Skip to content

Commit fc9bb77

Browse files
authored
Merge pull request #186810 from ElazarK/cosmo-db
cosmos db
2 parents a5660e5 + 8588174 commit fc9bb77

16 files changed

+311
-33
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 32 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -193,24 +193,38 @@
193193
href: harden-docker-hosts.md
194194
- name: Protect your databases
195195
items:
196-
- name: Overview of Defender for SQL
197-
displayName: database
198-
href: defender-for-sql-introduction.md
199-
- name: Enable Defender for SQL servers on machines
200-
href: defender-for-sql-usage.md
201-
displayName: hybrid, arc, Azure Defender
202-
- name: Overview of Defender for open-source relational databases
203-
displayName: PG, PostgreSQL, MySQL, MariaDB, Azure Defender, OS RDBs, OSRDB
204-
href: defender-for-databases-introduction.md
205-
- name: Enable Defender for OSS RDBs and respond to alerts
206-
displayName: PG, PostgreSQL, MySQL, MariaDB, open-source relational databases, Azure Defender, OS RDBs, OSRDB
207-
href: defender-for-databases-usage.md
208-
- name: Scan your SQL resources for vulnerabilities
209-
href: defender-for-sql-on-machines-vulnerability-assessment.md
210-
displayName: hybrid, arc, Azure Defender, VA, registry, vulnerabilities
211-
- name: Customize SQL information protection policy
212-
displayName: sql, database, data discovery
213-
href: sql-information-protection-policy.md
196+
- name: Enable protection on all of your databases
197+
href: quickstart-enable-database-protections.md
198+
- name: Defender for Azure SQL database
199+
items:
200+
- name: Overview of Defender for SQL
201+
displayName: database
202+
href: defender-for-sql-introduction.md
203+
- name: Scan your SQL resources for vulnerabilities
204+
href: defender-for-sql-on-machines-vulnerability-assessment.md
205+
displayName: hybrid, arc, Azure Defender, VA, registry, vulnerabilities
206+
- name: Customize SQL information protection policy
207+
displayName: sql, database, data discovery
208+
href: sql-information-protection-policy.md
209+
- name: Defender for SQL servers on machines
210+
items:
211+
- name: Enable Defender for SQL servers on machines
212+
href: defender-for-sql-usage.md
213+
displayName: hybrid, arc, Azure Defender
214+
- name: Defender for open-source relational databases
215+
items:
216+
- name: Overview of Defender for open-source relational databases
217+
displayName: PG, PostgreSQL, MySQL, MariaDB, Azure Defender, OS RDBs, OSRDB
218+
href: defender-for-databases-introduction.md
219+
- name: Enable Defender for OSS RDBs and respond to alerts
220+
displayName: PG, PostgreSQL, MySQL, MariaDB, open-source relational databases, Azure Defender, OS RDBs, OSRDB
221+
href: defender-for-databases-usage.md
222+
- name: Microsoft Defender for Azure Cosmos DB (Preview)
223+
items:
224+
- name: Overview of Microsoft Defender for Azure Cosmos DB
225+
href: concept-defender-for-cosmos.md
226+
- name: Enable Microsoft Defender for Azure Cosmos DB
227+
href: quickstart-enable-defender-for-cosmos.md
214228
- name: Protect your containerized environments
215229
items:
216230
- name: Overview of Defender for Containers

articles/defender-for-cloud/alerts-reference.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Reference table for all security alerts in Microsoft Defender for Cloud
33
description: This article lists the security alerts visible in Microsoft Defender for Cloud
44
ms.topic: reference
5-
ms.date: 02/10/2022
5+
ms.date: 02/28/2022
66
---
77
# Security alerts - a reference guide
88

@@ -511,17 +511,17 @@ Microsoft Defender for Containers provides security alerts on the cluster level
511511

512512
## <a name="alerts-azurecosmos"></a>Alerts for Azure Cosmos DB (Preview)
513513

514-
[Further details and notes](other-threat-protections.md#cosmos-db)
514+
[Further details and notes](concept-defender-for-cosmos.md)
515515

