Skip to content

Commit 9e8a347

Browse files
author
Jill Grant
authored
Merge pull request #279897 from ElazarK/WI265756-DEASM
DEASM new article
2 parents b6dc6f5 + 831cc58 commit 9e8a347

File tree

9 files changed

+115
-22
lines changed

9 files changed

+115
-22
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -207,8 +207,8 @@
207207
- name: Investigating risks with security explorer/attack paths
208208
displayName: cloud security graph, attack path analysis, cloud security explorer, attack, path, graph, security, explorer
209209
href: concept-attack-path.md
210-
- name: Integration with Defender EASM
211-
displayName: EASM, attack surface management
210+
- name: External attack surface management in Defender for Cloud
211+
displayName: EASM, attack surface management, integration
212212
href: concept-easm.md
213213
- name: Critical assets protection
214214
href: critical-assets-protection.md
@@ -424,6 +424,9 @@
424424
- name: Build queries with cloud security explorer
425425
displayName: queries, security explorer, explorer, templates, query
426426
href: how-to-manage-cloud-security-explorer.md
427+
- name: Detect internet exposed IP addresses
428+
displayName: exposed, ip, addresses, easm
429+
href: detect-exposed-ip-addresses.md
427430
- name: Built-in security protections
428431
items:
429432
- name: Use Purview to protect sensitive data

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Cloud Security Posture Management (CSPM)
33
description: Learn more about Cloud Security Posture Management (CSPM) in Microsoft Defender for Cloud and how it helps improve your security posture.
44
ms.topic: concept-article
5-
ms.date: 06/30/2024
5+
ms.date: 07/04/2024
66
#customer intent: As a reader, I want to understand the concept of Cloud Security Posture Management (CSPM) in Microsoft Defender for Cloud.
77
---
88

@@ -48,7 +48,7 @@ The following table summarizes each plan and their cloud availability.
4848
| [Code-to-cloud mapping for IaC](iac-template-mapping.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure DevOps |
4949
| [PR annotations](review-pull-request-annotations.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | GitHub, Azure DevOps |
5050
| Internet exposure analysis | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
51-
| [External attack surface management (EASM)](concept-easm.md) (for details see [Defender CSPM integration](concept-easm.md#defender-cspm-integration)) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
51+
| [External attack surface management (EASM)](concept-easm.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5252
| [Permissions Management (CIEM)](permissions-management.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5353
| [Regulatory compliance assessments](concept-regulatory-compliance-standards.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5454
| [ServiceNow Integration](integration-servicenow.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
Lines changed: 23 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,39 @@
11
---
2-
title: Microsoft Defender for Cloud integration with Defender External attack surface management (EASM)
2+
title: External attack surface management in Defender for Cloud
33
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM) to enhance security and reduce the risk of attacks.
44
ms.topic: concept-article
5-
ms.date: 05/20/2024
5+
ms.date: 07/03/2024
66
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management (EASM) so that I can enhance my organization's security.
77
---
88

9-
# Integration with Defender EASM
9+
# External attack surface management in Defender for Cloud
1010

11-
You can use Microsoft Defender for Cloud's integration with Microsoft Defender External Attack Surface Management (EASM) to improve your organization's security posture, and reduce the potential risk of being attacked.
11+
Microsoft Defender for Cloud has the capability to perform external attack surface management (EASM), (outside-in) scans on multicloud environments. Defender for Cloud accomplishes this through its integration with Microsoft Defender EASM. The integration allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from Defender EASM or any special configurations.
1212

13-
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
13+
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
1414

15-
Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
15+
- Discover digital assets, always-on inventory.
16+
- Analyze and prioritize risks and threats.
17+
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand.
18+
- Gain visibility into third-party attack surfaces.
1619

17-
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
20+
With this information, security and IT teams are able to identify unknowns, prioritize risks, eliminate threats, and extend vulnerability and exposure control beyond the firewall. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
21+
22+
EASM collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
1823

19-
- Discover digital assets, always-on inventory
20-
- Analyze and prioritize risks and threats
21-
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
22-
- Gain visibility into third-party attack surfaces
24+
Learn more about [Defender EASM](../external-attack-surface-management/overview.md).
2325

24-
EASM collects data for publicly exposed assets (“outside-in”). Defender for Cloud CSPM (“inside-out”) can use that data to assist with internet-exposure validation and discovery capabilities, to provide better visibility to customers.
26+
## EASM capabilities in Defender CSPM
2527

26-
## Defender CSPM integration
28+
The [Defender CSPM](concept-cloud-security-posture-management.md) plan utilizes the data collected through the Defender EASM integration to provide the following capabilities within the Defender for Cloud portal:
2729

28-
While [Defender CSPM](concept-cloud-security-posture-management.md) includes some external attack surface management capabilities, it doesn't include the full EASM solution. Instead, it provides detection of internet accessible assets via Defender for Cloud recommendations and attack paths.
30+
- Discover of all the internet facing cloud resources through the use of an outside-in scan.
31+
- Attack path analysis which finds all exploitable paths starting from internet exposed IPs.
32+
- Custom queries that correlate all internet exposed IPs with the rest of Defender for Cloud data in the cloud security explorer.
2933

