You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/azure-kubernetes-service-integration.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,8 +15,9 @@ ms.author: memildin
15
15
16
16
---
17
17
18
-
# Azure Kubernetes Services integration with Security Center (Preview)
19
-
Azure Kubernetes Service (AKS) is Microsoft’s managed service for developing, deploying, and managing containerized applications.
18
+
# Azure Kubernetes Services integration with Security Center
19
+
20
+
Azure Kubernetes Service (AKS) is Microsoft's managed service for developing, deploying, and managing containerized applications.
20
21
21
22
Use AKS together with Azure Security Center's standard tier (see [pricing](security-center-pricing.md)) to gain deeper visibility to your AKS nodes, cloud traffic, and security controls.
22
23
@@ -32,9 +33,6 @@ Using the two services together provides:
32
33
33
34
***Security recommendations** - Security Center identifies your AKS resources and categorizes them: from clusters to individual virtual machines. You can then view security recommendations per resource. For more information, see the containers recommendations in the [reference list of recommendations](recommendations-reference.md#recs-computeapp).
34
35
35
-
> [!NOTE]
36
-
> If the name of a Security Center recommendation ends with a "(Preview)" tag, it's referring to the preview nature of the recommendation, not the feature.
37
-
38
36
***Environment hardening** - Security Center constantly monitors the configuration of your Kubernetes clusters and Docker configurations. It then generates security recommendations that reflect industry standards.
39
37
40
38
***Run-time protection** - Through continuous analysis of the following AKS sources, Security Center alerts you to threats and malicious activity detected at the host *and* AKS cluster level:
@@ -59,4 +57,4 @@ To learn more about Security Center's container security features, see:
59
57
60
58
*[Integration with Azure Container Registry](azure-container-registry-integration.md)
61
59
62
-
*[Data management at Microsoft](https://www.microsoft.com/trust-center/privacy/data-management) - Describes the data policies of Microsoft services (including Azure, Intune, and Office 365), details of Microsoft’s data management, and the retention policies that affect your data
60
+
*[Data management at Microsoft](https://www.microsoft.com/trust-center/privacy/data-management) - Describes the data policies of Microsoft services (including Azure, Intune, and Office 365), details of Microsoft's data management, and the retention policies that affect your data
Copy file name to clipboardExpand all lines: articles/security-center/container-security.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ When you're exploring the security issues of a VM, Security Center provides addi
50
50
>[!NOTE]
51
51
> These CIS benchmark checks will not run on AKS-managed instances or Databricks-managed VMs.
52
52
53
-
### Continuous monitoring of your Kubernetes clusters (Preview)
53
+
### Continuous monitoring of your Kubernetes clusters
54
54
Security Center works together with Azure Kubernetes Service (AKS), Microsoft's managed container orchestration service for developing, deploying, and managing containerized applications.
55
55
56
56
AKS provides security controls and visibility into the security posture of your clusters. Security Center uses these features to:
Copy file name to clipboardExpand all lines: articles/security-center/security-center-identity-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ By monitoring identity activities, you can take proactive actions before an inci
34
34
- Remove privileged external accounts from your subscription
35
35
36
36
> [!NOTE]
37
-
> If your subscription has more than 600 accounts, Security Center is unable to run the Identity recommendations against your subscription. Recommendations that are not run are listed under “unavailable assessments” below.
37
+
> If your subscription has more than 600 accounts, Security Center is unable to run the Identity recommendations against your subscription. Recommendations that are not run are listed under "unavailable assessments" below.
38
38
Security Center is unable to run the Identity recommendations against a Cloud Solution Provider (CSP) partner's admin agents.
0 commit comments