Skip to content

Commit df1135e

Browse files
authored
Update review-security-recommendations.md
1 parent 5d54915 commit df1135e

File tree

1 file changed

+19
-0
lines changed

1 file changed

+19
-0
lines changed

articles/defender-for-cloud/review-security-recommendations.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ It's important to review all of the details related to a recommendation before t
4343
- **Scope** - The affected subscription or resource.
4444
- **Freshness** - The freshness interval for the recommendation.
4545
- **Last change date** - The date this recommendation last had a change
46+
- **Severity** - The severity of the recommendation (High, Medium, or Low). More details below.
4647
- **Owner** - The person assigned to this recommendation.
4748
- **Due date** - The assigned date the recommendation must be resolved by.
4849
- **Tactics & techniques** - The tactics and techniques mapped to MITRE ATT&CK.
@@ -176,6 +177,24 @@ You can use [Azure Resource Graph](../governance/resource-graph/index.yml) to wr
176177

177178
1. Review the results.
178179

180+
181+
## How are recommendations classified?
182+
183+
Every security recommendation from Defender for Cloud is assigned one of three severity ratings:
184+
185+
- **High severity**: These recommendations should be addressed immediately, as they indicate a critical security vulnerability that could be exploited by an attacker to gain unauthorized access to your systems or data. Examples of high severity recommendations are when we’ve discovered unprotected secrets on a machine, overly-permissive inbound NSG rules, clusters allowing images to be deployed from untrusted registries, and unrestricted public access to storage accounts or databases.
186+
187+
- **Medium severity**: These recommendations indicate a potential security risk that should be addressed in a timely manner, but may not require immediate attention. Examples of medium severity recommendations might include containers sharing sensitive host namespaces, web apps not using managed identities, Linux machines not requiring SSH keys during authentication, and unused credentials being left in the system after 90 days of inactivity.
188+
189+
- **Low severity**: These recommendations indicate a relatively minor security issue that can be addressed at your convenience. Examples of low severity recommendations might include the need to disable local authentication in favor of Microsoft Entra ID, health issues with your endpoint protection solution, best practices not being followed with network security groups, or misconfigured logging settings that could make it harder to detect and respond to security incidents.
190+
191+
Of course, the internal views of an organization might differ with Microsoft’s classification of a specific recommendation. So, it's always a good idea to review each recommendation carefully and consider its potential impact on your security posture before deciding how to address it.
192+
193+
> [!NOTE]
194+
> Defender CSPM customers have access to a richer classification system where recommendations are shown a more dynamic **Risk level** that utilizes the *context* of the resource and all related resources. Learn more about [risk prioritization](risk-prioritization.md).
195+
196+
197+
179198
### Example
180199

181200
In this example, this recommendation details page shows 15 affected resources:

0 commit comments

Comments
 (0)