Skip to content

Commit f6f1701

Browse files
committed
deprecated gcp
1 parent b5dee1f commit f6f1701

File tree

6 files changed

+11
-99
lines changed

6 files changed

+11
-99
lines changed

articles/defender-for-cloud/how-to-manage-aws-assessments-standards.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,10 @@ ms.date: 03/08/2023
1010

1111
Security standards contain comprehensive sets of security recommendations to help secure your cloud environments. Security teams can use the readily available standards such as AWS CIS 1.2.0, AWS CIS 1.5.0, AWS Foundational Security Best Practices, and AWS PCI DSS 3.2.1.
1212

13-
There are three types of resources that are needed to create and manage assessments:
13+
There are two types of resources that are needed to create and manage assessments:
1414

1515
- Standard: defines a set of assessments
16-
- Standard assignment: defines the scope, which the standard will evaluate. For example, specific AWS account(s).
16+
- Standard assignment: defines the scope, which the standard evaluates. For example, specific AWS account(s).
1717

1818
## Assign a built-in compliance standard to your AWS account
1919

@@ -29,9 +29,9 @@ There are three types of resources that are needed to create and manage assessme
2929

3030
:::image type="content" source="media/how-to-manage-assessments-standards/aws-add-standard.png" alt-text="Screenshot that shows you where to navigate to in order to add an AWS standard." lightbox="media/how-to-manage-assessments-standards/aws-add-standard-zoom.png":::
3131

32-
1. Enter a name, description and select built-in recommendations from the menu.
32+
1. Enter a name, description and select built-in recommendations from the drop-down menu.
3333

34-
:::image type="content" source="media/how-to-manage-assessments-standards/create-standard-aws.png" alt-text="Screenshot of the create new standard window.":::
34+
:::image type="content" source="media/how-to-manage-assessments-standards/create-standard-aws.png" alt-text="Screenshot of the Create new standard window.":::
3535

3636
1. Select **Create**.
3737

articles/defender-for-cloud/how-to-manage-gcp-assessments-standards.md

Lines changed: 7 additions & 95 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,19 @@
11
---
22
title: Manage GCP assessments and standards
33
titleSuffix: Defender for Cloud
4-
description: Learn how to create custom security assessments and standards for your GCP environment.
4+
description: Learn how to create standards for your GCP environment.
55
ms.topic: how-to
6-
ms.date: 01/24/2023
6+
ms.date: 03/08/2023
77
---
88

99
# Manage GCP assessments and standards
1010

1111
Security standards contain comprehensive sets of security recommendations to help secure your cloud environments. Security teams can use the readily available regulatory standards such as GCP CIS 1.1.0, GCP CIS and 1.2.0, or create custom standards to meet specific internal requirements.
1212

13-
There are three types of resources that are needed to create and manage assessments:
13+
There are two types of resources that are needed to create and manage standards:
1414

15-
- Assessment:
16-
- assessment details such as name, description, severity, remediation logic, etc.
17-
- assessment logic in KQL
18-
- the standard it belongs to
1915
- Standard: defines a set of assessments
20-
- Standard assignment: defines the scope, which the standard will evaluate. For example, specific GCP projects.
21-
22-
You can either use the built-in compliance standards or create your own custom standards or built-in assessments.
16+
- Standard assignment: defines the scope, which the standard evaluates. For example, specific GCP projects.
2317

2418
## Assign a built-in compliance standard to your GCP project
2519

@@ -31,97 +25,15 @@ You can either use the built-in compliance standards or create your own custom s
3125

3226
1. Select the relevant GCP project.
3327

34-
1. Select **Standards** > **Add** > **Standard**.
28+
1. Select **Standards** > **+ Create** > **Standard**.
3529

3630
:::image type="content" source="media/how-to-manage-assessments-standards/gcp-standard.png" alt-text="Screenshot that shows you where to navigate to, to add a GCP standard." lightbox="media/how-to-manage-assessments-standards/gcp-standard-zoom.png":::
3731

38-
1. Select a built-in standard from the drop-down menu.
32+
1. Enter a name, description and select built-in recommendations from the drop-down menu.
3933

