Skip to content

Commit b5e259a

Browse files
Merge pull request #281192 from MayaGreenbergShalit/docs-editor/recommendations-reference-data-1721305691
Update recommendations-reference-data.md
2 parents b8c7fac + 0aff8c4 commit b5e259a

File tree

2 files changed

+2
-17
lines changed

2 files changed

+2
-17
lines changed

articles/defender-for-cloud/recommendations-reference-data.md

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -298,21 +298,6 @@ Secure your storage account with greater flexibility using customer-managed keys
298298

299299
**Severity**: Low
300300

301-
### [Cognitive Services accounts should have local authentication methods disabled](recommendations-reference-data.md)
302-
303-
304-
**Description**: Disabling local authentication methods improves security by ensuring that Cognitive Services accounts require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/cs/auth. (Related policy: Cognitive Services accounts should have local authentication methods disabled).
305-
306-
**Severity**: Low
307-
308-
309-
### [Cognitive Services accounts should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)
310-
311-
**Description**: Network access to Cognitive Services accounts should be restricted. Configure network rules so only applications from allowed networks can access the Cognitive Services account. To allow connections from specific internet or on-premises clients, access can be granted to traffic from specific Azure virtual networks or to public internet IP address ranges.
312-
(Related policy: [Cognitive Services accounts should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f037eea7a-bd0a-46c5-9a66-03aea78705d3)).
313-
314-
**Severity**: Medium
315-
316301
### [Cognitive Services accounts should use customer owned storage or enable data encryption](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/aa395469-1687-78a7-bf76-f4614ef72977)
317302

318303
**Description**: This policy audits any Cognitive Services account not using customer owned storage nor data encryption. For each Cognitive Services account with storage, use either customer owned storage or enable data encryption. Aligns with Microsoft Cloud Security Benchmark.

articles/defender-for-cloud/release-notes-recommendations-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -133,8 +133,8 @@ New and updated recommendations and alerts are added to the table in date order.
133133
| January 25 | Alert (Azure network layer) | Update to informational | `Possible incoming SMTP brute force attempts detected (Generic_Incoming_BF_OneToOne)` |
134134
| January 25 | Alert (Azure network layer) | Update to informational | `Traffic detected from IP addresses recommended for blocking (Network_TrafficFromUnrecommendedIP)` |
135135
| January 25 | Alert (Azure Resource Manager) | Update to informational | `Privileged custom role created for your subscription in a suspicious way (Preview)(ARM_PrivilegedRoleDefinitionCreation)` |
136-
| January 4 | Recommendation | Preview | [Cognitive Services accounts should have local authentication methods disabled](recommendations-reference-data.md#cognitive-services-accounts-should-have-local-authentication-methods-disabled)<br/> Microsoft Cloud Security Benchmark |
137-
| January 4 | Recommendation preview | [Cognitive Services should use private link](recommendations-reference-data.md#cognitive-services-should-use-private-link)<br/> Microsoft Cloud Security Benchmark | |
136+
| January 4 | Recommendation | Preview | Cognitive Services accounts should have local authentication methods disabled<br/> Microsoft Cloud Security Benchmark |
137+
| January 4 | Recommendation preview | Cognitive Services should use private link<br/> Microsoft Cloud Security Benchmark | |
138138
| January 4 | Recommendation | Preview | [Virtual machines and virtual machine scale sets should have encryption at host enabled](recommendations-reference-compute.md#virtual-machines-and-virtual-machine-scale-sets-should-have-encryption-at-host-enabled)<br/> Microsoft Cloud Security Benchmark |
139139
| January 4 | Recommendation | Preview | [Azure Cosmos DB should disable public network access](recommendations-reference-data.md#azure-cosmos-db-should-disable-public-network-access)<br/> Microsoft Cloud Security Benchmark |
140140
| January 4 | Recommendation | Preview | [Cosmos DB accounts should use private link](recommendations-reference-data.md#cosmos-db-accounts-should-use-private-link)<br/> Microsoft Cloud Security Benchmark |

0 commit comments

Comments
 (0)