Skip to content

Commit e91c3af

Browse files
committed
Security policy updates
Push updates to support the general availability release of security policies cross clouds.
1 parent 828abff commit e91c3af

File tree

3 files changed

+21
-71
lines changed

3 files changed

+21
-71
lines changed

articles/defender-for-cloud/manage-mcsb.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 01/25/2022
77

88
# Manage MCSB recommendations in Defender for Cloud
99

10-
Microsoft Defender for Cloud assesses resources against [security standards](security-policy-concept.md). By default, when you onboard Azure subscriptions to Defender for Cloud, the [Microsoft Cloud Security Benchmark (MCSB) standard](concept-regulatory-compliance.md) is enabled. Defender for Cloud starts assessing the security posture of your resource against controls in the MCSB standard, and issues security recommendations based on the assessments.
10+
Microsoft Defender for Cloud assesses resources against [security standards](security-policy-concept.md). By default, when you onboard cloud accounts to Defender for Cloud, the [Microsoft Cloud Security Benchmark (MCSB) standard](concept-regulatory-compliance.md) is enabled. Defender for Cloud starts assessing the security posture of your resource against controls in the MCSB standard, and issues security recommendations based on the assessments.
1111

1212
This article describes how you can manage recommendations provided by MCSB.
1313

@@ -31,14 +31,13 @@ To review which recommendations you can deny and enforce, in the **Security poli
3131

3232
## Manage recommendation settings
3333

34-
You can enable/disable, deny and enforce recommendations.
35-
3634
> [!NOTE]
37-
> If a recommendation is disabled, all of its subrecommendations are exempted.
35+
> - If a recommendation is disabled, all of its subrecommendations are exempted.
36+
> - **Disabled** and **Deny** effects are available for Azure environment only.
3837
3938
1. In the Defender for Cloud portal, open the **Environment settings** page.
4039

41-
1. Select the subscription or management group for which you want to manage MCSB recommendations.
40+
1. Select the cloud account or management account for which you want to manage MCSB recommendations.
4241

4342
1. Open the **Security policies** page, and select the MCSB standard. The standard should be turned on.
4443

@@ -105,4 +104,4 @@ This page explained security policies. For related information, see the followin
105104
- [Learn how to set policies using PowerShell](../governance/policy/assign-policy-powershell.md)
106105
- [Learn how to edit a security policy in Azure Policy](../governance/policy/tutorials/create-and-manage.md)
107106
- [Learn how to set a policy across subscriptions or on Management groups using Azure Policy](../governance/policy/overview.md)
108-
- [Learn how to enable Defender for Cloud on all subscriptions in a management group](onboard-management-group.md)
107+
- [Learn how to enable Defender for Cloud on all subscriptions in a management group](onboard-management-group.md)

articles/defender-for-cloud/security-policy-concept.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -15,32 +15,38 @@ Security standards define rules, compliance conditions for those rules, and acti
1515

1616
Security standards in Defender for Cloud come from these sources:
1717

18-
- **Microsoft cloud security benchmark (MCSB)**: The MCSB standard is applied by default when you onboard Defender for Cloud to a management group or subscription. Your [secure score](secure-score-security-controls.md) is based on assessment against some MCSB recommendations.
18+
- **Microsoft cloud security benchmark (MCSB)**: The MCSB standard is applied by default when you onboard cloud accounts to Defender. Your [secure score](secure-score-security-controls.md) is based on assessment against some MCSB recommendations.
1919

2020
- **Regulatory compliance standards**: When you enable one or more [Defender for Cloud plans](defender-for-cloud-introduction.md), you can add standards from a wide range of predefined regulatory compliance programs.
2121

2222
- **Custom standards**: You can create custom security standards in Defender for Cloud, and then add built-in and custom recommendations to those custom standards as needed.
2323

2424
Security standards in Defender for Cloud are based on [Azure Policy](../governance/policy/overview.md) [initiatives](../governance/policy/concepts/initiative-definition-structure.md) or on the Defender for Cloud native platform. Currently, Azure standards are based on Azure Policy. AWS and GCP standards are based on Defender for Cloud.
2525

