Skip to content

Commit dcc8cdb

Browse files
committed
resolve conflict
1 parent d6322cd commit dcc8cdb

File tree

1 file changed

+7
-4
lines changed

1 file changed

+7
-4
lines changed

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Overview of Cloud Security Posture Management (CSPM)
33
description: Learn more about the new Defender CSPM plan and the other enhanced security features that can be enabled for your multicloud environment through the Defender Cloud Security Posture Management (CSPM) plan.
44
ms.topic: conceptual
55
ms.custom: ignite-2022
6-
ms.date: 09/20/2022
6+
ms.date: 10/18/2022
77
---
88

99
# Cloud Security Posture Management (CSPM)
@@ -60,11 +60,14 @@ Learn more about [cloud security explorer](concept-attack-path.md#what-is-cloud-
6060

6161
## Attack path analysis
6262

63-
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack path analysis exposes those attack paths and suggests recommendations as to how best remediate the issues that will break the attack path and prevent successful breach.
63+
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans:
6464

65-
By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more. Attack path analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.
65+
- expose exploitable paths that attackers may use to breach your environment and reach your high-impact assets
66+
- provide recommendations for ways to prevent successful breaches
6667

67-
Learn more about [attack path analysis](concept-attack-path.md#what-is-attack-path-analysis)
68+
By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more, this analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.
69+
70+
Learn more about [attack path analysis](concept-attack-path.md#what-is-attack-path-analysis).
6871

6972
## Agentless scanning for machines
7073

0 commit comments

Comments
 (0)