Skip to content

Commit fec4bcc

Browse files
authored
Merge pull request #275454 from dcurwin/wi-252691-dasp-to-dspm-may15-2024
Replace DASP with DSPM
2 parents a4edfbe + d5193e7 commit fec4bcc

11 files changed

+38
-44
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -246,7 +246,7 @@
246246
href: faq-cspm.yml
247247
- name: Improve your data security posture
248248
items:
249-
- name: About data-aware security posture
249+
- name: About data security posture management
250250
href: concept-data-security-posture.md
251251
- name: Support and prerequisites
252252
href: concept-data-security-posture-prepare.md
@@ -333,9 +333,9 @@
333333
- name: Explore risks to pre-deployment generative AI artifacts
334334
displayName: AI, risks, generative, applications, apps
335335
href: explore-ai-risk.md
336-
- name: Data-aware security posture
336+
- name: Data security posture management
337337
items:
338-
- name: Enable data-aware security posture
338+
- name: Enable data security posture management
339339
href: data-security-posture-enable.md
340340
- name: Explore risks to sensitive data
341341
href: data-security-review-risks.md
@@ -1042,7 +1042,7 @@
10421042
href: episode-twenty-nine.md
10431043
- name: New Custom Recommendations for AWS and GCP in Defender for Cloud
10441044
href: episode-thirty.md
1045-
- name: Understanding data aware security posture capability
1045+
- name: Understanding data security posture management capability
10461046
href: episode-thirty-one.md
10471047
- name: API Security with Defender for APIs
10481048
href: episode-thirty-two.md

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ The following table summarizes each plan and their cloud availability.
5454
| [ServiceNow Integration](integration-servicenow.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5555
| [Critical assets protection](critical-assets-protection.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5656
| [Governance to drive remediation at-scale](governance-rules.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
57-
| [Data-aware security posture, Sensitive data scanning](concept-data-security-posture.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
57+
| [Data security posture management, Sensitive data scanning](concept-data-security-posture.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5858
| [Agentless discovery for Kubernetes](concept-agentless-containers.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5959
| [Agentless code-to-cloud containers vulnerability assessment](agentless-vulnerability-assessment-azure.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
6060

articles/defender-for-cloud/concept-data-security-posture-prepare.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Support and prerequisites for data-aware security posture
3-
description: Learn about the requirements for data-aware security posture in Microsoft Defender for Cloud.
2+
title: Support and prerequisites for data security posture management
3+
description: Learn about the requirements for data security posture management in Microsoft Defender for Cloud.
44
author: dcurwin
55
ms.author: dacurwin
66
ms.service: defender-for-cloud
@@ -9,9 +9,9 @@ ms.date: 03/04/2024
99
ms.custom: references_regions
1010
---
1111

12-
# Support and prerequisites for data-aware security posture
12+
# Support and prerequisites for data security posture management
1313

14-
Review the requirements on this page before setting up [data-aware security posture](concept-data-security-posture.md) in Microsoft Defender for Cloud.
14+
Review the requirements on this page before setting up [data security posture management](concept-data-security-posture.md) in Microsoft Defender for Cloud.
1515

1616
## Enabling sensitive data discovery
1717

@@ -140,4 +140,4 @@ AWS:
140140
141141
## Next step
142142

143-
[Enable](data-security-posture-enable.md) data-aware security posture.
143+
[Enable](data-security-posture-enable.md) data security posture management.

articles/defender-for-cloud/concept-data-security-posture.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Data-aware security posture
2+
title: Data security posture management
33
description: Learn how Defender for Cloud helps improve data security posture in a multicloud environment.
44
author: dcurwin
55
ms.author: dacurwin
66
ms.service: defender-for-cloud
77
ms.topic: conceptual
88
ms.date: 01/28/2024
99
---
10-
# About data-aware security posture
10+
# About data security posture management
1111

