Skip to content

Commit fe72843

Browse files
author
David Curwin
committed
updates from Tomer
1 parent b35bee4 commit fe72843

8 files changed

+102
-40
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,8 @@
145145
- name: Defender for Containers support matrices
146146
displayName: Containers, features availability, environment information
147147
href: support-matrix-defender-for-containers.md
148+
- name: Defender for Containers CSPM support matrices
149+
href: support-agentless-containers-posture.md
148150
- name: Protect multicloud resources
149151
items:
150152
- name: The Defender for Cloud multicloud solution
@@ -223,8 +225,6 @@
223225
items:
224226
- name: Agentless Container Posture (Preview)
225227
href: concept-agentless-containers.md
226-
- name: Support and prerequisites
227-
href: support-agentless-containers-posture.md
228228
- name: Security recommendations
229229
items:
230230
- name: Reference list of Azure recommendations
@@ -300,12 +300,6 @@
300300
items:
301301
- name: Onboard agentless containers for CSPM
302302
href: how-to-enable-agentless-containers.md
303-
- name: View and remediate vulnerability assessment findings for registry images
304-
href: view-and-remediate-vulnerability-assessment-findings.md
305-
- name: View and remediate vulnerabilities for images running on your AKS clusters
306-
href: view-and-remediate-vulnerabilities-for-images-running-on-aks.md
307-
- name: Disable vulnerability assessment findings on Container registry images
308-
href: disable-vulnerability-findings-containers.md
309303
- name: Security recommendations
310304
items:
311305
- name: Create custom Azure security initiatives and policies
@@ -559,8 +553,18 @@
559553
- name: Vulnerability assessment for Azure Container Registry
560554
displayName: ACR, registry, images, qualys
561555
href: defender-for-containers-vulnerability-assessment-azure.md
562-
- name: Vulnerability assessment for Agentless Container registry
563-
href: agentless-container-registry-vulnerability-assessment.md
556+
- name: Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management
557+
items:
558+
- name: Overview
559+
href: agentless-container-registry-vulnerability-assessment.md
560+
- name: Enable vulnerability assessment
561+
href: enable-vulnerability-assessment.md
562+
- name: View and remediate vulnerabilities for registry images
563+
href: view-and-remediate-vulnerability-assessment-findings.md
564+
- name: View and remediate vulnerabilities for running images
565+
href: view-and-remediate-vulnerabilities-for-images-running-on-aks.md
566+
- name: Disable vulnerabilities on images
567+
href: disable-vulnerability-findings-containers.md
564568
- name: Vulnerability assessment for Amazon Elastic Container Registry
565569
displayName: AWS, ECR, registry, images, qualys
566570
href: defender-for-containers-vulnerability-assessment-elastic.md

articles/defender-for-cloud/agentless-container-registry-vulnerability-assessment.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Agentless Container registry vulnerability assessment
3-
description: Learn about Agentless Container registry vulnerability assessment.
2+
title: Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management
3+
description: Learn about vulnerability assessments for Azure with Microsoft Defender Vulnerability Management.
44
author: dcurwin
55
ms.author: dacurwin
66
ms.date: 07/11/2023
77
ms.topic: how-to
88
---
99

10-
# Agentless Container registry vulnerability assessment
10+
# Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management
1111

1212
> [!NOTE]
1313
> This feature supports scanning of images in the Azure Container Registry (ACR) only. If you want to find vulnerabilities stored in other container registries, you can import the images into ACR, after which the imported images are scanned by the built-in vulnerability assessment solution. Learn how to [import container images to a container registry](/azure/container-registry/container-registry-import-images).
@@ -22,8 +22,8 @@ Azure Container Vulnerability Assessment provides automatic coverage for all reg
2222

2323
Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerability Management) has the following capabilities:
2424

25-
- **Scanning OS packages** - container vulnerability assessment has the ability to scan vulnerabilities in packages installed by the OS package manager in Linux. See the [full list of the supported OS and their versions](support-agentless-containers-posture.md#registries-and-images).
26-
- **Language specific packages** – support for language specific packages and files, and their dependencies installed or copied without the OS package manager. See the [complete list of supported languages](support-agentless-containers-posture.md#registries-and-images).
25+
- **Scanning OS packages** - container vulnerability assessment has the ability to scan vulnerabilities in packages installed by the OS package manager in Linux. See the [full list of the supported OS and their versions](support-agentless-containers-posture.md#registries-and-images---powered-by-mdvm).
26+
- **Language specific packages** – support for language specific packages and files, and their dependencies installed or copied without the OS package manager. See the [complete list of supported languages](support-agentless-containers-posture.md#registries-and-images---powered-by-mdvm).
2727
- **Image scanning in Azure Private Link** - Azure container vulnerability assessment provides the ability to scan images in container registries that are accessible via Azure Private Links. This capability requires access to trusted services and authentication with the registry. Learn how to [connect privately to an Azure container registry using Azure Private Link](/azure/container-registry/container-registry-private-link#set-up-private-endpoint---portal-recommended).
2828
- **Exploitability information** - Each vulnerability report is searched through exploitability databases to assist our customers with determining actual risk associated with each reported vulnerability.
2929
- **Reporting** - Defender for Containers powered by Microsoft Defender Vulnerability Management (MDVM) reports the vulnerabilities as the following recommendations:

