Skip to content

Commit e06e9f4

Browse files
Merge pull request #282200 from MayaGreenbergShalit/docs-editor/recommendations-reference-data-1722342939
Update recommendations-reference-data.md
2 parents ee45feb + 5d0c65b commit e06e9f4

File tree

2 files changed

+19
-15
lines changed

2 files changed

+19
-15
lines changed

articles/defender-for-cloud/recommendations-reference-ai.md

Lines changed: 19 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,17 @@ This recommendation replaces the old recommendation *Cognitive Services accounts
3838
**Severity**: Medium
3939

4040

41+
### [Azure AI Services resources should use Azure Private Link](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/54f53ddf-6ebd-461e-a247-394c542bc5d1)
42+
43+
**Description**: Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform reduces data leakage risks by handling the connectivity between the consumer and services over the Azure backbone network.
44+
45+
Learn more about private links at: [https://aka.ms/AzurePrivateLink/Overview](https://aka.ms/AzurePrivateLink/Overview)
46+
47+
This recommendation replaces the old recommendation *Cognitive Services should use private link*. It was formerly in category Data recommendations, and was updated to comply with the Azure AI Services naming format and align with the relevant resources.
48+
49+
**Severity**: Medium
50+
51+
4152
### [(Enable if required) Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/18bf29b3-a844-e170-2826-4e95d0ba4dc9/showSecurityCenterCommandBar~/false)
4253

4354
**Description**: Using customer-managed keys to encrypt data at rest provides more control over the key lifecycle, including rotation and management. This is particularly relevant for organizations with related compliance requirements.
@@ -48,6 +59,14 @@ This recommendation replaces the old recommendation *Cognitive services accounts
4859

4960
**Severity**: Low
5061

62+
### [Diagnostic logs in Azure AI services resources should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dea5192e-1bb3-101b-b70c-4646546f5e1e)
63+
64+
**Description**: Enable logs for Azure AI services resources. This enables you to recreate activity trails for investigation purposes, when a security incident occurs or your network is compromised.
65+
66+
This recommendation replaces the old recommendation *Diagnostic logs in Search services should be enabled*. It was formerly in the category Cognitive Services and Cognitive Search, and was updated to comply with the Azure AI Services naming format and align with the relevant resources.
67+
68+
**Severity**: Low
69+
5170
### Resource logs in Azure Machine Learning Workspaces should be enabled (Preview)
5271

5372
**Description & related policy**: Resource logs enable recreating activity trails to use for investigation purposes when a security incident occurs or when your network is compromised.
@@ -78,14 +97,6 @@ This recommendation replaces the old recommendation *Cognitive services accounts
7897

7998
**Severity**: Medium
8099

81-
### [Diagnostic logs in Azure AI services resources should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dea5192e-1bb3-101b-b70c-4646546f5e1e)
82-
83-
**Description**: Enable logs for Azure AI services resources. This enables you to recreate activity trails for investigation purposes, when a security incident occurs or your network is compromised.
84-
85-
This recommendation replaces the old recommendation *Diagnostic logs in Search services should be enabled*. It was formerly in the category Cognitive Services and Cognitive Search, and was updated to comply with the Azure AI Services naming format and align with the relevant resources.
86-
87-
**Severity**: Low
88-
89100
### Resource logs in Azure Databricks Workspaces should be enabled (Preview)
90101

91102
**Description & related policy**: Resource logs enable recreating activity trails to use for investigation purposes when a security incident occurs or when your network is compromised.

articles/defender-for-cloud/recommendations-reference-data.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -296,13 +296,6 @@ Secure your storage account with greater flexibility using customer-managed keys
296296

297297
**Severity**: Low
298298

299-
### [Cognitive Services should use private link](recommendations-reference-data.md#cognitive-services-should-use-private-link)
300-
301-
**Description**: Azure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Azure Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Cognitive Services, you'll reduce the potential for data leakage. Learn more about [private links](../private-link/private-link-overview.md). (Related policy: Cognitive Services should use private link).
302-
303-
**Severity**: Medium
304-
305-
306299
### [Diagnostic logs in Azure Data Lake Store should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ad5bbaeb-7632-5edf-f1c2-752075831ce8)
307300

308301
**Description**: Enable logs and retain them for up to a year. This enables you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised.

0 commit comments

Comments
 (0)