis. As such, these features aren't meant for production use.
20
20
21
21
## Capabilities
22
22
23
23
Agentless Container Posture provides the following capabilities:
24
24
25
25
- Using Kubernetes Attack Path analysis to visualize risks and threats to Kubernetes environments.
26
26
- Using Cloud Security Explorer for risk hunting by querying various risk scenarios.
27
-
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, search for "Kubernetes" in the [list of Insights](attack-path-reference.md#insights).
27
+
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, search for `Kubernetes` in the [list of Insights](attack-path-reference.md#insights).
28
28
- Agentless discovery and visibility within Kubernetes components.
29
29
- Agentless container registry vulnerability assessment, using the image scanning results of your Azure Container Registry (ACR) with Cloud Security Explorer.
30
30
31
-
A [vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) for Containers in Defender Cloud Security Posture Management (CSPM) gives you frictionless, wide, and instant visibility on actionable posture issues without installed agents, network connectivity requirements, or container performance impact.
31
+
[Vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) for Containers in Defender Cloud Security Posture Management (CSPM) gives you frictionless, wide, and instant visibility on actionable posture issues without the need for installed agents, network connectivity requirements, or container performance impact.
32
32
33
33
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan.
34
34
@@ -46,27 +46,28 @@ All of these capabilities are available as part of the [Defender Cloud Security
46
46
47
47
You need to have access as a Subscription Owner, or, User Access Admin as well as Security Admin permissions for the Azure subscription used for onboarding.
48
48
49
-
### Environment requirements
50
49
51
50
You need to have a Defender for CSPM plan enabled. There's no dependency on Defender for Containers.
52
51
53
52
Learn more about [trusted versions that AKS supports](/azure/aks/supported-kubernetes-versions?tabs=azure-cli).
54
53
55
-
## Onboarding Agentless Containers for CSPM
54
+
## Onboard Agentless Containers for CSPM
56
55
57
56
Before starting the onboarding process, make sure you have [a subscription onboarded to the Defender CSPM plan](enable-enhanced-security.md#enable-enhanced-security-features-on-a-subscription).
58
57
59
58
1. In the Azure portal, navigate to the Defender for Cloud's **Environment Settings** page.
60
59
61
60
1. Select the subscription that's onboarded to the Defender CSPM plan, then select **Settings**.
62
61
63
-
1. Toggle on the **Agentless discovery for Kubernetes** and **Container registries vulnerability assessments** extensions, then select **Continue**. For example:
62
+
1. Ensure the **Agentless discovery for Kubernetes** and **Container registries vulnerability assessments** extensions are toggled to **On**.
63
+
64
+
1. Select **Continue**.
64
65
65
66
:::image type="content" source="media/concept-agentless-containers/settings-continue.png" alt-text="Screenshot of selecting agentless discovery for Kubernetes and Container registries vulnerability assessments." lightbox="media/concept-agentless-containers/settings-continue.png":::
66
67
67
-
1.In the Defender plans page, select**Save**.
68
+
1.Select**Save**.
68
69
69
-
Verify that the settings were saved successfully - a notification message pops up in the top right corner.
70
+
A notification message pops up in the top right corner that will verify that the settings were saved successfully.
@@ -82,9 +83,9 @@ The system’s architecture is based on a snapshot mechanism at intervals.
82
83
83
84
By enabling the Agentless discovery for Kubernetes extension, the following process occurs:
84
85
85
-
1.**Create**: MDC (Microsoft Defender for Cloud) creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator.
86
+
-**Create**: MDC (Microsoft Defender for Cloud) creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator.
86
87
87
-
1.**Assign**: MDC assigns 1 built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope.
88
+
-**Assign**: MDC assigns 1 built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope.
88
89
89
90
The role contains the following permissions:
90
91
- AKS read (Microsoft.ContainerService/managedClusters/read)
@@ -95,13 +96,13 @@ By enabling the Agentless discovery for Kubernetes extension, the following proc
95
96
96
97
Learn more about [AKS Trusted Access](/azure/aks/trusted-access-feature).
97
98
98
-
1.**Discover**: Using the system assigned identity, MDC performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
99
+
-**Discover**: Using the system assigned identity, MDC performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
99
100
100
-
1.**Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
101
+
-**Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
101
102
102
103
## Refresh intervals
103
104
104
-
Agentless information in Defender CSPM is updated once an hour via snapshotting mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
105
+
Agentless information in Defender CSPM is updated once an hour through a snapshot mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,15 +36,15 @@ When a scan is triggered, findings are available as Defender for Cloud recommend
36
36
37
37
Before you can scan your ACR images:
38
38
39
-
-Enable one of the following plans for your subscription:
39
+
-YOu must enable one of the following plans on your subscription:
40
40
41
-
-[Defender CSPM](concept-cloud-security-posture-management.md). Make sure to also enable the Container registries vulnerability assessments (preview) extension.
42
-
-[Defender for Containers](defender-for-containers-enable.md). Defender for Containers is now ready to scan images in your registries.
41
+
-[Defender CSPM](concept-cloud-security-posture-management.md). When you enable this plan, ensure you enable the **Container registries vulnerability assessments (preview)** extension.
42
+
-[Defender for Containers](defender-for-containers-enable.md).
43
43
44
44
>[!NOTE]
45
45
> This feature is charged per image.
46
46
47
-
- If you want to find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
47
+
To find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
48
48
49
49
Use the ACR tools to bring images to your registry from Docker Hub or Microsoft Container Registry. When the import completes, the imported images are scanned by the built-in vulnerability assessment solution.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,11 +26,11 @@ Updates in April include:
26
26
27
27
### Agentless Container Posture in Defender CSPM (Preview)
28
28
29
-
The new Agentless Container Posture (Preview) capabilities are available in preview as part of the Defender CSPM (Cloud Security Posture Management) plan.
29
+
The new Agentless Container Posture (Preview) capabilities are available as part of the Defender CSPM (Cloud Security Posture Management) plan.
30
30
31
31
Agentless Container Posture allows security teams to identify security risks in containers and Kubernetes realms. An agentless approach allows security teams to gain visibility into their Kubernetes and containers registries across SDLC and runtime, removing friction and footprint from the workloads.
32
32
33
-
Agentless Container Posture offer out-of-the-box container vulnerability assessments that, combined with attack path analysis, enable security teams to prioritize and zoom into specific container vulnerabilities. You can also use cloud security explorer to uncover risks and hunt for container posture insights, such as discovery of applications running vulnerable images or exposed to the internet.
33
+
Agentless Container Posture offers container vulnerability assessments that, combined with attack path analysis, enable security teams to prioritize and zoom into specific container vulnerabilities. You can also use cloud security explorer to uncover risks and hunt for container posture insights, such as discovery of applications running vulnerable images or exposed to the internet.
34
34
35
35
Learn more at [Agentless Container Posture (Preview)](concept-agentless-containers.md).
0 commit comments