You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/adaptive-network-hardening.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,9 +57,9 @@ For example, let's say the existing NSG rule is to allow traffic from 140.20.30.
57
57
58
58
1. Optionally, edit the rules:
59
59
60
-
-[Modify a rule](#modify-rule)
61
-
-[Delete a rule](#delete-rule)
62
-
-[Add a rule](#add-rule)
60
+
-[Modify a rule](#modify-a-rule)
61
+
-[Delete a rule](#delete-a-rule)
62
+
-[Add a rule](#add-a-new-rule)
63
63
64
64
1. Select the rules that you want to apply on the NSG, and select **Enforce**.
65
65
@@ -71,7 +71,7 @@ For example, let's say the existing NSG rule is to allow traffic from 140.20.30.
71
71
> [!NOTE]
72
72
> The enforced rules are added to the NSG(s) protecting the VM. (A VM could be protected by an NSG that is associated to its NIC, or the subnet in which the VM resides, or both)
73
73
74
-
## Modify a rule <aname ="modify-rule"> </a>
74
+
## Modify a rule
75
75
76
76
You might want to modify the parameters of a rule that has been recommended. For example, you might want to change the recommended IP ranges.
77
77
@@ -83,7 +83,7 @@ Some important guidelines for modifying an adaptive network hardening rule:
83
83
84
84
Creating and modifying "deny" rules is done directly on the NSG. For more information, see [Create, change, or delete a network security group](../virtual-network/manage-network-security-group.md).
85
85
86
-
- A **Deny all traffic** rule is the only type of "deny" rule that would be listed here, and it cannot be modified. You can, however, delete it (see [Delete a rule](#delete-rule)). To learn about this type of rule, see the common questions entry [When should I use a "Deny all traffic" rule?](faq-defender-for-servers.yml).
86
+
- A **Deny all traffic** rule is the only type of "deny" rule that would be listed here, and it cannot be modified. You can, however, delete it (see [Delete a rule](#delete-a-rule)). To learn about this type of rule, see the common questions entry [When should I use a "Deny all traffic" rule?](faq-defender-for-servers.yml).
87
87
88
88
To modify an adaptive network hardening rule:
89
89
@@ -102,7 +102,7 @@ To modify an adaptive network hardening rule:
When necessary, you can delete a recommended rule for the current session. For example, you might determine that applying a suggested rule could block legitimate traffic.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/ai-security-posture.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,11 +20,13 @@ The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender
20
20
21
21
> [!IMPORTANT]
22
22
> To enable AI security posture management's capabilities on an AWS account that already:
23
+
>
23
24
> - Is connected to your Azure account.
24
-
> - Has Defender CSPM enabled.
25
+
> - Has Defender CSPM enabled.
25
26
> - Has permissions type set as **Least privilege access**.
26
27
>
27
28
> You must reconfigure the permissions on that connector to enable the relevant permissions using these steps:
29
+
>
28
30
> 1. In the Azure Portal navigate to Environment Settings page and select the appropriate AWS connector.
29
31
> 1. Select **Configure access**.
30
32
> 1. Ensure the permissions type is set to **Least privilege access**.
@@ -34,7 +36,7 @@ The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender
34
36
35
37
Defender for Cloud discovers AI workloads and identifies details of your organization's AI BOM. This visibility allows you to identify and address vulnerabilities and protect generative AI applications from potential threats.
36
38
37
-
Defenders for Cloud automatically and continuously discover deployed AI workloads across the following services:
39
+
Defenders for Cloud automatically and continuously discover deployed AI workloads across the following services:
38
40
39
41
- Azure OpenAI Service
40
42
- Azure Machine Learning
@@ -56,9 +58,9 @@ Defender for Cloud assesses AI workloads and issues recommendations around ident
56
58
57
59
DevOps security detects IaC misconfigurations, which can expose generative AI applications to security vulnerabilities, such as over-exposed access controls or inadvertent publicly exposed services. These misconfigurations could lead to data breaches, unauthorized access, and compliance issues, especially when handling strict data privacy regulations.
58
60
59
-
Defender for Cloud assesses your generative AI apps configuration and provides security recommendations to improve AI security posture.
61
+
Defender for Cloud assesses your generative AI apps configuration and provides security recommendations to improve AI security posture.
60
62
61
-
Detected misconfigurations should be remediated early in the development cycle to prevent more complex problems later on.
63
+
Detected misconfigurations should be remediated early in the development cycle to prevent more complex problems later on.
62
64
63
65
Current IaC AI security checks include:
64
66
@@ -69,7 +71,7 @@ Current IaC AI security checks include:
69
71
70
72
### Exploring risks with attack path analysis
71
73
72
-
Attack paths analysis detects and mitigates risks to AI workloads, particularly during grounding (linking AI models to specific data) and fine-tuning (adjusting a pretrained model on a specific dataset to improve its performance on a related task) stages, where data might be exposed.
