Skip to content

Commit a63261a

Browse files
author
David Curwin
committed
fix link
1 parent b1806aa commit a63261a

File tree

1 file changed

+22
-25
lines changed

1 file changed

+22
-25
lines changed

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 22 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -21,20 +21,20 @@ Microsoft Defender for Cloud includes a bundle of recommendations that are avail
2121

2222
## Prerequisites
2323

24-
- Add the [Required FQDN/application rules for Azure policy](../aks/outbound-rules-control-egress.md#azure-policy).
24+
- Add the [Required FQDN/application rules for Azure policy](../aks/outbound-rules-control-egress.md#azure-policy).
2525
- (For non AKS clusters) [Connect an existing Kubernetes cluster to Azure Arc](../azure-arc/kubernetes/quickstart-connect-cluster.md).
2626

2727
## Enable Kubernetes data plane hardening
2828

2929
You can enable the Azure policy for Kubernetes by one of two ways:
30+
3031
- Enable for all current and future clusters using plan/connector settings
31-
- [Enabling for Azure subscriptions or on-premises](#enabling-for-azure-subscriptions-or-on-premises)
32-
- [Enabling for GCP projects](#enabling-for-gcp-projects)
33-
- [Enable for existing clusters using recommendations (specific clusters or all clusters)](#manually-deploy-the-add-on-to-clusters-using-recommendations-on-specific-clusters).
32+
- [Enabling for Azure subscriptions or on-premises](#enabling-for-azure-subscriptions-or-on-premises)
33+
- [Enabling for GCP projects](#enabling-for-gcp-projects)
34+
- [Enable for existing clusters using recommendations (specific clusters or all clusters)](#manually-deploy-the-add-on-to-clusters-using-recommendations-on-specific-clusters).
3435

3536
### Enable for all current and future clusters using plan/connector settings
3637

37-
3838
> [!NOTE]
3939
> When you enable this setting, the Azure Policy for Kubernetes pods are installed on the cluster. Doing so allocates a small amount of CPU and memory for the pods to use. This allocation might reach maximum capacity, but it doesn't affect the rest of the CPU and memory on the resource.
4040
@@ -47,7 +47,7 @@ When you enable Microsoft Defender for Containers, the "Azure Policy for Kuberne
4747

4848
If you disabled the "Azure Policy for Kubernetes" settings under the containers plan, you can follow the below steps to enable it across all clusters in your subscription:
4949

50-
1. Sign in to the [Azure portal](https://portal.azure.com).
50+
1. Sign in to the [Azure portal](https://portal.azure.com).
5151

5252
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
5353

@@ -63,33 +63,32 @@ If you disabled the "Azure Policy for Kubernetes" settings under the containers
6363

6464
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
6565

66-
#### Enabling for GCP projects
66+
#### Enabling for GCP projects
6767

6868
When you enable Microsoft Defender for Containers on a GCP connector, the "Azure Policy Extension for Azure Arc" setting is enabled by default for the Google Kubernetes Engine in the relevant project. If you disable the setting on initial configuration you can enable it afterwards manually.
6969

70-
If you disabled the "Azure Policy Extension for Azure Arc" settings under the GCP connector, you can follow the below steps to [enable it on your GCP connector](/defender-for-containers-enable?tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-gke&preserve-view=true#protect-google-kubernetes-engine-gke-clusters).
70+
If you disabled the "Azure Policy Extension for Azure Arc" settings under the GCP connector, you can follow the below steps to [enable it on your GCP connector](defender-for-containers-enable.md?tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-gke&preserve-view=true#protect-google-kubernetes-engine-gke-clusters).
7171

7272
### Manually deploy the add-on to clusters using recommendations on specific clusters
7373

7474
You can manually configure the Kubernetes data plane hardening add-on, or extension on specific cluster through the Recommendations page using the following recommendations:
7575

76-
- **Azure Recommendations** - `"Azure Policy add-on for Kubernetes should be installed and enabled on your clusters"`, or `"Azure policy extension for Kubernetes should be installed and enabled on your clusters"`.
76+
- **Azure Recommendations** - `"Azure Policy add-on for Kubernetes should be installed and enabled on your clusters"`, or `"Azure policy extension for Kubernetes should be installed and enabled on your clusters"`.
7777
- **GCP Recommendation** - `"GKE clusters should have Microsoft Defender's extension for Azure Arc installed"`.
7878
- **AWS Recommendation** - `"EKS clusters should have Microsoft Defender's extension for Azure Arc installed"`.
7979

8080
Once enabled, the hardening recommendation becomes available (some of the recommendations require another configuration to work).
8181

82-
> [!NOTE]
82+
> [!NOTE]
8383
> For AWS it isn't possible to do onboarding at scale using the connector, but it can be installed on all clusters or specific clusters using the recommendation ["EKS clusters should have Microsoft Defender's extension for Azure Arc installed"](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/38307993-84fb-4636-8ce7-3a64466bb5cc).
8484
85-
8685
**To deploy the add-on to specified clusters**:
8786

