Skip to content

Commit db4e6b1

Browse files
authored
Merge pull request #249780 from ElazarK/WI89231-dpm
Wi89231 DPM
2 parents 0d97207 + 8cec0f8 commit db4e6b1

File tree

13 files changed

+180
-64
lines changed

13 files changed

+180
-64
lines changed

articles/defender-for-cloud/attack-path-reference.md

Lines changed: 13 additions & 10 deletions
Large diffs are not rendered by default.

articles/defender-for-cloud/concept-data-security-posture-prepare.md

Lines changed: 62 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dcurwin
55
ms.author: dacurwin
66
ms.service: defender-for-cloud
77
ms.topic: conceptual
8-
ms.date: 03/23/2023
8+
ms.date: 09/05/2023
99
ms.custom: references_regions
1010
---
1111

@@ -21,30 +21,31 @@ Sensitive data discovery is available in the Defender CSPM and Defender for Stor
2121
- If you have existing plans running, the extension is available, but turned off by default.
2222
- Existing plan status shows as “Partial” rather than “Full” if one or more extensions aren't turned on.
2323
- The feature is turned on at the subscription level.
24-
24+
- If sensitive data discovery is turned on, but Defender CSPM is not enabled, only storage resources will be scanned.
2525

2626
## What's supported
2727

2828
The table summarizes support for data-aware posture management.
2929

3030
|**Support** | **Details**|
3131
|--- | ---|
32-
|What Azure data resources can I discover? | [Block blob](../storage/blobs/storage-blobs-introduction.md) storage accounts in Azure Storage v1/v2<br/><br/> Azure Data Lake Storage Gen2<br/><br/>Storage accounts behind private networks are supported.<br/><br/> Storage accounts encrypted with a customer-managed server-side key are supported.<br/><br/> Accounts aren't supported if any of these settings are enabled: [Public network access is disabled](../storage/common/storage-network-security.md#change-the-default-network-access-rule); Storage account is defined as [Azure DNS Zone](https://techcommunity.microsoft.com/t5/azure-storage-blog/public-preview-create-additional-5000-azure-storage-accounts/ba-p/3465466); The storage account endpoint has a [custom domain mapped to it](../storage/blobs/storage-custom-domain-name.md).|
33-
|What AWS data resources can I discover? | AWS S3 buckets<br/><br/> Defender for Cloud can discover KMS-encrypted data, but not data encrypted with a customer-managed key.|
32+
|What Azure data resources can I discover? | **Object storage:**<br /><br />[Block blob](../storage/blobs/storage-blobs-introduction.md) storage accounts in Azure Storage v1/v2<br/><br/> Azure Data Lake Storage Gen2<br/><br/>Storage accounts behind private networks are supported.<br/><br/> Storage accounts encrypted with a customer-managed server-side key are supported.<br/><br/> Accounts aren't supported if any of these settings are enabled: [Public network access is disabled](../storage/common/storage-network-security.md#change-the-default-network-access-rule); Storage account is defined as [Azure DNS Zone](https://techcommunity.microsoft.com/t5/azure-storage-blog/public-preview-create-additional-5000-azure-storage-accounts/ba-p/3465466); The storage account endpoint has a [custom domain mapped to it](../storage/blobs/storage-custom-domain-name.md).<br /><br /><br />**Databases**<br /><br />Azure SQL Databases (Public preview) |
33+
|What AWS data resources can I discover? | **Object storage:**<br /><br />AWS S3 buckets<br/><br/> Defender for Cloud can discover KMS-encrypted data, but not data encrypted with a customer-managed key.<br /><br />**Databases**<br /><br />Any flavor of RDS instances (Public preview) |
3434
|What GCP data resources can I discover? | GCP storage buckets<br/> Standard Class<br/> Geo: region, dual region, multi region |
35-
|What permissions do I need for discovery? | Storage account: Subscription Owner<br/> **or**<br/> Microsoft.Authorization/roleAssignments/* (read, write, delete) **and** Microsoft.Security/pricings/* (read, write, delete) **and** Microsoft.Security/pricings/SecurityOperators (read, write)<br/><br/> Amazon S3 buckets: AWS account permission to run Cloud Formation (to create a role).<br/><br/>GCP storage buckets: Google account permission to run script (to create a role).|
35+
|What permissions do I need for discovery? | Storage account: Subscription Owner<br/> **or**<br/> `Microsoft.Authorization/roleAssignments/*` (read, write, delete) **and** `Microsoft.Security/pricings/*` (read, write, delete) **and** `Microsoft.Security/pricings/SecurityOperators` (read, write)<br/><br/> Amazon S3 buckets and RDS instances: AWS account permission to run Cloud Formation (to create a role). <br/><br/>GCP storage buckets: Google account permission to run script (to create a role). |
