Skip to content

Commit f94d09d

Browse files
fixes from reviewer
1 parent c4d5d70 commit f94d09d

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: how-to
55
author: dcurwin
66
ms.author: dacurwin
77
ms.custom: ignite-2022
8-
ms.date: 07/10/2023
8+
ms.date: 07/11/2023
99
---
1010

1111
# Protect your Kubernetes data plane hardening
@@ -28,7 +28,7 @@ Microsoft Defender for Cloud includes a bundle of recommendations that are avail
2828

2929
You can enable the Azure policy for Kubernetes by one of two ways:
3030
- Enable for all current and future clusters using plan/connector settings
31-
- [Enabling for Azure subscriptions or on-prem](#enabling-for-azure-subscriptions-or-on-prem)
31+
- [Enabling for Azure subscriptions or on-premises](#enabling-for-azure-subscriptions-or-on-premises)
3232
- [Enabling for GCP projects](#enabling-for-gcp-projects)
3333
- [Enable for existing clusters using recommendations (specific clusters or all clusters)](#manually-deploy-the-add-on-to-clusters-using-recommendations-on-specific-clusters).
3434

@@ -41,7 +41,7 @@ You can enable the Azure policy for Kubernetes by one of two ways:
4141
> [!NOTE]
4242
> Enablement for AWS via the connector is not supported due to a limitation in EKS that requires the cluster admin to add permissions for a new IAM role on the cluster itself.
4343
44-
#### Enabling for Azure subscriptions or on-prem
44+
#### Enabling for Azure subscriptions or on-premises
4545

4646
When you enable Microsoft Defender for Containers, the "Azure Policy for Kubernetes" setting is enabled by default for the Azure Kubernetes Service, and for Azure Arc-enabled Kubernetes clusters in the relevant subscription. If you disable the setting on initial configuration you can enable it afterwards manually.
4747

@@ -67,7 +67,7 @@ If you disabled the "Azure Policy for Kubernetes" settings under the containers
6767

6868
When you enable Microsoft Defender for Containers on a GCP connector, the "Azure Policy Extension for Azure Arc" setting is enabled by default for the Google Kubernetes Engine in the relevant project. If you disable the setting on initial configuration you can enable it afterwards manually.
6969

70-
If you disabled the "Azure Policy Extension for Azure Arc" settings under the GCP connector, you can follow the below steps to to [enable it on your GCP connector](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-gke#protect-google-kubernetes-engine-gke-clusters).
70+
If you disabled the "Azure Policy Extension for Azure Arc" settings under the GCP connector, you can follow the below steps to [enable it on your GCP connector](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-gke#protect-google-kubernetes-engine-gke-clusters).
7171

7272
### Manually deploy the add-on to clusters using recommendations on specific clusters
7373

@@ -90,7 +90,7 @@ Once enabled, the hardening recommendation becomes available (some of the recomm
9090
- **AWS** - `EKS clusters should have Microsoft Defender's extension for Azure Arc installed`
9191
- **GCP** - `GKE clusters should have Microsoft Defender's extension for Azure Arc installed`
9292

93-
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the recommendation **Azure Kubernetes Service clusters should have the Azure Policy add-on for Kubernetes installed**." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
93+
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the recommendation "Azure Kubernetes Service clusters should have the Azure Policy add-on for Kubernetes installed"." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
9494

9595
> [!TIP]
9696
> The recommendation is included in five different security controls and it doesn't matter which one you select in the next step.
-54.7 KB
Loading
27.1 KB
Loading

0 commit comments

Comments
 (0)