@@ -37,33 +37,27 @@ The following table summarizes each plan and their cloud availability.
37
37
| [ Data exporting] ( export-to-siem.md ) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
38
38
| [ Workflow automation] ( workflow-automation.yml ) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
39
39
| Tools for remediation | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
40
- | Microsoft Cloud Security Benchmark | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
40
+ | [ Microsoft Cloud Security Benchmark] ( concept-regulatory-compliance.md ) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
41
41
| [ AI security posture management] ( ai-security-posture.md ) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
42
42
| [ Agentless VM vulnerability scanning] ( enable-agentless-scanning-vms.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
43
43
| [ Agentless VM secrets scanning] ( secrets-scanning-servers.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
44
44
| [ Attack path analysis] ( how-to-manage-attack-path.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
45
45
| [ Risk prioritization] ( risk-prioritization.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
46
46
| [ Risk hunting with security explorer] ( how-to-manage-cloud-security-explorer.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
47
- | [ Code-to-cloud mapping for containers] ( container-image-mapping.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
48
- | [ Code-to-cloud mapping for IaC] ( iac-template-mapping.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
49
- | [ PR annotations] ( review-pull-request-annotations.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
47
+ | [ Code-to-cloud mapping for containers] ( container-image-mapping.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | GitHub, Azure DevOps |
48
+ | [ Code-to-cloud mapping for IaC] ( iac-template-mapping.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure DevOps |
49
+ | [ PR annotations] ( review-pull-request-annotations.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | GitHub, Azure DevOps |
50
50
| Internet exposure analysis | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
51
51
| [ External attack surface management (EASM)] ( concept-easm.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
52
52
| [ Permissions Management (CIEM)] ( enable-permissions-management.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
53
-
54
- | temporary | temproary | temporary|
55
- | --| --| --|
53
+ | [ Regulatory compliance assessments] ( concept-regulatory-compliance-standards.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
54
+ | [ ServiceNow Integration] ( integration-servicenow.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
55
+ | [ Critical assets protection] ( critical-assets-protection.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
56
+ | [ Governance to drive remediation at-scale] ( governance-rules.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
57
+ | [ Data-aware security posture, Sensitive data scanning] ( concept-data-security-posture.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
56
58
| [ Agentless discovery for Kubernetes] ( concept-agentless-containers.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
57
- | [ Security governance] ( governance-rules.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
58
- | [ Regulatory compliance standards] ( concept-regulatory-compliance.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
59
- | [ Cloud security explorer] ( how-to-manage-cloud-security-explorer.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
60
- | [ Attack path analysis] ( how-to-manage-attack-path.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
61
- | [ Agentless scanning for machines] ( concept-agentless-data-collection.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
62
- | [ Agentless container security posture] ( concept-agentless-containers.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
63
- | [ Container registries vulnerability assessment] ( concept-agentless-containers.md ) , including registry scanning | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
64
- | [ Data aware security posture] ( concept-data-security-posture.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
65
- | EASM insights in network exposure | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
66
- | [ Permissions management (Preview)] ( enable-permissions-management.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
59
+ | [ Agentless code-to-cloud containers vulnerability assessment] ( agentless-vulnerability-assessment-azure.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
60
+ | [ AI Security Posture Management (Preview)] ( ai-security-posture.md ) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
67
61
68
62
> [ !NOTE]
69
63
> Starting March 7, 2024, Defender CSPM must be enabled to have premium DevOps security capabilities that include code-to-cloud contextualization powering security explorer and attack paths and pull request annotations for Infrastructure-as-Code security findings. See DevOps security [ support and prerequisites] ( devops-support.md ) to learn more.
0 commit comments