516516
| Alert | Description | MITRE tactics<br>([Learn more](#intentions)) | Severity |
517517
|--|--|:-:|--|
518-
| **PREVIEW - Access from a Tor exit node** | This Cosmos DB account was successfully accessed from an IP address known to be an active exit node of Tor, an anonymizing proxy. Authenticated access from a Tor exit node is a likely indication that a threat actor is trying to hide their identity. | Initial Access | High/Medium |
519-
| **PREVIEW - Access from a suspicious IP** | This Cosmos DB account was successfully accessed from an IP address that was identified as a threat by Microsoft Threat Intelligence. | Initial Access | Medium |
520-
| **PREVIEW - Access from an unusual location** | This Cosmos DB account was accessed from a location considered unfamiliar, based on the usual access pattern. <br><br> Either a threat actor has gained access to the account, or a legitimate user has connected from a new or unusual geographic location | Initial Access | Low |
521-
| **PREVIEW - Unusual volume of data extracted** | An unusually large volume of data has been extracted from this Cosmos DB account. This might indicate that a threat actor exfiltrated data. | Exfiltration | Medium |
522-
| **PREVIEW - Extraction of Cosmos DB accounts keys via a potentially malicious script** | A PowerShell script was run in your subscription and performed a suspicious pattern of key-listing operations to get the keys of Cosmos DB accounts in your subscription. Threat actors use automated scripts, like Microburst, to list keys and find Cosmos DB accounts they can access. <br><br> This operation might indicate that an identity in your organization was breached, and that the threat actor is trying to compromise Cosmos DB accounts in your environment for malicious intentions. <br><br> Alternatively, a malicious insider could be trying to access sensitive data and perform lateral movement. | Collection | High |
523-
| **PREVIEW - SQL injection: potential data exfiltration** | A suspicious SQL statement was used to query a container in this Cosmos DB account. <br><br> The injected statement might have succeeded in exfiltrating data that the threat actor isn’t authorized to access. <br><br> Due to the structure and capabilities of Cosmos DB queries, many known SQL injection attacks on Cosmos DB accounts cannot work. However, the variation used in this attack may work and threat actors can exfiltrate data. | Exfiltration | Medium |
524-
| **PREVIEW - SQL injection: fuzzing attempt** | A suspicious SQL statement was used to query a container in this Cosmos DB account. <br><br> Like other well-known SQL injection attacks, this attack won’t succeed in compromising the Cosmos DB account. <br><br> Nevertheless, it’s an indication that a threat actor is trying to attack the resources in this account, and your application may be compromised. <br><br> Some SQL injection attacks can succeed and be used to exfiltrate data. This means that if the attacker continues performing SQL injection attempts, they may be able to compromise your Cosmos DB account and exfiltrate data. <br><br> You can prevent this threat by using parameterized queries. | Pre-attack | Low |
518+
| **PREVIEW - Access from a Tor exit node** | This Azure Cosmos DB account was successfully accessed from an IP address known to be an active exit node of Tor, an anonymizing proxy. Authenticated access from a Tor exit node is a likely indication that a threat actor is trying to hide their identity. | Initial Access | High/Medium |
519+
| **PREVIEW - Access from a suspicious IP** | This Azure Cosmos DB account was successfully accessed from an IP address that was identified as a threat by Microsoft Threat Intelligence. | Initial Access | Medium |
520+
| **PREVIEW - Access from an unusual location** | This Azure Cosmos DB account was accessed from a location considered unfamiliar, based on the usual access pattern. <br><br> Either a threat actor has gained access to the account, or a legitimate user has connected from a new or unusual geographic location | Initial Access | Low |
521+
| **PREVIEW - Unusual volume of data extracted** | An unusually large volume of data has been extracted from this Azure Cosmos DB account. This might indicate that a threat actor exfiltrated data. | Exfiltration | Medium |
522+
| **PREVIEW - Extraction of Azure Cosmos DB accounts keys via a potentially malicious script** | A PowerShell script was run in your subscription and performed a suspicious pattern of key-listing operations to get the keys of Azure Cosmos DB accounts in your subscription. Threat actors use automated scripts, like Microburst, to list keys and find Azure Cosmos DB accounts they can access. <br><br> This operation might indicate that an identity in your organization was breached, and that the threat actor is trying to compromise Azure Cosmos DB accounts in your environment for malicious intentions. <br><br> Alternatively, a malicious insider could be trying to access sensitive data and perform lateral movement. | Collection | High |
523+
| **PREVIEW - SQL injection: potential data exfiltration** | A suspicious SQL statement was used to query a container in this Azure Cosmos DB account. <br><br> The injected statement might have succeeded in exfiltrating data that the threat actor isn’t authorized to access. <br><br> Due to the structure and capabilities of Azure Cosmos DB queries, many known SQL injection attacks on Azure Cosmos DB accounts cannot work. However, the variation used in this attack may work and threat actors can exfiltrate data. | Exfiltration | Medium |
524+
| **PREVIEW - SQL injection: fuzzing attempt** | A suspicious SQL statement was used to query a container in this Azure Cosmos DB account. <br><br> Like other well-known SQL injection attacks, this attack won’t succeed in compromising the Azure Cosmos DB account. <br><br> Nevertheless, it’s an indication that a threat actor is trying to attack the resources in this account, and your application may be compromised. <br><br> Some SQL injection attacks can succeed and be used to exfiltrate data. This means that if the attacker continues performing SQL injection attempts, they may be able to compromise your Azure Cosmos DB account and exfiltrate data. <br><br> You can prevent this threat by using parameterized queries. | Pre-attack | Low |
525525
| | | | |
526526

