You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/recommendations-reference.md
+20-15Lines changed: 20 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article lists all Microsoft Defender for Cloud security recomm
4
4
author: dcurwin
5
5
ms.service: defender-for-cloud
6
6
ms.topic: reference
7
-
ms.date: 03/13/2024
7
+
ms.date: 04/01/2024
8
8
ms.author: dacurwin
9
9
ms.custom: generated
10
10
ai-usage: ai-assisted
@@ -1239,13 +1239,6 @@ Secure your storage account with greater flexibility using customer-managed keys
1239
1239
1240
1240
**Severity**: Low
1241
1241
1242
-
### [Cognitive Services accounts should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)
1243
-
1244
-
**Description**: Network access to Cognitive Services accounts should be restricted. Configure network rules so only applications from allowed networks can access the Cognitive Services account. To allow connections from specific internet or on-premises clients, access can be granted to traffic from specific Azure virtual networks or to public internet IP address ranges.
1245
-
(Related policy: [Cognitive Services accounts should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f037eea7a-bd0a-46c5-9a66-03aea78705d3)).
1246
-
1247
-
**Severity**: Medium
1248
-
1249
1242
### [Cognitive Services accounts should use customer owned storage or enable data encryption](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/aa395469-1687-78a7-bf76-f4614ef72977)
1250
1243
1251
1244
**Description**: This policy audits any Cognitive Services account not using customer owned storage nor data encryption. For each Cognitive Services account with storage, use either customer owned storage or enable data encryption.
@@ -1477,13 +1470,6 @@ Configure a private endpoint connection to enable access to traffic coming only
1477
1470
1478
1471
**Severity**: Medium
1479
1472
1480
-
### [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7)
1481
-
1482
-
**Description**: This policy audits any Cognitive Services account in your environment with public network access enabled. Public network access should be disabled so that only connections from private endpoints are allowed.
1483
-
(Related policy: [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f0725b4dd-7e76-479c-a735-68e7ee23d5ca)).
1484
-
1485
-
**Severity**: Medium
1486
-
1487
1473
### [Public network access should be disabled for MariaDB servers](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ab153e43-2fb5-0670-2117-70340851ea9b)
1488
1474
1489
1475
**Description**: Disable the public network access property to improve security and ensure your Azure Database for MariaDB can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules.
@@ -2142,6 +2128,18 @@ Note that the following subnet types will be listed as not applicable: GatewaySu
2142
2128
2143
2129
**Severity**: Medium
2144
2130
2131
+
### [Azure AI Services resources should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)
2132
+
2133
+
**Description**: By restricting network access, you can ensure that only allowed networks can access the service. This can be achieved by configuring network rules so that only applications from allowed networks can access the Azure AI service resource.
2134
+
2135
+
**Severity**: Medium
2136
+
2137
+
### [Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6)
2138
+
2139
+
**Description**: Key access (local authentication) is recommended to be disabled for security. Azure OpenAI Studio, typically used in development/testing, requires key access and will not function if key access is disabled. After disabling, Microsoft Entra ID becomes the only access method, which allows maintaining minimum privilege principle and granular control. [Learn more](https://aka.ms/AI/auth).
2140
+
2141
+
**Severity**: Medium
2142
+
2145
2143
## Deprecated recommendations
2146
2144
2147
2145
### Over-provisioned identities in subscriptions should be investigated to reduce the Permission Creep Index (PCI)
@@ -2253,6 +2251,13 @@ Learn more about how endpoint protection for machines is evaluated in [Endpoint
2253
2251
2254
2252
**Severity**: High
2255
2253
2254
+
### [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7)
2255
+
2256
+
**Description**: This policy audits any Cognitive Services account in your environment with public network access enabled. Public network access should be disabled so that only connections from private endpoints are allowed.
2257
+
(Related policy: [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f0725b4dd-7e76-479c-a735-68e7ee23d5ca)).
2258
+
2259
+
**Severity**: Medium
2260
+
2256
2261
## Related content
2257
2262
2258
2263
-[What are security policies, initiatives, and recommendations?](security-policy-concept.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+30Lines changed: 30 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,36 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
20
20
21
21
If you're looking for items older than six months, you can find them in the [Archive for What's new in Microsoft Defender for Cloud](release-notes-archive.md).
| April 1 | Update recommendations to align with Azure AI Services resources |
28
+
| April 1 | Deprecation of Cognitive Services recommendation |
29
+
30
+
### Update recommendations to align with Azure AI Services resources
31
+
32
+
April 1, 2024
33
+
34
+
The Azure AI Services category (formerly known as Cognitive Services) added new resource types. As a result, the following recommendations and related policy are updated to comply with the new Azure AI Services naming format and align with the relevant resources.
