You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/ai-security-posture.md
+13-1Lines changed: 13 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: AI security posture management (Preview)
3
3
description: Learn about AI security posture management in Microsoft Defender for Cloud and how it protects resources from AI threats.
4
-
ms.date: 05/05/2024
4
+
ms.date: 06/30/2024
5
5
ms.topic: concept-article
6
6
ms.author: elkrieger
7
7
author: Elazark
@@ -18,6 +18,18 @@ The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender
18
18
19
19
:::image type="content" source="media/ai-security-posture/ai-lifecycle.png" alt-text="Diagram of the development lifecycle that is covered by Defender for Cloud's AI security posture management.":::
20
20
21
+
> [!IMPORTANT]
22
+
> To enable AI security posture management's capabilities on an AWS account that already:
23
+
> - Is connected to your Azure account.
24
+
> - Has Defender CSPM enabled.
25
+
> - Has permissions type set as **Least privilege access**.
26
+
>
27
+
> You must reconfigure the permissions on that connector to enable the relevant permissions using these steps:
28
+
> 1. In the Azure Portal navigate to Environment Settings page and select the appropriate AWS connector.
29
+
> 1. Select **Configure access**.
30
+
> 1. Ensure the permissions type is set to **Least privilege access**.
31
+
> 1.[Follow steps 5 - 8](quickstart-onboard-aws.md#select-defender-plans) to finish the configuration.
32
+
21
33
## Discovering generative AI apps
22
34
23
35
Defender for Cloud discovers AI workloads and identifies details of your organization's AI BOM. This visibility allows you to identify and address vulnerabilities and protect generative AI applications from potential threats.
0 commit comments