You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-planning-and-operations-guide.md
+25-18Lines changed: 25 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Defender for Cloud Planning and Operations Guide
3
3
description: This document helps you to plan before adopting Defender for Cloud and considerations regarding daily operations.
4
4
ms.topic: conceptual
5
5
ms.custom: ignite-2022
6
-
ms.date: 01/24/2023
6
+
ms.date: 02/06/2023
7
7
---
8
8
9
9
# Planning and operations guide
@@ -36,38 +36,45 @@ Defender for Cloud enables these individuals to meet these various responsibilit
36
36
37
37
**Jeff (Workload Owner)**
38
38
39
-
- Manage a cloud workload and its related resources
40
-
- Responsible for implementing and maintaining protections in accordance with company security policy
39
+
- Manage a cloud workload and its related resources.
40
+
41
+
- Responsible for implementing and maintaining protections in accordance with company security policy.
41
42
42
43
**Ellen (CISO/CIO)**
43
44
44
-
- Responsible for all aspects of security for the company
45
-
- Wants to understand the company's security posture across cloud workloads
46
-
- Needs to be informed of major attacks and risks
45
+
- Responsible for all aspects of security for the company.
46
+
47
+
- Wants to understand the company's security posture across cloud workloads.
48
+
49
+
- Needs to be informed of major attacks and risks.
47
50
48
51
**David (IT Security)**
49
52
50
-
- Sets company security policies to ensure the appropriate protections are in place
51
-
- Monitors compliance with policies
52
-
- Generates reports for leadership or auditors
53
+
- Sets company security policies to ensure the appropriate protections are in place.
54
+
55
+
- Monitors compliance with policies.
56
+
57
+
- Generates reports for leadership or auditors.
53
58
54
59
**Judy (Security Operations)**
55
60
56
-
- Monitors and responds to security alerts 24/7
57
-
- Escalates to Cloud Workload Owner or IT Security Analyst
61
+
- Monitors and responds to security alerts at any time.
62
+
63
+
- Escalates to Cloud Workload Owner or IT Security Analyst.
58
64
59
65
**Sam (Security Analyst)**
60
66
61
-
- Investigate attacks
62
-
- Work with Cloud Workload Owner to apply remediation
67
+
- Investigate attacks.
68
+
69
+
- Work with Cloud Workload Owner to apply remediation.
63
70
64
-
Defender for Cloud uses [Azure role-based access control (Azure RBAC)](../role-based-access-control/role-assignments-portal.md), which provides [built-in roles](../role-based-access-control/built-in-roles.md) that can be assigned to users, groups, and services in Azure. When a user opens Defender for Cloud, they only see information related to resources they have access to. Which means the user is assigned the role of Owner, Contributor, or Reader to the subscription or resource group that a resource belongs to. In addition to these roles, there are two roles specific to Defender for Cloud:
71
+
Defender for Cloud uses [Azure role-based access control (Azure Role-based access control)](../role-based-access-control/role-assignments-portal.md), which provides [built-in roles](../role-based-access-control/built-in-roles.md) that can be assigned to users, groups, and services in Azure. When a user opens Defender for Cloud, they only see information related to resources they have access to. Which means the user is assigned the role of Owner, Contributor, or Reader to the subscription or resource group that a resource belongs to. In addition to these roles, there are two roles specific to Defender for Cloud:
65
72
66
73
-**Security reader**: a user that belongs to this role is able to view only Defender for Cloud configurations, which include recommendations, alerts, policy, and health, but it won't be able to make changes.
67
74
68
75
-**Security admin**: same as security reader but it can also update the security policy, dismiss recommendations and alerts.
69
76
70
-
The personas explained in the previous diagram need these Azure RBAC roles:
77
+
The personas explained in the previous diagram need these Azure Role-based access control roles:
71
78
72
79
**Jeff (Workload Owner)**
73
80
@@ -93,15 +100,15 @@ The personas explained in the previous diagram need these Azure RBAC roles:
93
100
94
101
- Subscription Owner/Contributor required to dismiss alerts.
95
102
96
-
- Access to the workspace may be required
103
+
- Access to the workspace may be required.
97
104
98
105
Some other important information to consider:
99
106
100
107
- Only subscription Owners/Contributors and Security Admins can edit a security policy.
101
108
102
109
- Only subscription and resource group Owners and Contributors can apply security recommendations for a resource.
103
110
104
-
When planning access control using Azure RBAC for Defender for Cloud, make sure you understand who in your organization needs access to Defender for Cloud the tasks they'll perform. Then you can configure Azure RBAC properly.
111
+
When planning access control using Azure Role-based access control for Defender for Cloud, make sure you understand who in your organization needs access to Defender for Cloud the tasks they'll perform. Then you can configure Azure Role-based access control properly.
105
112
106
113
> [!NOTE]
107
114
> We recommend that you assign the least permissive role needed for users to complete their tasks. For example, users who only need to view information about the security state of resources but not take action, such as applying recommendations or editing policies, should be assigned the Reader role.
@@ -140,7 +147,7 @@ Defender for Cloud uses the Log Analytics agent and the Azure Monitor Agent to c
140
147
141
148
### Agent
142
149
143
-
When automatic provisioning is enabled in the security policy, the [data collection agent](monitoring-components.md) is installed on all supported Azure VMs and any new supported VMs that are created. If the VM or computer already has the Log Analytics agent installed, Defender for Cloud uses the current installed agent. The agent's process is designed to be non-invasive and have minimal impact on VM performance.
150
+
When automatic provisioning is enabled in the security policy, the [data collection agent](monitoring-components.md) is installed on all supported Azure VMs and any new supported VMs that are created. If the VM or computer already has the Log Analytics agent installed, Defender for Cloud uses the current installed agent. The agent's process is designed to be non-invasive and have minimal effect on VM performance.
144
151
145
152
If at some point you want to disable Data Collection, you can turn it off in the security policy. However, because the Log Analytics agent may be used by other Azure management and monitoring services, the agent won't be uninstalled automatically when you turn off data collection in Defender for Cloud. You can manually uninstall the agent if needed.
0 commit comments