26-
Security standards in Defender for Cloud simplify the complexity of Azure Policy. In most cases, you can work directly with security standards and recommendations in the Defender for Cloud portal, without needing to directly configure Azure Policy.
27-
2826
### Working with security standards
2927

3028
Here's what you can do with security standards in Defender for Cloud:
3129

32-
- **Modify the built-in MCSB for the subscription**: When you enable Defender for Cloud, the MCSB is automatically assigned to all Defender for Cloud registered subscriptions.
30+
- **Modify the built-in MCSB for the subscription**: When you enable Defender for Cloud, the MCSB is automatically assigned to all Defender for Cloud registered subscriptions. [Learn more about managing the MCSB standard](manage-mcsb.md).
3331

3432
- **Add regulatory compliance standards**: If you have one or more paid plans enabled, you can assign built-in compliance standards against which to assess your Azure, AWS, and GCP resources. [Learn more about assigning regulatory standards](update-regulatory-compliance-packages.yml).
3533

36-
- **Add custom standards**: If you have at least one paid Defender plan enabled, you can define new [Azure standards](custom-security-policies.md) or [AWS/GCP standards](create-custom-recommendations.md) in the Defender for Cloud portal. You can then add recommendations to those standards.
34+
- **Add custom standards**: If you have at least one paid Defender plan enabled, you can define new [custom standards](custom-security-policies.md) and [custom recommendations](create-custom-recommendations.md) in the Defender for Cloud portal. You can then add recommendations to those standards.
3735

38-
### Working with custom standards
36+
### Custom standards
3937

4038
Custom standards appear alongside built-in standards in the **Regulatory compliance** dashboard.
4139

4240
Recommendations derived from assessments against custom standards appear together with recommendations from built-in standards. Custom standards can contain built-in and custom recommendations.
4341

42+
### Custom recommendations
43+
44+
All customers with Azure subscriptions can create custom recommendations based on Azure Policy. With Azure Policy, you create a policy definition, assign it to a policy initiative, and merge that initiative and policy into Defender for Cloud.
45+
46+
Custom recommendations based on Kusto Query Language (KQL) are available for all clouds, but require enabling the [Defender CSPM plan](concept-cloud-security-posture-management.md). With these recommendations, you specify a unique name, a description, steps for remediation, severity, and which standards the recommendation should be assigned to. You add recommendation logic with KQL. A query editor provides a built-in query template that you can tweak as needed, or you can write your KQL query from scratch.
47+
48+
For more information, see [Create custom security standards and recommendations in Microsoft Defender for Cloud](create-custom-recommendations.md).
49+
4450
## Security recommendations
4551

4652
Defender for Cloud periodically and continuously analyzes and assesses the security state of protected resources against defined security standards, to identify potential security misconfigurations and weaknesses. Defender for Cloud then provides recommendations based on assessment findings.
@@ -65,13 +71,6 @@ The MCSB standard is an Azure Policy initiative that includes multiple complianc
6571

6672
As Defender for Cloud continually assesses and finds resources that don't satisfy this control, it marks the resources as noncompliant and triggers a recommendation. In this case, guidance is to harden Azure Storage accounts that aren't protected with virtual network rules.
6773

68-
### Custom recommendations
69-
70-
All customers with Azure subscriptions can create custom recommendations based on Azure Policy. With Azure Policy, you create a policy definition, assign it to a policy initiative, and merge that initiative and policy into Defender for Cloud.
71-
72-
Custom recommendations based on Kusto Query Language (KQL) are available for all clouds, but require enabling the [Defender CSPM plan](concept-cloud-security-posture-management.md). With these recommendations, you specify a unique name, a description, steps for remediation, severity, and which standards the recommendation should be assigned to. You add recommendation logic with KQL. A query editor provides a built-in query template that you can tweak as needed, or you can write your KQL query from scratch.
73-
74-
For more information, see [Create custom security standards and recommendations in Microsoft Defender for Cloud](create-custom-recommendations.md).
7574