3636
|What file types are supported for sensitive data discovery? | Supported file types (you can't select a subset) - .doc, .docm, .docx, .dot, .gz, .odp, .ods, .odt, .pdf, .pot, .pps, .ppsx, .ppt, .pptm, .pptx, .xlc, .xls, .xlsb, .xlsm, .xlsx, .xlt, .csv, .json, .psv, .ssv, .tsv, .txt., xml, .parquet, .avro, .orc.|
37-
|What Azure regions are supported? | You can discover Azure storage accounts in:<br/><br/> Australia Central; Australia Central 2; Australia East; Australia Southeast; Brazil South; Canada Central; Canada East; Central India; Central US; East Asia; East US; East US 2; France Central; Germany West Central; Japan East; Japan West: Jio India West: North Central US; North Europe; Norway East; South Africa North: South Central US; South India; Sweden Central; Switzerland North; UAE North; UK South; UK West: West Central US; West Europe; West US, West US3.<br/><br/> Discovery is done locally in the region.|
38-
|What AWS regions are supported? | Asia Pacific (Mumbai); Asia Pacific (Singapore); Asia Pacific (Sydney); Asia Pacific (Tokyo); Canada (Central); Europe (Frankfurt); Europe (Ireland); Europe (London); Europe (Paris); South America (São Paulo); US East (Ohio); US East (N. Virginia); US West (N. California): US West (Oregon).<br/><br/> Discovery is done locally in the region.|
37+
|What Azure regions are supported? | You can discover Azure storage accounts in:<br/><br/> Australia Central; Australia Central 2; Australia East; Australia Southeast; Brazil South; Canada Central; Canada East; Central India; Central US; East Asia; East US; East US 2; France Central; Germany West Central; Japan East; Japan West: Jio India West: North Central US; North Europe; Norway East; South Africa North: South Central US; South India; Sweden Central; Switzerland North; UAE North; UK South; UK West: West Central US; West Europe; West US, West US3.<br/><br/> You can discover Azure SQL Databases in any region where Defender CSPM and Azure SQL Databases are supported. |
38+
|What AWS regions are supported? | S3:<br /><br />Asia Pacific (Mumbai); Asia Pacific (Singapore); Asia Pacific (Sydney); Asia Pacific (Tokyo); Canada (Montreal); Europe (Frankfurt); Europe (Ireland); Europe (London); Europe (Paris); Europe (Stockholm); South America (São Paulo); US East (Ohio); US East (N. Virginia); US West (N. California): US West (Oregon).<br/><br/><br />RDS:<br /><br />Africa (Capetown); Asia Pacific (Hong Kong); Asia Pacific (Hyderabad); Asia Pacific (Melbourne); Asia Pacific (Mumbai); Asia Pacific (Osaka); Asia Pacific (Seoul); Asia Pacific (Singapore); Asia Pacific (Sydney); Asia Pacific (Tokyo); Canada (Central); Europe (Frankfurt); Europe (Ireland); Europe (London); Europe (Paris); Europe (Stockholm); Europe (Zurich); Middle East (UAE); South America (São Paulo); US East (Ohio); US East (N. Virginia); US West (N. California): US West (Oregon).<br /><br /> Discovery is done locally within the region. |
3939
|What GCP regions are supported? | europe-west1, us-east1, us-west1, us-central1, us-east4, asia-south1, northamerica-northeast1|
40-
|Do I need to install an agent? | No, discovery is agentless.|
41-
|What's the cost? | The feature is included with the Defender CSPM and Defender for Storage plans, and doesn’t include other costs except for the respective plan costs.|
40+
|Do I need to install an agent? | No, discovery requires no agent installation. |
41+
|What's the cost? | The feature is included with the Defender CSPM and Defender for Storage plans, and doesn’t incur additional costs except for the respective plan costs. |
4242
|What permissions do I need to view/edit data sensitivity settings? | You need one of these Azure Active directory roles: Global Administrator, Compliance Administrator, Compliance Data Administrator, Security Administrator, Security Operator.|
43-
| What permissions do I need to perform onboarding? | You need one of these Azure Active directory roles: Security Admin, Contributor, Owner on the subscription level (where the GCP project/s reside in). For consuming the security findings: Security Reader, Security Admin,Reader, Contributor, Owner on the subscription level (where the GCP project/s reside). |
43+
| What permissions do I need to perform onboarding? | You need one of these Azure Active directory roles: Security Admin, Contributor, Owner on the subscription level (where the GCP project/s reside in). For consuming the security findings: Security Reader, Security Admin, Reader, Contributor, Owner on the subscription level (where the GCP project/s reside). |
4444

