Skip to content

Commit ad790fc

Browse files
authored
Merge pull request #250845 from AlizaBernstein/WI-157191-release-note-nine-new-recommendations-sept23
WI-157191-release-note-nine-new-recommendations-sept23
2 parents 6f86b9c + e5c6fe1 commit ad790fc

File tree

7 files changed

+140
-105
lines changed

7 files changed

+140
-105
lines changed

articles/defender-for-cloud/recommendations-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article lists Microsoft Defender for Cloud's security recommen
44
author: dcurwin
55
ms.service: defender-for-cloud
66
ms.topic: reference
7-
ms.date: 09/27/2023
7+
ms.date: 10/05/2023
88
ms.author: dacurwin
99
ms.custom: generated
1010
---
@@ -72,7 +72,7 @@ impact on your secure score.
7272
|Microsoft Defender for APIs should be enabled|Enable the Defender for APIs plan to discover and protect API resources against attacks and security misconfigurations. [Learn more](defender-for-apis-deploy.md)|High|
7373
|Azure API Management APIs should be onboarded to Defender for APIs. | Onboarding APIs to Defender for APIs requires compute and memory utilization on the Azure API Management service. Monitor performance of your Azure API Management service while onboarding APIs, and scale out your Azure API Management resources as needed.|High|
7474
|API endpoints that are unused should be disabled and removed from the Azure API Management service|As a security best practice, API endpoints that haven't received traffic for 30 days are considered unused, and should be removed from the Azure API Management service. Keeping unused API endpoints might pose a security risk. These might be APIs that should have been deprecated from the Azure API Management service, but have accidentally been left active. Such APIs typically do not receive the most up-to-date security coverage.|Low|
75-
|API endpoints in Azure API Management should be authenticated|API endpoints published within Azure API Management should enforce authentication to help minimize security risk. Authentication mechanisms are sometimes implemented incorrectly or are missing. This allows attackers to exploit implementation flaws and to access data. For APIs published in Azure API Management, this recommendation assesses authentication though verifying the presence of Azure API Management subscription keys for APIs or products where subscription is required, and the execution of policies for validating [JWT](/azure/api-management/validate-jwt-policy), [client certificates](/azure/api-management/validate-client-certificate-policy), and [Microsoft Entra](/azure/api-management/validate-azure-ad-token-policy) tokens. If none of these authentication mechanisms are executed during the API call, the API will receive this recommendation.|High|
75+
|API endpoints in Azure API Management should be authenticated|API endpoints published within Azure API Management should enforce authentication to help minimize security risk. Authentication mechanisms are sometimes implemented incorrectly or are missing. This allows attackers to exploit implementation flaws and to access data. For APIs published in Azure API Management, this recommendation assesses authentication through verifying the presence of Azure API Management subscription keys for APIs or products where subscription is required, and the execution of policies for validating [JWT](/azure/api-management/validate-jwt-policy), [client certificates](/azure/api-management/validate-client-certificate-policy), and [Microsoft Entra](/azure/api-management/validate-azure-ad-token-policy) tokens. If none of these authentication mechanisms are executed during the API call, the API will receive this recommendation.|High|
7676

7777
## API management recommendations
7878

articles/defender-for-cloud/release-notes-archive.md

Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,87 @@ This page provides you with information about:
1717
- Bug fixes
1818
- Deprecated functionality
1919