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,11 +56,14 @@ You can learn more about [Kubernetes data plane hardening](kubernetes-workload-p
5656

5757
## Vulnerability assessment
5858

59-
Defender for Containers scans the container images in Azure Container Registry (ACR) and Amazon AWS Elastic Container Registry (ECR) to notify you if there are known vulnerabilities in your images. When the scan completes, Defender for Containers provides details for each vulnerability detected, a security classification for each vulnerability detected, and guidance on how to remediate issues and protect vulnerable attack surfaces.
59+
Defender for Containers scans the container images in Azure Container Registry (ACR) and Amazon AWS Elastic Container Registry (ECR) to notify you if there are known vulnerabilities in your images. When the scan completes, Defender for Containers provides details for each vulnerability detected, a security classification for each vulnerability detected, and guidance on how to remediate issues and protect vulnerable attack surfaces.
60+
61+
There are two solutions for vulnerability assessment in Azure, one powered by Microsoft Defender Vulnerability Management and one powered by Qualys.
6062

6163
Learn more about:
6264

63-
- [Vulnerability assessment for Azure Container Registry (ACR)](defender-for-containers-vulnerability-assessment-azure.md)
65+
- [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-container-registry-vulnerability-assessment.md)
66+
- [Vulnerability assessment for Azure powered by Qualys](defender-for-containers-vulnerability-assessment-azure.md)
6467
- [Vulnerability assessment for Amazon AWS Elastic Container Registry (ECR)](defender-for-containers-vulnerability-assessment-elastic.md)
6568

6669
## Run-time protection for Kubernetes nodes and clusters

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Identify vulnerabilities in Azure Container Registry
2+
title: Vulnerability assessment for Azure powered by Qualys
33
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
44
author: dcurwin
55
ms.author: dacurwin
6-
ms.date: 06/21/2023
6+
ms.date: 07/20/2023
77
ms.topic: how-to
88
ms.custom: ignite-2022, build-2023
99
---
1010

11-
# Scan your Azure Container Registry images for vulnerabilities
11+
# Vulnerability assessment for Azure powered by Qualys
1212

1313
As part of the protections provided within Microsoft Defender for Cloud, you can scan the container images that are stored in your Azure Resource Manager-based Azure Container Registry.
1414

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: Enable vulnerability assessment in Microsoft Defender CSPM
3+
description: Learn how to enable vulnerability assessment in Microsoft Defender CSPM
4+
ms.service: defender-for-cloud
5+
ms.topic: how-to
6+
ms.date: 07/20/2023
7+
---
8+
9+
# Enable vulnerability assessment in Microsoft Defender CSPM
10+
11+
Onboarding Agentless Container posture in Defender CSPM will allow you to gain all its [capabilities](concept-agentless-containers.md#capabilities).
12+
13+
Defender CSPM includes [two extensions](#what-are-the-extensions-for-agentless-container-posture-management) that allow for agentless visibility into Kubernetes and containers registries across your organization's SDLC and runtime.
14+
15+
**To onboard Agentless Container posture in Defender CSPM:**
16+
17+
1. Before starting, verify that the subscription is [onboarded to Defender CSPM](enable-enhanced-security.md).
18+
19+
1. In the Azure portal, navigate to the Defender for Cloud's **Environment Settings** page.
20+
21+
1. Select the subscription that's onboarded to the Defender CSPM plan, then select **Settings**.
22+
23+
1. Ensure the **Agentless discovery for Kubernetes** and **Container registries vulnerability assessments** extensions are toggled to **On**.
24+
25+
1. Select **Continue**.
26+
27+
:::image type="content" source="media/concept-agentless-containers/settings-continue.png" alt-text="Screenshot of selecting agentless discovery for Kubernetes and Container registries vulnerability assessments." lightbox="media/concept-agentless-containers/settings-continue.png":::
28+
29+
1. Select **Save**.
30+
31+
A notification message pops up in the top right corner that will verify that the settings were saved successfully.
32+
33+
## What are the extensions for Agentless Container Posture management?
34+
35+
There are two extensions that provide agentless CSPM functionality:
36+
37+
- **Container registries vulnerability assessments**: Provides agentless containers registries vulnerability assessments. Recommendations are available based on the vulnerability assessment timeline. Learn more about [image scanning](agentless-container-registry-vulnerability-assessment.md).
38+
- **Agentless discovery for Kubernetes**: Provides API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup.
39+
40+
## How can I onboard multiple subscriptions at once?
41+
42+
To onboard multiple subscriptions at once, you can use this [script](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Powershell%20scripts/Agentless%20Container%20Posture).
43+
44+
## Support for exemptions
45+
46+
You can customize your vulnerability assessment experience by exempting management groups, subscriptions, or specific resources from your secure score. Learn how to [create an exemption](exempt-resource.md) for a resource or subscription.
47+
48+
## Next Steps
49+
50+
- Learn more about [Trusted Access](/azure/aks/trusted-access-feature).
51+
- Learn how to [view and remediate vulnerability assessment findings for registry images and running images](view-and-remediate-vulnerability-assessment-findings.md).
52+
- Learn how to [create an exemption](exempt-resource.md) for a resource or subscription.
53+
- Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).

