Skip to content

Commit eecac67

Browse files
authored
Merge pull request #226330 from ElazarK/WI62481-CIS150-release-note
WI62481 release note
2 parents f2a2316 + b5fc784 commit eecac67

File tree

5 files changed

+62
-47
lines changed

5 files changed

+62
-47
lines changed

articles/defender-for-cloud/how-to-manage-aws-assessments-standards.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Manage AWS assessments and standards
33
titleSuffix: Defender for Cloud
44
description: Learn how to create custom security assessments and standards for your AWS environment.
55
ms.topic: how-to
6-
ms.date: 01/24/2023
6+
ms.date: 02/07/2023
77
---
88

99
# Manage AWS assessments and standards
1010

11-
Security standards contain comprehensive sets of security recommendations to help secure your cloud environments. Security teams can use the readily available standards such as AWS CIS 1.2.0, AWS Foundational Security Best Practices, and AWS PCI DSS 3.2.1, or create custom standards to meet specific internal requirements.
11+
Security standards contain comprehensive sets of security recommendations to help secure your cloud environments. Security teams can use the readily available standards such as AWS CIS 1.2.0, AWS CIS 1.5.0, AWS Foundational Security Best Practices, and AWS PCI DSS 3.2.1, or create custom standards to meet specific internal requirements.
1212

1313
There are three types of resources that are needed to create and manage assessments:
1414

@@ -49,7 +49,7 @@ You can either use the built-in regulatory compliance standards or create your o
4949

5050
1. Select the relevant AWS account.
5151

52-
1. Select **Standards** > **Add** > **Standard**.
52+
1. Select **Standards** > **Create** > **Standard**.
5353

5454
1. Select **New standard**.
5555

-36.5 KB
Loading

articles/defender-for-cloud/release-notes-archive.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: A description of what's new and changed in Microsoft Defender for C
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: reference
7-
ms.date: 01/04/2023
7+
ms.date: 02/05/2023
88
---
99

1010
# Archive for what's new in Defender for Cloud?
@@ -17,6 +17,48 @@ This page provides you with information about:
1717
- Bug fixes
1818
- Deprecated functionality
1919

20+
## August 2022
21+
22+
Updates in August include:
23+
24+
- [Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers](#vulnerabilities-for-running-images-are-now-visible-with-defender-for-containers-on-your-windows-containers)
25+
- [Azure Monitor Agent integration now in preview](#azure-monitor-agent-integration-now-in-preview)
26+
- [Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster](#deprecated-vm-alerts-regarding-suspicious-activity-related-to-a-kubernetes-cluster)
27+
28+
### Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers
29+
30+
Defender for Containers now shows vulnerabilities for running Windows containers.
31+
32+
When vulnerabilities are detected, Defender for Cloud generates the following security recommendation listing the detected issues: [Running container images should have vulnerability findings resolved](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c/showSecurityCenterCommandBar~/false).
33+
34+
Learn more about [viewing vulnerabilities for running images](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters).
35+
36+
### Azure Monitor Agent integration now in preview
37+
38+
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides many benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
39+
40+
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defenders for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. The AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
41+
42+
### Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
43+
44+
The following table lists the alerts that were deprecated:
45+
46+
| Alert name | Description | Tactics | Severity |
47+
|--|--|--|--|
48+
| **Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
49+
| **Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
50+
| **SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
51+
52+
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
53+
54+
### Container vulnerabilities now include detailed package information
55+
56+
Defender for Container's vulnerability assessment (VA) now includes detailed package information for each finding, including: package name, package type, path, installed version, and fixed version. The package information lets you find vulnerable packages so you can remediate the vulnerability or remove the package.
57+
58+
This detailed package information is available for new scans of images.
59+
60+
:::image type="content" source="media/release-notes/mdc-container-va-package-information.png" alt-text="Screenshot of the package information for container vulnerabilities." lightbox="media/release-notes/mdc-container-va-package-information.png":::
61+
2062
## July 2022
2163