527527

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
title: Overview of Defender for Azure Cosmos DB
3+
description: Learn about the benefits and features of Microsoft Defender for Azure Cosmos DB.
4+
titleSuffix: Microsoft Defender for Azure Cosmos DB
5+
ms.topic: conceptual
6+
ms.date: 02/28/2022
7+
---
8+
9+
# Introduction to Microsoft Defender for Azure Cosmos DB
10+
11+
APPLIES TO: :::image type="icon" source="media/icons/yes-icon.png" border="false"::: SQL/Core API
12+
13+
Microsoft Defender for Azure Cosmos DB detects potential SQL injections, known bad actors based on Microsoft Threat Intelligence, suspicious access patterns, and potential exploitation of your database through compromised identities, or malicious insiders.
14+
15+
Microsoft Defender for Azure Cosmos DB uses advanced threat detection capabilities, and [Microsoft Threat Intelligence](https://www.microsoft.com/insidetrack/microsoft-uses-threat-intelligence-to-protect-detect-and-respond-to-threats) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
16+
17+
You can [enable protection for all your databases](quickstart-enable-database-protections.md) (recommended), or [enable Microsoft Defender for Azure Cosmos DB](quickstart-enable-defender-for-cosmos.md) at either the subscription level, or the resource level.
18+
19+
Microsoft Defender for Azure Cosmos DB continually analyzes the telemetry stream generated by the Azure Cosmos DB services. When potentially malicious activities are detected, security alerts are generated. These alerts are displayed in Microsoft Defender for Cloud together with the details of the suspicious activity along with the relevant investigation steps, remediation actions, and security recommendations.
20+
21+
Microsoft Defender for Azure Cosmos DB doesn't access the Azure Cosmos DB account data, and doesn't have any effect on its performance.
22+
23+
## Availability
24+
25+
|Aspect|Details|
26+
|----|:----|
27+
|Release state:|Preview.<br>[!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]|
28+
|Protected Azure Cosmos DB API | :::image type="icon" source="./media/icons/yes-icon.png"::: SQL/Core API <br> :::image type="icon" source="./media/icons/no-icon.png"::: Cassandra API <br> :::image type="icon" source="./media/icons/no-icon.png"::: MongoDB API <br> :::image type="icon" source="./media/icons/no-icon.png"::: Table API <br> :::image type="icon" source="./media/icons/no-icon.png"::: Gremlin API |
29+
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government <br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure China 21Vianet |
30+
31+
## What are the benefits of Microsoft Defender for Azure Cosmos DB
32+
33+
Microsoft Defender for Azure Cosmos DB uses advanced threat detection capabilities and Microsoft Threat Intelligence data. Microsoft Defender for Azure Cosmos DB continuously monitors your Azure Cosmos DB accounts for threats such as SQL injection, compromised identities and data exfiltration.
34+
35+
This service provides action-oriented security alerts in Microsoft Defender for Cloud with details of the suspicious activity and guidance on how to mitigate the threats.
36+
You can use this information to quickly remediate security issues and improve the security of your Azure Cosmos DB accounts.
37+
38+
Alerts include details of the incident that triggered them, and recommendations on how to investigate and remediate threats. Alerts can be exported to Microsoft Sentinel or any other third-party SIEM or any other external tool. To learn how to stream alerts, see [Stream alerts to a SIEM, SOAR, or IT classic deployment model solution](export-to-siem.md).
39+
40+
> [!TIP]
41+
> For a comprehensive list of all Defender for Storage alerts, see the [alerts reference page](alerts-reference.md#alerts-azurecosmos). This is useful for workload owners who want to know what threats can be detected and help SOC teams gain familiarity with detections before investigating them. Learn more about what's in a Defender for Cloud security alert, and how to manage your alerts in [Manage and respond to security alerts in Microsoft Defender for Cloud](managing-and-responding-alerts.md).
42+
43+
## Alert types
44+
45+
Threat intelligence security alerts are triggered for:
46+
47+
- **Potential SQL injection attacks**: <br>
48+
Due to the structure and capabilities of Azure Cosmos DB queries, many known SQL injection attacks can’t work in Azure Cosmos DB. However, there are some variations of SQL injections that can succeed and may result in exfiltrating data from your Azure Cosmos DB accounts. Microsoft Defender for Azure Cosmos DB detects both successful and failed attempts, and helps you harden your environment to prevent these threats.
49+
50+
- **Anomalous database access patterns**: <br>
51+
For example, access from a TOR exit node, known suspicious IP addresses, unusual applications, and unusual locations.
52+
53+
- **Suspicious database activity**: <br>
54+
For example, suspicious key-listing patterns that resemble known malicious lateral movement techniques and suspicious data extraction patterns.
55+
56+
## Next steps
57+
58+
In this article, you learned about Microsoft Defender for Azure Cosmos DB.
59+
60+
> [!div class="nextstepaction"]
61+
> [Enable Microsoft Defender for Azure Cosmos DB](quickstart-enable-defender-for-cosmos.md)

articles/defender-for-cloud/features-paas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Microsoft Defender for Cloud features for supported Azure PaaS resources.
33
description: This page shows the availability of Microsoft Defender for Cloud features for the supported Azure PaaS resources.
44
ms.topic: overview
5-
ms.date: 11/09/2021
5+
ms.date: 02/27/2022
66
---
77
# Feature coverage for Azure PaaS services <a name="paas-services"></a>
88

38.5 KB
Loading
11.9 KB
Loading
83.4 KB
Loading
143 KB
Loading
143 KB
Loading
38.5 KB
Loading

0 commit comments

Comments
 (0)