4034
:::image type="content" source="media/how-to-manage-assessments-standards/drop-down-menu.png" alt-text="Screenshot that shows you the standard options you can choose from the drop-down menu." lightbox="media/how-to-manage-assessments-standards/drop-down-menu.png":::
4135

42-
1. Select **Save**.
43-
44-
## Create a new custom standard for your GCP project
45-
46-
**To create a new custom standard for your GCP project**:
47-
48-
1. Sign in to the [Azure portal](https://portal.azure.com/).
49-
50-
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
51-
52-
1. Select the relevant GCP project.
53-
54-
1. Select **Standards** > **Add** > **Standard**.
55-
56-
1. Select **New standard**.
57-
58-
1. Enter a name, description and select which assessments you want to add.
59-
60-
1. Select **Save**.
61-
62-
## Assign a built-in assessment to your GCP project
63-
64-
**To assign a built-in assessment to your GCP project**:
65-
66-
1. Sign in to the [Azure portal](https://portal.azure.com/).
67-
68-
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
69-
70-
1. Select the relevant GCP project.
71-
72-
1. Select **Standards** > **Add** > **Assessment**.
73-
74-
:::image type="content" source="media/how-to-manage-assessments-standards/gcp-assessment.png" alt-text="Screenshot that shows where to navigate to, to select GCP assessment." lightbox="media/how-to-manage-assessments-standards/gcp-assessment.png":::
75-
76-
1. Select **Existing assessment**.
77-
78-
1. Select all relevant assessments from the drop-down menu.
79-
80-
1. Select the standards from the drop-down menu.
81-
82-
1. Select **Save**.
83-
84-
## How to build a query
85-
86-
The last row of the query should return all the original columns (don’t use ‘project’, ‘project-away). End the query with an iff statement that defines the healthy or unhealthy conditions: `| extend HealthStatus = iff([boolean-logic-here], 'UNHEALTHY','HEALTHY')`.
87-
88-
### Sample KQL queries
89-
90-
**Ensure that Cloud Storage buckets have uniform bucket-level access enabled**
91-
92-
```kusto
93-
let UnhealthyBuckets = Storage_Bucket
94-
| extend RetentionPolicy = Record.retentionPolicy
95-
| where isnull(RetentionPolicy) or isnull(RetentionPolicy.isLocked) or tobool(RetentionPolicy.isLocked)==false
96-
| project BucketName = RecordIdentifierInfo.CloudNativeResourceName; Logging_LogSink
97-
| extend Destination = split(Record.destination,'/')[0]
98-
| where Destination == 'storage.googleapis.com'
99-
| extend LogBucketName = split(Record.destination,'/')[1]
100-
| extend HealthStatus = iff(LogBucketName in(UnhealthyBuckets), 'UNHEALTHY', 'HEALTHY')"
101-
```
102-
103-
**Ensure VM disks for critical VMs are encrypted**
104-
105-
```kusto
106-
Compute_Disk
107-
| extend DiskEncryptionKey = Record.diskEncryptionKey
108-
| extend IsVmNotEncrypted = isempty(tostring(DiskEncryptionKey.sha256))
109-
| extend HealthStatus = iff(IsVmNotEncrypted ,'UNHEALTHY' ,'HEALTHY')"
110-
```
111-
112-
**Ensure Compute instances are launched with Shielded VM enabled**
113-
114-
```kusto
115-
Compute_Instance
116-
| extend InstanceName = tostring(Record.id)
117-
| extend ShieldedVmExist = tostring(Record.shieldedInstanceConfig.enableIntegrityMonitoring) =~ 'true' and tostring(Record.shieldedInstanceConfig.enableVtpm) =~ 'true'
118-
| extend HealthStatus = iff(ShieldedVmExist, 'HEALTHY', 'UNHEALTHY')"
119-
```
120-
121-
You can use the following links to learn more about Kusto queries:
122-
- [KQL quick reference](/azure/data-explorer/kql-quick-reference)
123-
- [Kusto Query Language (KQL) overview](/azure/data-explorer/kusto/query/)
124-
- [Must Learn KQL](https://azurecloudai.blog/2021/11/17/must-learn-kql-part-1-tools-and-resources/)
36+
1. Select **Create**.
12537

12638
## Next steps
12739

11.8 KB
Loading
-193 KB
Loading
-43 KB
Loading

0 commit comments

Comments
 (0)