Skip to content

Commit c159367

Browse files
committed
Trying to tweak the table width
1 parent ec8daa4 commit c159367

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/security-center/secure-score-security-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The table below lists the security controls in Azure Security Center. For each c
8888
> [!TIP]
8989
> If you'd like to filter or sort this list differently, copy and paste it into Excel.
9090
91-
|Security controls (listed by maximum score)|Recommendations|
91+
|Security controls (listed by maximum score)|Recommendations                              |
9292
|-----------|---------------|
9393
|**Enable MFA** (max score **10**)<br>*If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still sign on to almost any application with single sign-on.*|- MFA should be enabled on accounts with owner permissions on your subscription<br>- MFA should be enabled accounts with write permissions on your subscription|
9494
|**Secure management ports** (max score **8**)<br>*Brute force attacks target management ports to gain access to a VM. Since the ports don’t always need to be open, one mitigation strategy is to reduce exposure to the ports using just-in-time network access controls, network security groups, and virtual machine port management.<br>Since many IT do not block SSH communications outbound from their network, attackers can create encrypted tunnels that allow RDP ports on infected systems to communicate back to the attacker command to control servers. Attackers can use the Windows Remote Management subsystem to move laterally across your environment and use stolen credentials to access other resources on a network.*|- Just-In-Time network access control should be applied on virtual machines<br>- Virtual machines should be associated with a Network Security Group<br>- Management ports should be closed on your virtual machines|

0 commit comments

Comments
 (0)