74
+
Attack paths analysis detects and mitigates risks to AI workloads, particularly during grounding (linking AI models to specific data) and fine-tuning (adjusting a pretrained model on a specific dataset to improve its performance on a related task) stages, where data might be exposed.
73
75
74
76
By monitoring AI workloads continuously, attack path analysis can identify weaknesses and potential vulnerabilities and follow up with recommendations. Additionally, it extends to cases where the data and compute resources are distributed across Azure, AWS, and GCP.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/assign-access-to-workload.md
+33-35Lines changed: 33 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,6 @@ ms.date: 07/01/2024
12
12
13
13
When you onboard your AWS or GCP environments, Defender for Cloud automatically creates a security connector as an Azure resource inside the connected subscription and resource group. Defender for cloud also creates the identity provider as an IAM role it requires during the onboarding process.
14
14
15
-
16
15
Assign permission to users, on specific security connectors, below the parent connector? Yes, you can. You need to determine to which AWS accounts or GCP projects you want users to have access to. Meaning, you need to identify the security connectors that correspond to the AWS account or GCP project to which you want to assign users access.
17
16
18
17
## Prerequisites
@@ -23,7 +22,7 @@ Assign permission to users, on specific security connectors, below the parent co
23
22
24
23
## Configure permissions on the security connector
25
24
26
-
Permissions for security connectors are managed through Azure role-based access control (RBAC). You can assign roles to users, groups, and applications at a subscription, resource group, or resource level.
25
+
Permissions for security connectors are managed through Azure role-based access control (RBAC). You can assign roles to users, groups, and applications at a subscription, resource group, or resource level.
27
26
28
27
1. Sign in to the [Azure portal](https://portal.azure.com/).
29
28
@@ -34,86 +33,85 @@ Permissions for security connectors are managed through Azure role-based access
34
33
1. Assign permissions to the workload owners with All resources or the Azure Resource Graph option in the Azure portal.
35
34
36
35
### [All resources](#tab/all-resources)
37
-
36
+
38
37
1. Search for and select **All resources**.
39
-
38
+
40
39
:::image type="content" source="media/assign-access-to-workload/all-resources.png" alt-text="Screenshot that shows you how to search for and select all resources." lightbox="media/assign-access-to-workload/all-resources.png":::
:::image type="content" source="media/assign-access-to-workload/show-hidden-types.png" alt-text="Screenshot that shows you where on the screen to find the show hidden types option." lightbox="media/assign-access-to-workload/show-hidden-types.png":::
45
-
44
+
46
45
1. Select the **Types equals all** filter.
47
-
46
+
48
47
1. Enter `securityconnector` in the value field and add a check to the `microsoft.security/securityconnectors`.
49
-
48
+
50
49
:::image type="content" source="media/assign-access-to-workload/security-connector.png" alt-text="Screenshot that shows where the field is located and where to enter the value on the screen." lightbox="media/assign-access-to-workload/security-connector.png":::
1. Search for and select **Resource Graph Explorer**.
60
-
58
+
61
59
:::image type="content" source="media/assign-access-to-workload/resource-graph-explorer.png" alt-text="Screenshot that shows you how to search for and select resource graph explorer." lightbox="media/assign-access-to-workload/resource-graph-explorer.png":::
62
-
60
+
63
61
1. Copy and paste the following query to locate the security connector:
64
-
62
+
65
63
### [AWS](#tab/aws)
66
-
64
+
67
65
```bash
68
66
resources
69
67
| where type == "microsoft.security/securityconnectors"
:::image type="content" source="media/assign-access-to-workload/formatted-results.png" alt-text="Screenshot that shows where the formatted results toggle is located on the screen." lightbox="media/assign-access-to-workload/formatted-results.png":::
92
-
90
+
93
91
1. Select the relevant subscription and resource group to locate the relevant security connector.
94
-
92
+
95
93
---
96
-
94
+
97
95
1. Select **Access control (IAM)**.
98
-
96
+
99
97
:::image type="content" source="media/assign-access-to-workload/control-i-am.png" alt-text="Screenshot that shows where to select Access control IAM in the resource you selected." lightbox="media/assign-access-to-workload/control-i-am.png":::
100
-
98
+
101
99
1. Select **+Add**>**Add role assignment**.
102
-
100
+
103
101
1. Select the desired role.
104
-
102
+
105
103
1. Select **Next**.
106
-
104
+
107
105
1. Select **+ Select members**.
108
-
106
+
109
107
:::image type="content" source="media/assign-access-to-workload/select-members.png" alt-text="Screenshot that shows where the button is on the screen to select the + select members button.":::
110
-
108
+
111
109
1. Search for and selectthe relevant user or group.
0 commit comments