20+
## July 2023
21+
22+
Updates in July include:
23+
24+
|Date |Update |
25+
|----------|----------|
26+
| July 31 | [Preview release of containers Vulnerability Assessment powered by Microsoft Defender Vulnerability Management (MDVM) in Defender for Containers and Defender for Container Registries](#preview-release-of-containers-vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management-mdvm-in-defender-for-containers-and-defender-for-container-registries) |
27+
| July 30 | [Agentless container posture in Defender CSPM is now Generally Available](#agentless-container-posture-in-defender-cspm-is-now-generally-available) |
28+
| July 20 | [Management of automatic updates to Defender for Endpoint for Linux](#management-of-automatic-updates-to-defender-for-endpoint-for-linux) |
29+
| July 18 | [Agentless secrets scanning for virtual machines in Defender for servers P2 & Defender CSPM](#agentless-secrets-scanning-for-virtual-machines-in-defender-for-servers-p2--defender-cspm) |
30+
| July 12 | [New Security alert in Defender for Servers plan 2: Detecting Potential Attacks leveraging Azure VM GPU driver extensions](#new-security-alert-in-defender-for-servers-plan-2-detecting-potential-attacks-leveraging-azure-vm-gpu-driver-extensions) |
31+
| July 9 | [Support for disabling specific vulnerability findings](#support-for-disabling-specific-vulnerability-findings) |
32+
| July 1 | [Data Aware Security Posture is now Generally Available](#data-aware-security-posture-is-now-generally-available) |
33+
34+
### Preview release of containers Vulnerability Assessment powered by Microsoft Defender Vulnerability Management (MDVM) in Defender for Containers and Defender for Container Registries
35+
36+
July 31, 2023
37+
38+
We're announcing the release of Vulnerability Assessment (VA) for Linux container images in Azure container registries powered by Microsoft Defender Vulnerability Management (MDVM) in Defender for Containers and Defender for Container Registries. The new container VA offering will be provided alongside our existing Container VA offering powered by Qualys in both Defender for Containers and Defender for Container Registries, and include daily rescans of container images, exploitability information, support for OS and programming languages (SCA) and more.
39+
40+
This new offering will start rolling out today, and is expected to be available to all customers by August 7.
41+
42+
For more information, see [Container Vulnerability Assessment powered by MDVM](agentless-vulnerability-assessment-azure.md) and [Microsoft Defender Vulnerability Management (MDVM)](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management).
43+
44+
### Agentless container posture in Defender CSPM is now Generally Available
45+
46+
July 30, 2023
47+
48+
Agentless container posture capabilities are now Generally Available (GA) as part of the Defender CSPM (Cloud Security Posture Management) plan.
49+
50+
Learn more about [agentless container posture in Defender CSPM](concept-agentless-containers.md).
51+
52+
### Management of automatic updates to Defender for Endpoint for Linux
53+
54+
July 20, 2023
55+
56+
By default, Defender for Cloud attempts to update your Defender for Endpoint for Linux agents onboarded with the `MDE.Linux` extension. With this release, you can manage this setting and opt-out from the default configuration to manage your update cycles manually.
57+
58+
Learn how to [manage automatic updates configuration for Linux](integration-defender-for-endpoint.md#manage-automatic-updates-configuration-for-linux).
59+
60+
### Agentless secrets scanning for virtual machines in Defender for servers P2 & Defender CSPM
61+
62+
July 18, 2023
63+
64+
Secrets scanning is now available as part of the agentless scanning in Defender for Servers P2 and Defender CSPM. This capability helps to detect unmanaged and insecure secrets saved on virtual machines in Azure or AWS resources that can be used to move laterally in the network. If secrets are detected, Defender for Cloud can help to prioritize and take actionable remediation steps to minimize the risk of lateral movement, all without affecting your machine's performance.
65+
66+
For more information about how to protect your secrets with secrets scanning, see [Manage secrets with agentless secrets scanning](secret-scanning.md).
67+
68+
### New security alert in Defender for Servers plan 2: detecting potential attacks leveraging Azure VM GPU driver extensions
69+
70+
July 12, 2023
71+
72+
This alert focuses on identifying suspicious activities leveraging Azure virtual machine **GPU driver extensions** and provides insights into attackers' attempts to compromise your virtual machines. The alert targets suspicious deployments of GPU driver extensions; such extensions are often abused by threat actors to utilize the full power of the GPU card and perform cryptojacking.
73+
74+
| Alert Display Name <br> (Alert Type) | Description | Severity | MITRE Tactic |
75+
|---------|---------|---------|---------|
76+
| Suspicious installation of GPU extension in your virtual machine (Preview) <br> (VM_GPUDriverExtensionUnusualExecution) | Suspicious installation of a GPU extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription. Attackers might use the GPU driver extension to install GPU drivers on your virtual machine via the Azure Resource Manager to perform cryptojacking. | Low | Impact |
77+
78+
For a complete list of alerts, see the [reference table for all security alerts in Microsoft Defender for Cloud](alerts-reference.md).
79+
80+
### Support for disabling specific vulnerability findings
81+
82+
July 9, 2023
83+
84+
Release of support for disabling vulnerability findings for your container registry images or running images as part of agentless container posture. If you have an organizational need to ignore a vulnerability finding on your container registry image, rather than remediate it, you can optionally disable it. Disabled findings don't affect your secure score or generate unwanted noise.
85+
86+
Learn how to [disable vulnerability assessment findings on Container registry images](disable-vulnerability-findings-containers.md).
87+
88+
### Data Aware Security Posture is now Generally Available
89+
90+
July 1, 2023
91+
92+
Data-aware security posture in Microsoft Defender for Cloud is now Generally Available. It helps customers to reduce data risk, and respond to data breaches. Using data-aware security posture you can:
93+
94+
- Automatically discover sensitive data resources across Azure and AWS.
95+
- Evaluate data sensitivity, data exposure, and how data flows across the organization.
96+
- Proactively and continuously uncover risks that might lead to data breaches.
97+
- Detect suspicious activities that might indicate ongoing threats to sensitive data resources
98+
99+
For more information, see [Data-aware security posture in Microsoft Defender for Cloud](concept-data-security-posture.md).
100+
20101
## June 2023
21102

22103
Updates in June include:

0 commit comments

Comments
 (0)