You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/how-to-manage-aws-assessments-standards.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,12 +3,12 @@ title: Manage AWS assessments and standards
3
3
titleSuffix: Defender for Cloud
4
4
description: Learn how to create custom security assessments and standards for your AWS environment.
5
5
ms.topic: how-to
6
-
ms.date: 01/24/2023
6
+
ms.date: 02/07/2023
7
7
---
8
8
9
9
# Manage AWS assessments and standards
10
10
11
-
Security standards contain comprehensive sets of security recommendations to help secure your cloud environments. Security teams can use the readily available standards such as AWS CIS 1.2.0, AWS Foundational Security Best Practices, and AWS PCI DSS 3.2.1, or create custom standards to meet specific internal requirements.
11
+
Security standards contain comprehensive sets of security recommendations to help secure your cloud environments. Security teams can use the readily available standards such as AWS CIS 1.2.0, AWS CIS 1.5.0, AWS Foundational Security Best Practices, and AWS PCI DSS 3.2.1, or create custom standards to meet specific internal requirements.
12
12
13
13
There are three types of resources that are needed to create and manage assessments:
14
14
@@ -49,7 +49,7 @@ You can either use the built-in regulatory compliance standards or create your o
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes-archive.md
+43-1Lines changed: 43 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: A description of what's new and changed in Microsoft Defender for C
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: reference
7
-
ms.date: 01/04/2023
7
+
ms.date: 02/05/2023
8
8
---
9
9
10
10
# Archive for what's new in Defender for Cloud?
@@ -17,6 +17,48 @@ This page provides you with information about:
17
17
- Bug fixes
18
18
- Deprecated functionality
19
19
20
+
## August 2022
21
+
22
+
Updates in August include:
23
+
24
+
-[Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers](#vulnerabilities-for-running-images-are-now-visible-with-defender-for-containers-on-your-windows-containers)
25
+
-[Azure Monitor Agent integration now in preview](#azure-monitor-agent-integration-now-in-preview)
26
+
-[Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster](#deprecated-vm-alerts-regarding-suspicious-activity-related-to-a-kubernetes-cluster)
27
+
28
+
### Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers
29
+
30
+
Defender for Containers now shows vulnerabilities for running Windows containers.
31
+
32
+
When vulnerabilities are detected, Defender for Cloud generates the following security recommendation listing the detected issues: [Running container images should have vulnerability findings resolved](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c/showSecurityCenterCommandBar~/false).
33
+
34
+
Learn more about [viewing vulnerabilities for running images](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters).
35
+
36
+
### Azure Monitor Agent integration now in preview
37
+
38
+
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides many benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
39
+
40
+
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defenders for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. The AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
41
+
42
+
### Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
43
+
44
+
The following table lists the alerts that were deprecated:
45
+
46
+
| Alert name | Description | Tactics | Severity |
47
+
|--|--|--|--|
48
+
|**Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
49
+
|**Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
50
+
|**SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
51
+
52
+
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
53
+
54
+
### Container vulnerabilities now include detailed package information
55
+
56
+
Defender for Container's vulnerability assessment (VA) now includes detailed package information for each finding, including: package name, package type, path, installed version, and fixed version. The package information lets you find vulnerable packages so you can remediate the vulnerability or remove the package.
57
+
58
+
This detailed package information is available for new scans of images.
59
+
60
+
:::image type="content" source="media/release-notes/mdc-container-va-package-information.png" alt-text="Screenshot of the package information for container vulnerabilities." lightbox="media/release-notes/mdc-container-va-package-information.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+14-42Lines changed: 14 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,20 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
16
16
> [!TIP]
17
17
> If you're looking for items older than six months, you can find them in the [Archive for What's new in Microsoft Defender for Cloud](release-notes-archive.md).
18
18
19
+
## February 2023
20
+
21
+
Updates in February include:
22
+
23
+
-[Announcing support for the AWS CIS 1.5.0 compliance standard](#announcing-support-for-the-aws-cis-150-compliance-standard)
24
+
25
+
## Announcing support for the AWS CIS 1.5.0 compliance standard
26
+
27
+
Defender for Cloud now supports the CIS Amazon Web Services Foundations v1.5.0 compliance standard. The standard can be [added to your Regulatory Compliance dashboard](update-regulatory-compliance-packages.md#add-a-regulatory-standard-to-your-dashboard), and builds on MDC's existing offerings for multicloud recommendations and standards.
28
+
29
+
This new standard includes both existing and new recommendations that extend Defender for Cloud's coverage to new AWS services and resources.
30
+
31
+
Learn how to [Manage AWS assessments and standards](how-to-manage-aws-assessments-standards.md).
32
+
19
33
## January 2023
20
34
21
35
Updates in January include:
@@ -392,48 +406,6 @@ If you want to continue receiving the alerts in Defender for Cloud, connect the
392
406
393
407
Learn more about [security alerts](alerts-overview.md).
394
408
395
-
## August 2022
396
-
397
-
Updates in August include:
398
-
399
-
-[Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers](#vulnerabilities-for-running-images-are-now-visible-with-defender-for-containers-on-your-windows-containers)
400
-
-[Azure Monitor Agent integration now in preview](#azure-monitor-agent-integration-now-in-preview)
401
-
-[Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster](#deprecated-vm-alerts-regarding-suspicious-activity-related-to-a-kubernetes-cluster)
402
-
403
-
### Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers
404
-
405
-
Defender for Containers now shows vulnerabilities for running Windows containers.
406
-
407
-
When vulnerabilities are detected, Defender for Cloud generates the following security recommendation listing the detected issues: [Running container images should have vulnerability findings resolved](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c/showSecurityCenterCommandBar~/false).
408
-
409
-
Learn more about [viewing vulnerabilities for running images](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters).
410
-
411
-
### Azure Monitor Agent integration now in preview
412
-
413
-
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides many benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
414
-
415
-
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defenders for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. The AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
416
-
417
-
### Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
418
-
419
-
The following table lists the alerts that were deprecated:
420
-
421
-
| Alert name | Description | Tactics | Severity |
422
-
|--|--|--|--|
423
-
|**Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
424
-
|**Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
425
-
|**SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
426
-
427
-
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
428
-
429
-
### Container vulnerabilities now include detailed package information
430
-
431
-
Defender for Container's vulnerability assessment (VA) now includes detailed package information for each finding, including: package name, package type, path, installed version, and fixed version. The package information lets you find vulnerable packages so you can remediate the vulnerability or remove the package.
432
-
433
-
This detailed package information is available for new scans of images.
434
-
435
-
:::image type="content" source="media/release-notes/mdc-container-va-package-information.png" alt-text="Screenshot of the package information for container vulnerabilities." lightbox="media/release-notes/mdc-container-va-package-information.png":::
436
-
437
409
## Next steps
438
410
439
411
For past changes to Defender for Cloud, see [Archive for what's new in Defender for Cloud?](release-notes-archive.md).
0 commit comments