Skip to content

Commit b14fbeb

Browse files
Merge pull request #277656 from ElazarK/wi261474-CIEM-reccs
changed CIEM names
2 parents 2fe9065 + 71163f2 commit b14fbeb

File tree

4 files changed

+14
-13
lines changed

4 files changed

+14
-13
lines changed

articles/defender-for-cloud/enable-permissions-management.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ author: Elazark
44
ms.author: elkrieger
55
description: Learn how to enable Permissions Management for better access control and security in your cloud infrastructure.
66
ms.topic: how-to
7-
ms.date: 05/07/2024
7+
ms.date: 06/09/2024
88
#customer intent: As a cloud administrator, I want to learn how to enable permissions (CIEM) in order to effectively manage user access and entitlements in my cloud infrastructure.
99
---
1010

@@ -54,7 +54,7 @@ List of Azure recommendations:
5454

5555
- Azure over-provisioned identities should have only the necessary permissions
5656

57-
- Unused identities in your Azure environment should be revoked/removed
57+
- Permissions of inactive identities in your Azure subscription should be revoked
5858

5959
- Super identities in your Azure environment should be revoked/removed
6060

@@ -99,7 +99,7 @@ List of AWS recommendations:
9999

100100
- AWS over-provisioned identities should have only the necessary permissions
101101

102-
- Unused identities in your Azure environment should be revoked/removed
102+
- Permissions of inactive identities in your Azure subscription should be revoked
103103

104104
## Enable Permissions Management (CIEM) for GCP
105105

@@ -145,10 +145,11 @@ List of GCP recommendations:
145145

146146
- GCP over-provisioned identities should have only necessary permissions
147147

148-
- Unused identities in your GCP environment should be revoked/removed
148+
- Permissions of inactive identities in your GCP project should be revoked
149149

150150
- Super identities in your GCP environment should be revoked/removed
151151

152152
## Next step
153153

154-
Learn more about [Microsoft Entra Permissions Management](/entra/permissions-management/).
154+
> [!div class="nextstepaction"]
155+
> [Microsoft Entra Permissions Management](/entra/permissions-management/).

articles/defender-for-cloud/recommendations-reference-aws.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Reference table for all security recommendations for AWS resources
33
description: This article lists all Microsoft Defender for Cloud security recommendations that help you harden and protect your Amazon Web Services (AWS) resources.
44
ms.topic: reference
5-
ms.date: 03/13/2024
5+
ms.date: 06/09/2024
66
ms.custom: generated
77
ai-usage: ai-assisted
88
---
@@ -1147,9 +1147,9 @@ Secrets Manager can rotate secrets. You can use rotation to replace long-term se
11471147

11481148
**Severity**: Medium
11491149

1150-
### [Unused identities in your AWS environment should be removed](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/71016e8c-d079-479d-942b-9c95b463e4a6)
1150+
### [Permissions of inactive identities in your AWS account should be revoked](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/71016e8c-d079-479d-942b-9c95b463e4a6)
11511151

1152-
**Description**: Inactive identities are human and non-human entities that haven't performed any action on any resource in the last 90 days. Inactive IAM identities with high-risk permissions in your AWS account can be prone to attack if left as is and leave organizations open to credential misuse or exploitation. Proactively detecting and responding to unused identities helps you prevent unauthorized entities from gaining access to your AWS resources.
1152+
**Description**: Microsoft Defender for Cloud discovered an identity that has not performed any action on any resource within your AWS account in the past 45 days. It is recommended to revoke permissions of inactive identities, in order to reduce the attack surface of your cloud environment.
11531153

11541154
**Severity**: Medium
11551155

articles/defender-for-cloud/recommendations-reference-gcp.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Reference table for all security recommendations for GCP resources
33
description: This article lists all Microsoft Defender for Cloud security recommendations that help you harden and protect your Google Cloud Platform (GCP) resources.
44
ms.topic: reference
5-
ms.date: 03/13/2024
5+
ms.date: 06/09/2024
66
ms.custom: generated
77
ai-usage: ai-assisted
88
---
@@ -983,9 +983,9 @@ GCP facilitates up to 10 external service account keys per service account to fa
983983

984984
**Severity**: High
985985

986-
### [Unused identities in your GCP environment should be removed](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/257e9506-fd47-4123-a8ef-92017f845906)
986+
### [Permissions of inactive identities in your GCP project should be revoked](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/257e9506-fd47-4123-a8ef-92017f845906)
987987

988-
**Description**: It's imperative to identify unused identities as they pose significant security risks. These identities often involve bad practices, such as excessive permissions and mismanaged keys that leave organizations open to credential misuse or exploitation and increases your resource`s attack surface. Inactive identities are human and nonhuman entities that haven't performed any action on any resource in the last 90 days. Service account keys can become a security risk if not managed carefully.
988+
**Description**: Microsoft Defender for Cloud discovered an identity that has not performed any action on any resource within your GCP project in the past 45 days. It is recommended to revoke permissions of inactive identities, in order to reduce the attack surface of your cloud environment.
989989

990990
**Severity**: Medium
991991

articles/defender-for-cloud/recommendations-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1841,9 +1841,9 @@ Learn more in [Introduction to Microsoft Defender for Key Vault](defender-for-ke
18411841

18421842
**Severity**: Medium
18431843

1844-
### [Unused identities in your Azure environment should be removed (Preview)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/7af29efb-41cc-47b6-81b8-800a0888f9a2)
1844+
### [Permissions of inactive identities in your Azure subscription should be revoked](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/7af29efb-41cc-47b6-81b8-800a0888f9a2)
18451845

1846-
**Description**: Inactive Identities are the identities that have not performed any action on any infrastructure resources in the last 90 days. Inactive identities pose a significant risk to your organization as they could be used by attackers to gain access and execute tasks in your environment.
1846+
**Description**: Microsoft Defender for Cloud discovered an identity that has not performed any action on any resource within your Azure subscription in the past 45 days. It is recommended to revoke permissions of inactive identities, in order to reduce the attack surface of your cloud environment.
18471847

18481848
**Severity**: Medium
18491849

0 commit comments

Comments
 (0)