4545
## Configuring data sensitivity settings
4646

4747
The main steps for configuring data sensitivity setting include:
48+
4849
- [Import custom sensitive info types/labels from Microsoft Purview compliance portal](data-sensitivity-settings.md#import-custom-sensitive-info-typeslabels)
4950
- [Customize sensitive data categories/types](data-sensitivity-settings.md#customize-sensitive-data-categoriestypes)
5051
- [Set the threshold for sensitivity labels](data-sensitivity-settings.md#set-the-threshold-for-sensitive-data-labels)
@@ -55,11 +56,18 @@ The main steps for configuring data sensitivity setting include:
5556

5657
Defender for Cloud starts discovering data immediately after enabling a plan, or after turning on the feature in plans that are already running.
5758

59+
For object storage:
60+
5861
- It takes up to 24 hours to see the results for a first-time discovery.
5962
- After files are updated in the discovered resources, data is refreshed within eight days.
6063
- A new Azure storage account that's added to an already discovered subscription is discovered within 24 hours or less.
6164
- A new AWS S3 bucket or GCP storage bucket that's added to an already discovered AWS account or Google account is discovered within 48 hours or less.
6265

66+
For databases:
67+
68+
- Databases are scanned on a weekly basis.
69+
- For newly enabled subscriptions, results will appear within 24 hours.
70+
6371
### Discovering AWS S3 buckets
6472

6573
In order to protect AWS resources in Defender for Cloud, you set up an AWS connector, using a CloudFormation template to onboard the AWS account.
@@ -69,9 +77,26 @@ In order to protect AWS resources in Defender for Cloud, you set up an AWS conne
6977
- To connect AWS accounts, you need Administrator permissions on the account.
7078
- The role allows these permissions: S3 read only; KMS decrypt.
7179

72-
### Discovering GCP storage buckets
80+
### Discovering AWS RDS instances
81+
82+
To protect AWS resources in Defender for Cloud, set up an AWS connector using a CloudFormation template to onboard the AWS account.
83+
84+
- To discover AWS RDS instances, Defender for Cloud updates the CloudFormation template.
85+
- The CloudFormation template creates a new role in AWS IAM, to allow permission for the Defender for Cloud scanner to take the last available automated snapshot of your instance and bring it online in an isolated scanning environment within the same AWS region.
86+
- To connect AWS accounts, you need Administrator permissions on the account.
87+
- Automated snapshots need to be enabled on the relevant RDS Instances/Clusters.
88+
- The role allows these permissions (review the CloudFormation template for exact definitions):
89+
- List all RDS DBs/clusters
90+
- Copy all DB/cluster snapshots
91+
- Delete/update DB/cluster snapshot with prefix *defenderfordatabases*
92+
- List all KMS keys
93+
- Use all KMS keys only for RDS on source account
94+
- Full control on all KMS keys with tag prefix *DefenderForDatabases*
95+
- Create alias for KMS keys
96+
97+
### Discovering GCP storage buckets
7398