12-
As digital transformation accelerates, organizations move data to the cloud at an exponential rate using multiple data stores such as object stores and managed/hosted databases. The dynamic and complex nature of the cloud has increased data threat surfaces and risks. This causes challenges for security teams around data visibility and protecting the cloud data estate.
12+
As digital transformation accelerates, organizations move data to the cloud at an exponential rate using multiple data stores such as object stores and managed/hosted databases. The dynamic and complex nature of the cloud increases data threat surfaces and risks. This causes challenges for security teams around data visibility and protecting the cloud data estate.
1313

14-
Data-aware security in Microsoft Defender for Cloud helps you to reduce risk to data, and respond to data breaches. Using data-aware security posture you can:
14+
Data security posture management in Microsoft Defender for Cloud helps you to reduce risk to data, and respond to data breaches. Using data security posture management you can:
1515

1616
- Automatically discover sensitive data resources across multiple clouds.
1717
- Evaluate data sensitivity, data exposure, and how data flows across the organization.
@@ -20,7 +20,7 @@ Data-aware security in Microsoft Defender for Cloud helps you to reduce risk to
2020

2121
## Automatic discovery
2222

23-
Data-aware security posture automatically and continuously discovers managed and shadow data resources across clouds, including different types of objects stores and databases.
23+
Data security posture management automatically and continuously discovers managed and shadow data resources across clouds, including different types of objects stores and databases.
2424

2525
- Discover sensitive data using the sensitive data discovery extension included in the Defender Cloud Security Posture Management (CSPM) and Defender for Storage plans.
2626
- In addition, you can discover hosted databases and data flows in Cloud Security Explorer and Attack Paths. This functionality is available in the Defender CSPM plan, and isn't dependent on the sensitive data discovery extension.
@@ -29,9 +29,9 @@ Data-aware security posture automatically and continuously discovers managed and
2929

3030
Defender for Cloud uses smart sampling to discover a selected number of assets in your cloud data stores. Smart sampling results discover evidence of sensitive data issues, while saving on discovery costs and time.
3131

32-
## Data security in Defender CSPM
32+
## Data security posture management in Defender CSPM
3333

34-
Defender CSPM provides visibility and contextual insights into your organizational security posture. The addition of data-aware security posture to the Defender CSPM plan enables you to proactively identify and prioritize critical data risks, distinguishing them from less risky issues.
34+
Defender CSPM provides visibility and contextual insights into your organizational security posture. The addition of data security posture management to the Defender CSPM plan enables you to proactively identify and prioritize critical data risks, distinguishing them from less risky issues.
3535

3636
### Attack paths
3737

@@ -45,7 +45,7 @@ Cloud Security Explorer helps you identify security risks in your cloud environm
4545

4646
You can use Cloud Security Explorer query templates, or build your own queries, to find insights about misconfigured data resources that are publicly accessible and contain sensitive data, across multicloud environments. You can run queries to examine security issues, and to get environment context into your asset inventory, exposure to the internet, access controls, data flows, and more. Review [cloud graph insights](attack-path-reference.md#cloud-security-graph-components-list).
4747

48-
## Data security in Defender for Storage
48+
## Data security posture management in Defender for Storage
4949

5050
Defender for Storage monitors Azure storage accounts with advanced threat detection capabilities. It detects potential data breaches by identifying harmful attempts to access or exploit data, and by identifying suspicious configuration changes that could lead to a breach.
5151

@@ -65,11 +65,11 @@ Data sensitivity settings define what's considered sensitive data in your organi
6565

6666
When discovering resources for data sensitivity, results are based on these settings.
6767

68-
When you enable data-aware security capabilities with the sensitive data discovery component in the Defender CSPM or Defender for Storage plans, Defender for Cloud uses algorithms to identify data resources that appear to contain sensitive data. Resources are labeled in accordance with data sensitivity settings.
68+
When you enable data security posture management capabilities with the sensitive data discovery component in the Defender CSPM or Defender for Storage plans, Defender for Cloud uses algorithms to identify data resources that appear to contain sensitive data. Resources are labeled in accordance with data sensitivity settings.
6969

