Skip to content

Commit b84e0db

Browse files
committed
Release note regarding CMK recs moving to best practices
1 parent 1244dbc commit b84e0db

File tree

1 file changed

+21
-1
lines changed

1 file changed

+21
-1
lines changed

articles/security-center/release-notes.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: memildin
55
manager: rkarlin
66
ms.service: security-center
77
ms.topic: reference
8-
ms.date: 04/06/2021
8+
ms.date: 04/11/2021
99
ms.author: memildin
1010

1111
---
@@ -27,6 +27,7 @@ Updates in April include:
2727
- [Four new recommendations related to guest configuration (preview)](#four-new-recommendations-related-to-guest-configuration-preview)
2828
- [Use Azure Defender for Kubernetes to protect hybrid and multi-cloud Kubernetes deployments (preview)](#use-azure-defender-for-kubernetes-to-protect-hybrid-and-multi-cloud-kubernetes-deployments-preview)
2929
- [11 Azure Defender alerts deprecated](#11-azure-defender-alerts-deprecated)
30+
- [CMK recommendations moved to best practices security control](#cmk-recommendations-moved-to-best-practices-security-control)
3031
- [Two recommendations from "Apply system updates" security control were deprecated](#two-recommendations-from-apply-system-updates-security-control-were-deprecated)
3132

3233
### Four new recommendations related to guest configuration (preview)
@@ -67,6 +68,25 @@ Learn more in [Use Azure Defender for Kubernetes with your on-premises and multi
6768
:::image type="content" source="media/defender-for-kubernetes-azure-arc/extension-recommendation.png" alt-text="Azure Security Center's recommendation for deploying the Azure Defender extension for Azure Arc enabled Kubernetes clusters." lightbox="media/defender-for-kubernetes-azure-arc/extension-recommendation.png":::
6869

6970

71+
### CMK recommendations moved to best practices security control
72+
73+
Every organization's security program includes data encryption requirements. By default, Azure customers' data is encrypted at rest with service-managed keys. However, customer-managed keys (CMK) are commonly required to meet regulatory compliance standards. CMKs let you encrypt your data with an [Azure Key Vault](../key-vault/general/overview.md) key created and owned by you. This gives you full control and responsibility for the key lifecycle, including rotation and management.
74+
75+
Azure Security Center's security controls are logical groups of related security recommendations, and reflect your vulnerable attack surfaces. Each control has a maximum number of points you can add to your secure score if you remediate all of the recommendations listed in the control, for all of your resources. The **Implement security best practices** security control is worth zero points. So recommendations in this control don't affect your secure score.
76+
77+
The recommendations listed below are being moved to the **Implement security best practices** security control to better reflect their optional nature. This move ensures that these recommendations are in the most appropriate control to meet their objective.
78+
79+
- Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest
80+
- Azure Machine Learning workspaces should be encrypted with a customer-managed key (CMK)
81+
- Cognitive Services accounts should enable data encryption with a customer-managed key (CMK)
82+
- Container registries should be encrypted with a customer-managed key (CMK)
83+
- SQL managed instances should use customer-managed keys to encrypt data at rest
84+
- SQL servers should use customer-managed keys to encrypt data at rest
85+
- Storage accounts should use customer-managed key (CMK) for encryption
86+
87+
Learn which recommendations are in each security control in [Security controls and their recommendations](secure-score-security-controls.md#security-controls-and-their-recommendations).
88+
89+
7090
### 11 Azure Defender alerts deprecated
7191

7292
The eleven Azure Defender alerts listed below have been deprecated.

0 commit comments

Comments
 (0)