2264
Updates in July include:

articles/defender-for-cloud/release-notes.md

Lines changed: 14 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,20 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
1616
> [!TIP]
1717
> If you're looking for items older than six months, you can find them in the [Archive for What's new in Microsoft Defender for Cloud](release-notes-archive.md).
1818
19+
## February 2023
20+
21+
Updates in February include:
22+
23+
- [Announcing support for the AWS CIS 1.5.0 compliance standard](#announcing-support-for-the-aws-cis-150-compliance-standard)
24+
25+
## Announcing support for the AWS CIS 1.5.0 compliance standard
26+
27+
Defender for Cloud now supports the CIS Amazon Web Services Foundations v1.5.0 compliance standard. The standard can be [added to your Regulatory Compliance dashboard](update-regulatory-compliance-packages.md#add-a-regulatory-standard-to-your-dashboard), and builds on MDC's existing offerings for multicloud recommendations and standards.
28+
29+
This new standard includes both existing and new recommendations that extend Defender for Cloud's coverage to new AWS services and resources.
30+
31+
Learn how to [Manage AWS assessments and standards](how-to-manage-aws-assessments-standards.md).
32+
1933
## January 2023
2034

2135
Updates in January include:
@@ -392,48 +406,6 @@ If you want to continue receiving the alerts in Defender for Cloud, connect the
392406

393407
Learn more about [security alerts](alerts-overview.md).
394408

395-
## August 2022
396-
397-
Updates in August include:
398-
399-
- [Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers](#vulnerabilities-for-running-images-are-now-visible-with-defender-for-containers-on-your-windows-containers)
400-
- [Azure Monitor Agent integration now in preview](#azure-monitor-agent-integration-now-in-preview)
401-
- [Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster](#deprecated-vm-alerts-regarding-suspicious-activity-related-to-a-kubernetes-cluster)
402-
403-
### Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers
404-
405-
Defender for Containers now shows vulnerabilities for running Windows containers.
406-
407-
When vulnerabilities are detected, Defender for Cloud generates the following security recommendation listing the detected issues: [Running container images should have vulnerability findings resolved](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c/showSecurityCenterCommandBar~/false).
408-
409-
Learn more about [viewing vulnerabilities for running images](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters).
410-
411-
### Azure Monitor Agent integration now in preview
412-
413-
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides many benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
414-
415-
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defenders for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. The AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
416-
417-
### Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
418-
419-
The following table lists the alerts that were deprecated:
420-
421-
| Alert name | Description | Tactics | Severity |
422-
|--|--|--|--|
423-
| **Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
424-
| **Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
425-
| **SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
426-
427-
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
428-
429-
### Container vulnerabilities now include detailed package information
430-
431-
Defender for Container's vulnerability assessment (VA) now includes detailed package information for each finding, including: package name, package type, path, installed version, and fixed version. The package information lets you find vulnerable packages so you can remediate the vulnerability or remove the package.
432-
433-
This detailed package information is available for new scans of images.
434-
435-
:::image type="content" source="media/release-notes/mdc-container-va-package-information.png" alt-text="Screenshot of the package information for container vulnerabilities." lightbox="media/release-notes/mdc-container-va-package-information.png":::
436-
437409
## Next steps
438410

439411
For past changes to Defender for Cloud, see [Archive for what's new in Defender for Cloud?](release-notes-archive.md).

articles/defender-for-cloud/update-regulatory-compliance-packages.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: The regulatory compliance dashboard in Microsoft Defender for Cloud
33
description: Learn how to add and remove regulatory standards from the regulatory compliance dashboard in Defender for Cloud
44
ms.topic: how-to
5-
ms.date: 01/11/2023
5+
ms.date: 02/07/2023
66
ms.custom: ignite-2022
77
---
88

@@ -58,6 +58,7 @@ Users that have one Defender bundle enabled can enable other standards.
5858
Available AWS regulatory standards:
5959

6060
- CIS 1.2.0
61+
- CIS 1.5.0
6162
- PCI DSS 3.2.1
6263
- AWS Foundational Security Best Practices
6364

0 commit comments

Comments
 (0)