35
+
36
+
| Old recommendation | Updated recommendation |
37
+
| ---- | ---- |
38
+
| Cognitive Services accounts should restrict network access |[Azure AI Services resources should restrict network access](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)|
39
+
| Cognitive Services accounts should have local authentication methods disabled |[Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6)|
40
+
41
+
See the [list of security recommendations](recommendations-reference.md).
42
+
43
+
### Deprecation of Cognitive Services recommendation
44
+
45
+
April 1, 2024
46
+
47
+
The recommendation [`Public network access should be disabled for Cognitive Services accounts`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7) is deprecated. The related policy definition [`Cognitive Services accounts should disable public network access`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0725b4dd-7e76-479c-a735-68e7ee23d5ca) has also been removed from the regulatory compliance dashboard.
48
+
49
+
This recommendation is already being covered by another networking recommendation for Azure AI Services, [`Cognitive Services accounts should restrict network access`](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243/showSecurityCenterCommandBar~/false).
50
+
51
+
See the [list of security recommendations](recommendations-reference.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+1-30Lines changed: 1 addition & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Important upcoming changes
3
3
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan.
4
4
ms.topic: overview
5
-
ms.date: 03/28/2024
5
+
ms.date: 04/01/2024
6
6
---
7
7
8
8
# Important upcoming changes to Microsoft Defender for Cloud
@@ -29,8 +29,6 @@ If you're looking for the latest release notes, you can find them in the [What's
29
29
|[Defender for open-source relational databases updates](#defender-for-open-source-relational-databases-updates)| March 6, 2024 | April, 2024 |
30
30
|[Changes in where you access Compliance offerings and Microsoft Actions](#changes-in-where-you-access-compliance-offerings-and-microsoft-actions)| March 3, 2024 | September 30, 2025 |
31
31
|[Microsoft Security Code Analysis (MSCA) is no longer operational](#microsoft-security-code-analysis-msca-is-no-longer-operational)| February 26, 2024 | February 26, 2024 |
32
-
|[Update recommendations to align with Azure AI Services resources](#update-recommendations-to-align-with-azure-ai-services-resources)| February 20, 2024 | February 28, 2024 |
33
-
|[Deprecation of data recommendation](#deprecation-of-data-recommendation)| February 12, 2024 | March 14, 2024 |
34
32
|[Decommissioning of Microsoft.SecurityDevOps resource provider](#decommissioning-of-microsoftsecuritydevops-resource-provider)| February 5, 2024 | March 6, 2024 |
35
33
|[Change in pricing for multicloud container threat detection](#change-in-pricing-for-multicloud-container-threat-detection)| January 30, 2024 | April 2024 |
36
34
|[Enforcement of Defender CSPM for Premium DevOps Security Capabilities](#enforcement-of-defender-cspm-for-premium-devops-security-value)| January 29, 2024 | March 2024 |
@@ -109,33 +107,6 @@ In February 2021, the deprecation of the MSCA task was communicated to all custo
109
107
110
108
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and more security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
111
109
112
-
## Update recommendations to align with Azure AI Services resources
113
-
114
-
**Announcement date: February 20, 2024**
115
-
116
-
**Estimated date of change: February 28, 2024**
117
-
118
-
The Azure AI Services category (formerly known as Cognitive Services) is adding new resource types. As a result, the following recommendations and related policy are set to be updated to comply with the new Azure AI Services naming format and align with the relevant resources.
119
-
120
-
| Current Recommendation | Updated Recommendation |
121
-
| ---- | ---- |
122
-
| Cognitive Services accounts should restrict network access |[Azure AI Services resources should restrict network access](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)|
123
-
| Cognitive Services accounts should have local authentication methods disabled |[Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6)|
124
-
125
-
See the [list of security recommendations](recommendations-reference.md).
126
-
127
-
## Deprecation of data recommendation
128
-
129
-
**Announcement date: February 12, 2024**
130
-
131
-
**Estimated date of change: March 14, 2024**
132
-
133
-
The recommendation [`Public network access should be disabled for Cognitive Services accounts`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7) is set to be deprecated. The related policy definition [`Cognitive Services accounts should disable public network access`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0725b4dd-7e76-479c-a735-68e7ee23d5ca) is also being removed from the regulatory compliance dashboard.
134
-
135
-
This recommendation is already being covered by another networking recommendation for Azure AI Services, [`Cognitive Services accounts should restrict network access`](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243/showSecurityCenterCommandBar~/false).
136
-
137
-
See the [list of security recommendations](recommendations-reference.md).
138
-
139
110
## Decommissioning of Microsoft.SecurityDevOps resource provider
0 commit comments