7675
## Next steps
7776

articles/defender-for-cloud/update-regulatory-compliance-packages.yml

Lines changed: 4 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ prerequisites:
2424
- You need `Owner` or `Policy Contributor` permissions to add a standard.
2525
procedureSection:
2626
- title: |
27-
Assign a standard (Azure)
27+
Assign a standard
2828
summary: |
29-
**To assign regulatory compliance standards on Azure**:
29+
**To assign regulatory compliance standards on cloud environment**:
3030
steps:
3131
- |
3232
Sign in to the [Azure portal](https://portal.azure.com/).
@@ -37,7 +37,7 @@ procedureSection:
3737
3838
:::image type="content" source="media/update-regulatory-compliance-packages/manage-compliance.png" alt-text="Screenshot of the regulatory compliance page that shows you where to select the manage compliance policy button." lightbox="media/update-regulatory-compliance-packages/manage-compliance.png":::
3939
- |
40-
Select the subscription or management group on which you want to assign the security standard.
40+
Select an account or management account (Azure subscription or nmanagement group, AWS account or management account, GCP project or organization) on which you want to assign the security standard.
4141
4242
> [!NOTE]
4343
> We recommend selecting the highest scope for which the standard is applicable so that compliance data is aggregated and tracked for all nested resources.
@@ -51,54 +51,6 @@ procedureSection:
5151
If any information is needed in order to enable the standard, the **Set parameters** page appears for you to type in the information.
5252
5353
The selected standard appears in **Regulatory compliance** dashboard as enabled for the subscription it was enabled on.
54-
- title: |
55-
Assign a standard (AWS)
56-
summary: |
57-
**To assign regulatory compliance standards on AWS accounts**:
58-
steps:
59-
- |
60-
Sign in to the [Azure portal](https://portal.azure.com/).
61-
- |
62-
Navigate to **Microsoft Defender for Cloud** > **Regulatory compliance**. For each standard, you can see the applied subscription.
63-
- |
64-
Select **Manage compliance policies**.
65-
- |
66-
Select the relevant AWS account.
67-
- |
68-
Select **Security policies**.
69-
- |
70-
In the **Standards** tab, select the three dots in the standard you want to assign > **Assign standard**.
71-
72-
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-aws-from-list.png" alt-text="Screenshot that shows where to select a standard to assign." lightbox="media/update-regulatory-compliance-packages/assign-standard-aws-from-list.png":::
73-
- |
74-
At the prompt, select **Yes**. The standard is assigned to your AWS account.
75-
76-
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-aws.png" alt-text="Screenshot of the prompt to assign a regulatory compliance standard to the AWS account." lightbox="media/update-regulatory-compliance-packages/assign-standard-aws.png":::
77-
78-
The selected standard appears in **Regulatory compliance** dashboard as enabled for the account.
79-
- title: |
80-
Assign a standard (GCP)
81-
summary: |
82-
**To assign regulatory compliance standards on GCP projects**:
83-
steps:
84-
- |
85-
Sign in to the [Azure portal](https://portal.azure.com/).
86-
- |
87-
Navigate to **Microsoft Defender for Cloud** > **Regulatory compliance**. For each standard, you can see the applied subscription.
88-
- |
89-
Select **Manage compliance policies**.
90-
- |
91-
Select the relevant GCP project.
92-
- |
93-
Select **Security policies**.
94-
- |
95-
In the **Standards** tab, select the three dots alongside an unassigned standard and select **Assign standard**.
96-
97-
:::image type="content" source="media/update-regulatory-compliance-packages/assign-standard-gcp-from-list.png" alt-text="Screenshot that shows how to assign a standard to your GCP project." lightbox="media/update-regulatory-compliance-packages/assign-standard-gcp-from-list.png":::
98-
- |
99-
At the prompt, select **Yes**. The standard is assigned to your GCP project.
100-
101-
The selected standard appears in the **Regulatory compliance** dashboard as enabled for the project.
10254
10355
relatedContent:
10456
- text: Create custom standards for Azure
@@ -109,4 +61,4 @@ relatedContent:
10961
url: regulatory-compliance-dashboard.md
11062

11163
# - Create custom standards for [Azure](custom-security-policies.md), [AWS, and GCP](create-custom-recommendations.md).
112-
# - [Improve regulatory compliance](regulatory-compliance-dashboard.md)
64+
# - [Improve regulatory compliance](regulatory-compliance-dashboard.md)

0 commit comments

Comments
 (0)