30-
## Next steps
34+
:::image type="content" source="media/concept-easm/cloud-security-explorer.png" alt-text="Screenshot of the cloud security explorer page in the Defender for Cloud portal." lightbox="media/concept-easm/cloud-security-explorer.png":::
3135

32-
- Learn about [cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
33-
- Learn about [Defender EASM](../external-attack-surface-management/overview.md).
34-
- Learn how to [deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).
36+
## Related content
37+
- [Detect internet exposed IP addresses](detect-exposed-ip-addresses.md)
38+
- [Cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
39+
- [Deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Detect internet exposed IP addresses
3+
description: Learn how to detect exposed IP addresses with cloud security explorer in Microsoft Defender for Cloud to proactively identify security risks.
4+
ms.topic: how-to
5+
ms.date: 07/03/2024
6+
ms.author: dacurwin
7+
author: dcurwin
8+
ai-usage: ai-assisted
9+
#customer intent: As a security professional, I want to learn how to detect exposed IP addresses with cloud security explorer in Microsoft Defender for Cloud so that I can proactively identify security risks in my cloud environment and improve my security posture.
10+
---
11+
12+
# Detect internet exposed IP addresses
13+
14+
Microsoft Defender for Cloud's provides organizations the capability to perform External Attack Surface Management (EASM) (outside-in) scans to improve their security posture through its integration with Defender EASM. Defender for Cloud's EASM scans uses the information provided by the Defender EASM integration to provide actionable recommendations and visualizations of attack paths to reduce the risk of bad actors exploiting internet exposed IP addresses.
15+
16+
Through the use Defender for Cloud's cloud security explorer, security teams can build queries and proactively hunt for security risks. Security teams can also use the attack path analysis to visualize the potential attack paths that an attacker could use to reach their critical assets.
17+
18+
## Prerequisites
19+
20+
- You need a Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
21+
22+
- You must [enable the Defender Cloud Security Posture Management (CSPM) plan](tutorial-enable-cspm-plan.md).
23+
24+
## Detect internet exposed IP addresses with the cloud security explorer
25+
26+
The cloud security explorer allows you to build queries, such as an outside-in scan, that can proactively hunt for security risks in your environments, including IP addresses that are exposed to the internet.
27+
28+
1. Sign in to the [Azure portal](https://portal.azure.com/).
29+
30+
1. Search for and select **Microsoft Defender for Cloud** > **Cloud security explorer**.
31+
32+
1. In the dropdown menu, search for and select **IP addresses**.
33+
34+
:::image type="content" source="media/detect-exposed-ip-addresses/search-ip-addresses.png" alt-text="Screenshot that shows where to navigate to in Defender for Cloud to search for and select the IP addresses option." lightbox="media/detect-exposed-ip-addresses/search-ip-addresses.png":::
35+
36+
1. Select **Done**.
37+
38+
1. Select **+**.
39+
40+
1. In the select condition dropdown menu, select **DEASM Findings**.
41+
42+
:::image type="content" source="media/detect-exposed-ip-addresses/deasm-findings.png" alt-text="Screenshot that shows where to locate the DEASM Findings option." lightbox="media/detect-exposed-ip-addresses/deasm-findings.png":::
43+
44+
1. Select the **+** button.
45+
46+
1. In the select condition dropdown menu, select **Routes traffic to**.
47+
48+
1. In the select resource type dropdown menu, select **Select all**.
49+
50+
:::image type="content" source="media/detect-exposed-ip-addresses/select-all.png" alt-text="Screenshot that shows where the select all option is located." lightbox="media/detect-exposed-ip-addresses/select-all.png":::
51+
52+
1. Select **Done**.
53+
54+
1. Select the **+** button.
55+
56+
1. In the select condition dropdown menu, select **Routes traffic to**.
57+
58+
1. In the select resource type dropdown menu, select **Virtual machine**.
59+
60+
1. Select **Done**.
61+
62+
1. Select **Search**.
63+
64+
:::image type="content" source="media/detect-exposed-ip-addresses/search-results.png" alt-text="Screenshot that shows the fully built query and where the search button is located." lightbox="media/detect-exposed-ip-addresses/search-results.png":::
65+
66+
1. Select a result to review the findings.
67+
68+
## Detect exposed IP addresses with attack path analysis
69+
70+
Using the attack path analysis, you can view a visualization of the attack paths that an attacker could use to reach your critical assets.
71+
72+
1. Sign in to the [Azure portal](https://portal.azure.com/).
73+
74+
1. Search for and select **Microsoft Defender for Cloud** > **Attack path analysis**.
75+
76+
1. Search for **Internet exposed**.
77+
78+
1. Review and select a result.
79+
80+
1. [Remediate the attack path](how-to-manage-attack-path.md#remediate-attack-paths).
81+
82+
## Next step
83+
84+
> [!div class="nextstepaction"]
85+
> [Identify and remediate attack paths](how-to-manage-attack-path.md)
197 KB
Loading
45.6 KB
Loading
256 KB
Loading
33 KB
Loading
70.3 KB
Loading

0 commit comments

Comments
 (0)