articles/defender-for-cloud/support-agentless-containers-posture.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ All of the agentless container capabilities are available as part of the [Defend
1313
Review the requirements on this page before setting up [agentless containers posture](concept-agentless-containers.md) in Microsoft Defender for Cloud.
1414

1515
> [!IMPORTANT]
16-
> Agentless Posture is currently in Preview. Previews are provided "as is" and "as available" and are excluded from the service-level agreements and limited warranty.
16+
> Agentless Posture is currently in Preview. Previews are provided "as is" and "as available" and are excluded from the service-level agreements and limited warranty.
1717
1818
## Availability
1919

@@ -24,7 +24,7 @@ Review the requirements on this page before setting up [agentless containers pos
2424
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Commercial clouds<br> :::image type="icon" source="./media/icons/no-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure China 21Vianet<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected AWS accounts<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected GCP accounts |
2525
| Permissions | You need to have access as a:<br><br> - Subscription Owner, **or** <br> - User Access Admin and Security Admin permissions for the Azure subscription used for onboarding |
2626

27-
## Registries and images
27+
## Registries and images - powered by MDVM
2828

2929
| Aspect | Details |
3030
|--|--|
@@ -44,9 +44,8 @@ Learn more about [supported Kubernetes versions in Azure Kubernetes Service (AKS
4444

4545
### Are attack paths triggered on workloads that are running on Azure Container Instances?
4646

47-
Attack paths are currently not triggered for workloads running on[ Azure Container Instances](/azure/container-instances/).
47+
Attack paths are currently not triggered for workloads running on [Azure Container Instances](/azure/container-instances/).
4848

4949
## Next steps
5050

5151
Learn how to [enable agentless containers](how-to-enable-agentless-containers.md).
52-

articles/defender-for-cloud/support-matrix-defender-for-containers.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,11 @@ This article summarizes support information for the [Defender for Containers pla
2020
| Feature | Supported Resources | Linux release state | Windows release state | Agentless/Agent-based | Pricing Tier | Azure clouds availability |
2121
|--|--|--|--|--|--|--|
2222
| Compliance-Docker CIS | VM, Virtual Machine Scale Set | GA | - | Log Analytics agent | Defender for Servers Plan 2 | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
23-
| [Vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md)-registry scan [OS packages](#registries-and-images-support-aks)| ACR, Private ACR | GA | Preview | Agentless | Defender for Containers | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
24-
| [Vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md)-registry scan [language packages](#registries-and-images-support-aks) | ACR, Private ACR | Preview | - | Agentless | Defender for Containers | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
25-
| [Vulnerability assessment-running images](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters) | AKS | GA | Preview | Defender profile | Defender for Containers | Commercial clouds |
23+
| [Vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) (powered by Qualys) -registry scan [OS packages](#registries-and-images-support-for-aks---powered-by-qualys) | ACR, Private ACR | GA | Preview | Agentless | Defender for Containers | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
24+
| [Vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) (powered by Qualys) -registry scan [language packages](#registries-and-images-support-for-aks---powered-by-qualys) | ACR, Private ACR | Preview | - | Agentless | Defender for Containers | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
25+
| [Vulnerability assessment (powered by Qualys) -running images](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters) | AKS | GA | Preview | Defender profile | Defender for Containers | Commercial clouds |
26+
| [Vulnerability assessment](agentless-container-registry-vulnerability-assessment.md) powered by MDVM -registry scan | ACR, Private ACR | Preview | | Agentless | Defender for Containers | Commercial clouds |
27+
| [Vulnerability assessment](agentless-container-registry-vulnerability-assessment.md) powered by MDVM - running image | AKS | Preview | | Defender profile | Defender for Containers | Commercial clouds |
2628
| [Hardening (control plane)](defender-for-containers-architecture.md) | ACR, AKS | GA | Preview | Agentless | Free | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
2729
| [Hardening (Kubernetes data plane)](kubernetes-workload-protections.md) | AKS | GA | - | Azure Policy | Free | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
2830
| [Runtime threat detection](defender-for-containers-introduction.md#run-time-protection-for-kubernetes-nodes-and-clusters) (control plane)| AKS | GA | GA | Agentless | Defender for Containers | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
@@ -32,7 +34,7 @@ This article summarizes support information for the [Defender for Containers pla
3234
| Discovery/provisioning-Defender profile auto provisioning | AKS | GA | - | Agentless | Defender for Containers | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
3335
| Discovery/provisioning-Azure policy add-on auto provisioning | AKS | GA | - | Agentless | Free | Commercial clouds<br><br> National clouds: Azure Government, Azure China 21Vianet |
3436

35-
### Registries and images support-AKS
37+
### Registries and images support for AKS - powered by Qualys
3638

3739
| Aspect | Details |
3840
|--|--|

0 commit comments

Comments
 (0)