8887
1. From the recommendations page, search for the relevant recommendation:
8988
- **Azure** - `Azure Kubernetes Service clusters should have the Azure Policy add-on for Kubernetes installed` or `Azure policy extension for Kubernetes should be installed and enabled on your clusters`
9089
- **AWS** - `EKS clusters should have Microsoft Defender's extension for Azure Arc installed`
9190
- **GCP** - `GKE clusters should have Microsoft Defender's extension for Azure Arc installed`
92-
91+
9392
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
9493

9594
> [!TIP]
@@ -106,7 +105,7 @@ Once enabled, the hardening recommendation becomes available (some of the recomm
106105
Approximately 30 minutes after the add-on installation completes, Defender for Cloud shows the clusters’ health status for the following recommendations, each in the relevant security control as shown:
107106

108107
> [!NOTE]
109-
> If you're installing the add-on/extension for the first time, these recommendations will appear as new additions in the list of recommendations.
108+
> If you're installing the add-on/extension for the first time, these recommendations will appear as new additions in the list of recommendations.
110109
111110
> [!TIP]
112111
> Some recommendations have parameters that must be customized via Azure Policy to use them effectively. For example, to benefit from the recommendation **Container images should be deployed only from trusted registries**, you'll have to define your trusted registries. If you don't enter the necessary parameters for the recommendations that require configuration, your workloads will be shown as unhealthy.
@@ -130,27 +129,26 @@ Approximately 30 minutes after the add-on installation completes, Defender for C
130129
| Privileged containers should be avoided | Manage access and permissions | No |
131130
| Running containers as root user should be avoided | Manage access and permissions | No |
132131

133-
134132
For recommendations with parameters that need to be customized, you need to set the parameters:
135133

136134
**To set the parameters**:
137-
138-
1. Sign in to the [Azure portal](https://portal.azure.com).
135+
136+
1. Sign in to the [Azure portal](https://portal.azure.com).
139137

140138
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
141139

142140
1. Select the relevant subscription.
143141

144142
1. From Defender for Cloud's menu, select **Security policy**.
145-
143+
146144
1. Select the relevant assignment. The default assignment is `ASC default`.
147-
145+
148146
1. Open the **Parameters** tab and modify the values as required.
149147

150148
:::image type="content" source="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png" alt-text="Screenshot showing where to modify the parameters for one of the recommendations in the Kubernetes data plane hardening protection bundle." lightbox="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png":::
151149

152150
1. Select **Review + save**.
153-
151+
154152
1. Select **Save**.
155153

156154
**To enforce any of the recommendations**:
@@ -159,19 +157,19 @@ For recommendations with parameters that need to be customized, you need to set
159157

160158
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
161159

162-
The pane to set the scope opens.
160+
The pane to set the scope opens.
163161

164162
1. Set the scope and select **Change to deny**.
165163

166164
**To see which recommendations apply to your clusters**:
167165

168166
1. Open Defender for Cloud's [asset inventory](asset-inventory.md) page and set the resource type filter to **Kubernetes services**.
169167

170-
1. Select a cluster to investigate and review the available recommendations available for it.
168+
1. Select a cluster to investigate and review the available recommendations available for it.
171169

172170
When you view a recommendation from the workload protection set, the number of affected pods ("Kubernetes components") is listed alongside the cluster. For a list of the specific pods, select the cluster and then select **Take action**.
173171

174-
:::image type="content" source="./media/defender-for-kubernetes-usage/view-affected-pods-for-recommendation.gif" alt-text="Screenshot showing where to view the affected pods for a Kubernetes recommendation.":::
172+
:::image type="content" source="./media/defender-for-kubernetes-usage/view-affected-pods-for-recommendation.gif" alt-text="Screenshot showing where to view the affected pods for a Kubernetes recommendation.":::
175173

176174
**To test the enforcement, use the two Kubernetes deployments below**:
177175

@@ -181,7 +179,6 @@ When you view a recommendation from the workload protection set, the number of a
181179

182180
Deploy the example .yaml files as-is, or use them as a reference to remediate your own workload.
183181

184-
185182
## Healthy deployment example .yaml file
186183

187184
```yml
@@ -293,9 +290,9 @@ spec:
293290
294291
## Next steps
295292
296-
In this article, you learned how to configure Kubernetes data plane hardening.
293+
In this article, you learned how to configure Kubernetes data plane hardening.
297294
298-
For related material, see the following pages:
295+
For related material, see the following pages:
299296
300297
- [Defender for Cloud recommendations for compute](recommendations-reference.md#recs-compute)
301298
- [Alerts for AKS cluster level](alerts-reference.md#alerts-k8scluster)

0 commit comments

Comments
 (0)