Skip to content

Commit e2291ef

Browse files
Merge pull request #279702 from ElazarK/ai-spm-fix
added important note
2 parents 2eedaa1 + 30ec4fb commit e2291ef

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

articles/defender-for-cloud/ai-security-posture.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: AI security posture management (Preview)
33
description: Learn about AI security posture management in Microsoft Defender for Cloud and how it protects resources from AI threats.
4-
ms.date: 05/05/2024
4+
ms.date: 06/30/2024
55
ms.topic: concept-article
66
ms.author: elkrieger
77
author: Elazark
@@ -18,6 +18,18 @@ The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender
1818

1919
:::image type="content" source="media/ai-security-posture/ai-lifecycle.png" alt-text="Diagram of the development lifecycle that is covered by Defender for Cloud's AI security posture management.":::
2020

21+
> [!IMPORTANT]
22+
> To enable AI security posture management's capabilities on an AWS account that already:
23+
> - Is connected to your Azure account.
24+
> - Has Defender CSPM enabled.
25+
> - Has permissions type set as **Least privilege access**.
26+
>
27+
> You must reconfigure the permissions on that connector to enable the relevant permissions using these steps:
28+
> 1. In the Azure Portal navigate to Environment Settings page and select the appropriate AWS connector.
29+
> 1. Select **Configure access**.
30+
> 1. Ensure the permissions type is set to **Least privilege access**.
31+
> 1. [Follow steps 5 - 8](quickstart-onboard-aws.md#select-defender-plans) to finish the configuration.
32+
2133
## Discovering generative AI apps
2234

2335
Defender for Cloud discovers AI workloads and identifies details of your organization's AI BOM. This visibility allows you to identify and address vulnerabilities and protect generative AI applications from potential threats.

0 commit comments

Comments
 (0)