7070
Changes in sensitivity settings take effect the next time that resources are discovered.
7171

7272
## Next steps
7373

74-
- [Prepare and review requirements](concept-data-security-posture-prepare.md) for data-aware security posture management.
75-
- [Understanding data aware security posture - Defender for Cloud in the Field video](episode-thirty-one.md).
74+
- [Prepare and review requirements](concept-data-security-posture-prepare.md) for data security posture management.
75+
- [Understanding data security posture management - Defender for Cloud in the Field video](episode-thirty-one.md).

articles/defender-for-cloud/data-aware-security-dashboard-overview.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: The data-aware security dashboard
3-
description: Learn about the capabilities and functions of the data-aware security view in Microsoft Defender for Cloud.
2+
title: The data security posture management dashboard
3+
description: Learn about the capabilities and functions of the data security posture management view in Microsoft Defender for Cloud.
44
ms.topic: conceptual
55
ms.date: 02/11/2024
66
---
@@ -88,13 +88,7 @@ You can select the **Manage data sensitivity settings** to get to the **Data sen
8888

8989
:::image type="content" source="media/data-aware-security-dashboard/manage-security-sensitivity-settings.png" alt-text="Screenshot that shows where to access managing data sensitivity settings." lightbox="media/data-aware-security-dashboard/manage-security-sensitivity-settings.png":::
9090

91-
### Data resources security status
92-
93-
**Sensitive resources status over time** - displays how data security evolves over time with a graph that shows the number of sensitive resources affected by alerts, attack paths, and recommendations within a defined period (last 30, 14, or 7 days).
94-
95-
:::image type="content" source="media/data-aware-security-dashboard/data-resources-security-status.png" alt-text="Screenshot that shows the data resources security status section of the data security view." lightbox="media/data-aware-security-dashboard/data-resources-security-status.png":::
96-
9791
## Next steps
9892

99-
- Learn more about [data-aware security posture](concept-data-security-posture.md).
93+
- Learn more about [data security posture management](concept-data-security-posture.md).
10094
- Learn how to [enable Defender CSPM](tutorial-enable-cspm-plan.md).

articles/defender-for-cloud/data-classification.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Within Defender for APIs inventory experience, you can search for sensitivity la
1818
## Explore API exposure through attack paths
1919

2020
When the Defender Cloud Security Posture Management (CSPM) plan is enabled, API attack paths let you discover and remediate the risk of API data
21-
exposure. For more information, see [Data security in Defender CSPM](concept-data-security-posture.md#data-security-in-defender-cspm).
21+
exposure. For more information, see [Data security posture management in Defender CSPM](concept-data-security-posture.md#data-security-posture-management-in-defender-cspm).
2222

2323
1. Select the API attack path **Internet exposed APIs that are unauthenticated carry sensitive data** and review the data path:
2424

articles/defender-for-cloud/data-security-posture-enable.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Enable data-aware security posture for Azure datastores
3-
description: Learn how to enable data-aware security posture in Defender for Cloud
2+
title: Enable data security posture management for Azure datastores
3+
description: Learn how to enable data security posture management in Defender for Cloud
44
author: dcurwin
55
ms.author: dacurwin
66
ms.service: defender-for-cloud
@@ -9,20 +9,20 @@ ms.date: 09/05/2023
99
ms.custom: template-how-to-pattern
1010
---
1111

12-
# Enable data-aware security posture
12+
# Enable data security posture management
1313

14-
This article describes how to enable [data-aware security posture](data-security-posture-enable.md) in Microsoft Defender for Cloud.
14+
This article describes how to enable [data security posture management](data-security-posture-enable.md) in Microsoft Defender for Cloud.
1515

1616
## