Skip to content

Commit cc3aa5f

Browse files
committed
Daily restage
1 parent 44bf562 commit cc3aa5f

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

articles/container-instances/security-baseline.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Azure security baseline for Container Instances
44
author: msmbaldwin
55
ms.service: security
66
ms.topic: conceptual
7-
ms.date: 04/29/2020
7+
ms.date: 04/30/2020
88
ms.author: mbaldwin
99
ms.custom: security-benchmark
1010

@@ -21,9 +21,9 @@ For more information, see the [Azure security baselines overview](https://docs.m
2121
>[!WARNING]
2222
>This preview version of the article is for review only. **DO NOT MERGE INTO MASTER!**
2323
24-
## Network Security
24+
## Network security
2525

26-
*For more information, see [Security control: Network Security](https://docs.microsoft.com/azure/security/benchmarks/security-control-network-security).*
26+
*For more information, see [Security control: Network security](https://docs.microsoft.com/azure/security/benchmarks/security-control-network-security).*
2727

2828
### 1.1: Protect resources using Network Security Groups or Azure Firewall on your Virtual Network
2929

@@ -192,9 +192,9 @@ How to create alerts in Azure Monitor: https://docs.microsoft.com/azure/azure-mo
192192

193193
**Responsibility**: Customer
194194

195-
## Logging and Monitoring
195+
## Logging and monitoring
196196

197-
*For more information, see [Security control: Logging and Monitoring](https://docs.microsoft.com/azure/security/benchmarks/security-control-logging-monitoring).*
197+
*For more information, see [Security control: Logging and monitoring](https://docs.microsoft.com/azure/security/benchmarks/security-control-logging-monitoring).*
198198

199199
### 2.1: Use approved time synchronization sources
200200

@@ -324,9 +324,9 @@ How to alert on log analytics log data: https://docs.microsoft.com/azure/azure-m
324324

325325
**Responsibility**: Customer
326326

327-
## Identity and Access Control
327+
## Identity and access control
328328

329-
*For more information, see [Security control: Identity and Access Control](https://docs.microsoft.com/azure/security/benchmarks/security-control-identity-access-control).*
329+
*For more information, see [Security control: Identity and access control](https://docs.microsoft.com/azure/security/benchmarks/security-control-identity-access-control).*
330330

331331
### 3.1: Maintain an inventory of administrative accounts
332332

@@ -524,9 +524,9 @@ List of Customer Lockbox supported services: https://docs.microsoft.com/azure/se
524524

525525
**Responsibility**: Customer
526526

527-
## Data Protection
527+
## Data protection
528528

529-
*For more information, see [Security control: Data Protection](https://docs.microsoft.com/azure/security/benchmarks/security-control-data-protection).*
529+
*For more information, see [Security control: Data protection](https://docs.microsoft.com/azure/security/benchmarks/security-control-data-protection).*
530530

531531
### 4.1: Maintain an inventory of sensitive Information
532532

@@ -677,9 +677,9 @@ Azure Container Registry logs for diagnostic evaluation and auditing: https://do
677677

678678
**Responsibility**: Customer
679679

680-
## Vulnerability Management
680+
## Vulnerability management
681681

682-
*For more information, see [Security control: Vulnerability Management](https://docs.microsoft.com/azure/security/benchmarks/security-control-vulnerability-management).*
682+
*For more information, see [Security control: Vulnerability management](https://docs.microsoft.com/azure/security/benchmarks/security-control-vulnerability-management).*
683683

684684
### 5.1: Run automated vulnerability scanning tools
685685

@@ -750,9 +750,9 @@ Azure Container Registry integration with Security Center (Preview): https://doc
750750

751751
**Responsibility**: Customer
752752

753-
## Inventory and Asset Management
753+
## Inventory and asset management
754754

755-
*For more information, see [Security control: Inventory and Asset Management](https://docs.microsoft.com/azure/security/benchmarks/security-control-inventory-asset-management).*
755+
*For more information, see [Security control: Inventory and asset management](https://docs.microsoft.com/azure/security/benchmarks/security-control-inventory-asset-management).*
756756

757757
### 6.1: Use Azure Asset Discovery
758758

@@ -943,9 +943,9 @@ How to create an NSG with a security config: https://docs.microsoft.com/azure/vi
943943

944944
**Responsibility**: Customer
945945

946-
## Secure Configuration
946+
## Secure configuration
947947

948-
*For more information, see [Security control: Secure Configuration](https://docs.microsoft.com/azure/security/benchmarks/security-control-secure-configuration).*
948+
*For more information, see [Security control: Secure configuration](https://docs.microsoft.com/azure/security/benchmarks/security-control-secure-configuration).*
949949

950950
### 7.1: Establish secure configurations for all Azure resources
951951

@@ -1132,9 +1132,9 @@ How to setup Credential Scanner: https://secdevtools.azurewebsites.net/helpcreds
11321132

11331133
**Responsibility**: Customer
11341134

1135-
## Malware Defense
1135+
## Malware defense
11361136

1137-
*For more information, see [Security control: Malware Defense](https://docs.microsoft.com/azure/security/benchmarks/security-control-malware-defense).*
1137+
*For more information, see [Security control: Malware defense](https://docs.microsoft.com/azure/security/benchmarks/security-control-malware-defense).*
11381138

11391139
### 8.1: Use centrally managed anti-malware software
11401140

@@ -1173,9 +1173,9 @@ Pre-scan any files being uploaded to non-compute Azure resources, such as App Se
11731173

11741174
**Responsibility**: Customer
11751175

1176-
## Data Recovery
1176+
## Data recovery
11771177

1178-
*For more information, see [Security control: Data Recovery](https://docs.microsoft.com/azure/security/benchmarks/security-control-data-recovery).*
1178+
*For more information, see [Security control: Data recovery](https://docs.microsoft.com/azure/security/benchmarks/security-control-data-recovery).*
11791179

11801180
### 9.1: Ensure regular automated back ups
11811181

@@ -1235,9 +1235,9 @@ How to enable Soft-Delete in Key Vault: https://docs.microsoft.com/azure/storage
12351235

12361236
**Responsibility**: Customer
12371237

1238-
## Incident Response
1238+
## Incident response
12391239

1240-
*For more information, see [Security control: Incident Response](https://docs.microsoft.com/azure/security/benchmarks/security-control-incident-response).*
1240+
*For more information, see [Security control: Incident response](https://docs.microsoft.com/azure/security/benchmarks/security-control-incident-response).*
12411241

12421242
### 10.1: Create an incident response guide
12431243

@@ -1325,9 +1325,9 @@ How to configure Workflow Automation and Logic Apps: https://docs.microsoft.com/
13251325

13261326
**Responsibility**: Customer
13271327

1328-
## Penetration Tests and Red Team Exercises
1328+
## Penetration tests and red team exercises
13291329

1330-
*For more information, see [Security control: Penetration Tests and Red Team Exercises](https://docs.microsoft.com/azure/security/benchmarks/security-control-penetration-tests-red-team-exercises).*
1330+
*For more information, see [Security control: Penetration tests and red team exercises](https://docs.microsoft.com/azure/security/benchmarks/security-control-penetration-tests-red-team-exercises).*
13311331

13321332
### 11.1: Conduct regular penetration testing of your Azure resources and ensure remediation of all critical security findings within 60 days
13331333

0 commit comments

Comments
 (0)