Skip to content

Commit 9dca707

Browse files
fixing issues
1 parent 3bf591f commit 9dca707

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/defender-for-cloud/concept-data-security-posture-prepare.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Defender CSPM attack paths and cloud security graph insights include information
7272
**State** | **Azure resources** | **AWS resources**
7373
--- | --- | ---
7474
**Exposed to the internet** | An Azure storage account is considered exposed if public network access is enabled, with either of these settings enabled<br/><br/> Storage_account_name **Networking** > **Public network access** > **Enabled from all networks**<br/><br/> or<br/><br/> Storage_account_name **Networking** > **Public network access** > **Enable from selected virtual networks and IP addresses**. | An AWS S3 bucket is consider exposed if the AWS account and AWS S3 bucket don't have a condition set for IP addresses.
75-
**Publicly accessible** | An Azure storage account is considered to be publicly accessible if both these settings are configured on the Azure storage account container:<br/><br/> Storage account name **Configuration** > **Allow blob public access**<br/><br/>and either of these settings:<br/><br/> - Storage account name > **Containers** > container_name > **Public access level** set to **Blob (anonymous read access for blobs only)<br/><br/> - Or, storage account name > **Containers** > container_name > **Public access level** set to **Container (anonymous read access for containers and blobs)**. | An AWS S2 bucket is considered publicly available if both the AWS account and the AWS S3 bucket have **Block all public access** set to **Off**, and the policy has **either** of these settings:<br/><br/> - In the policy, **RestrictPublicBuckets isn't allowed and **principal is *** and **effect** are set to **Allow**.<br/><br/> - Or, in the access control list, **IgnorePublicAcl** isn't enabled, and permission is allowed for **everyone**, or for **authenticated users**.
75+
**Publicly accessible** | An Azure storage account is considered to be publicly accessible if both these settings are configured on the Azure storage account container:<br/><br/> Storage account name **Configuration** > **Allow blob public access**<br/><br/>and either of these settings:<br/><br/> - Storage account name > **Containers** > container_name > **Public access level** set to **Blob (anonymous read access for blobs only)**<br/><br/> - Or, storage account name > **Containers** > container_name > **Public access level** set to **Container (anonymous read access for containers and blobs)**. | An AWS S2 bucket is considered publicly available if both the AWS account and the AWS S3 bucket have **Block all public access** set to **Off**, and the policy has **either** of these settings:<br/><br/> - In the policy, **RestrictPublicBuckets isn't allowed**, and **Principal is** and **Effect** are set to **Allow**.<br/><br/> - Or, in the access control list, **IgnorePublicAcl** isn't enabled, and permission is allowed for **Everyone**, or for **Authenticated users**.
7676

7777

7878

0 commit comments

Comments
 (0)