74-
In order to protect GCP resources in Defender for Cloud, you can set up a Google connector using a script template to onboard the GCP account.
99+
In order to protect GCP resources in Defender for Cloud, you can set up a Google connector using a script template to onboard the GCP account.
75100

76101
- To discover GCP storage buckets, Defender for Cloud updates the script template.
77102
- The script template creates a new role in the Google account to allow permission for the Defender for Cloud scanner to access data in the GCP storage buckets.
@@ -86,8 +111,31 @@ Defender CSPM attack paths and cloud security graph insights include information
86111
**Exposed to the internet** | An Azure storage account is considered exposed to the internet if either of these settings enabled:<br/><br/> Storage_account_name > **Networking** > **Public network access** > **Enabled from all networks**<br/><br/> or<br/><br/> Storage_account_name > **Networking** > **Public network access** > **Enable from selected virtual networks and IP addresses**. | An AWS S3 bucket is considered exposed to the internet if the AWS account/AWS S3 bucket policies don't have a condition set for IP addresses. | All GCP storage buckets are exposed to the internet by default. |
87112
**Allows public access** | An Azure storage account container is considered as allowing public access if these settings are enabled on the storage account:<br/><br/> Storage_account_name > **Configuration** > **Allow blob public access** > **Enabled**.<br/><br/>and **either** of these settings:<br/><br/> Storage_account_name > **Containers** > container_name > **Public access level** set to **Blob (anonymous read access for blobs only)**<br/><br/> Or, storage_account_name > **Containers** > container_name > **Public access level** set to **Container (anonymous read access for containers and blobs)**. | An AWS S3 bucket is considered to allow public access if both the AWS account and the AWS S3 bucket have **Block all public access** set to **Off**, and **either** of these settings is set:<br/><br/> In the policy, **RestrictPublicBuckets** isn't enabled, and the **Principal** setting is set to * and **Effect** is set to **Allow**.<br/><br/> Or, in the access control list, **IgnorePublicAcl** isn't enabled, and permission is allowed for **Everyone**, or for **Authenticated users**. | A GCP storage bucket is considered to allow public access if: it has an IAM (Identity and Access Management) role that meets these criteria: <br/><br/> The role is granted to the principal **allUsers** or **allAuthenticatedUsers**. <br/><br/>The role has at least one storage permission that *isn't* **storage.buckets.create** or **storage.buckets.list**. Public access in GCP is called “Public to internet“.
88113

89-
## Next steps
114+
Database resources do not allow public access but can still be exposed to the internet.
90115

91-
[Enable](data-security-posture-enable.md) data-aware security posture.
116+
Internet exposure insights are available for the following resources:
117+
118+
Azure:
119+
120+
- Azure SQL server
121+
- Azure Cosmos DB
122+
- Azure SQL Managed Instance
123+
- Azure MySQL Single Server
124+
- Azure MySQL Flexible Server
125+
- Azure PostgreSQL Single Server
126+
- Azure PostgreSQL Flexible Server
127+
- Azure MariaDB Single Server
128+
- Synapse Workspace
129+
130+
AWS:
92131

132+
- RDS instance
93133

134+
> [!NOTE]
135+
>
136+
> - Exposure rules that include 0.0.0.0/0 are considered “excessively exposed”, meaning that they can be accessed from any public IP.
137+
> - Azure resources with the exposure rule “0.0.0.0” are accessible from any resource in Azure (regardless of tenant or subscription).
138+
139+
## Next steps
140+
141+
[Enable](data-security-posture-enable.md) data-aware security posture.

0 commit comments

Comments
 (0)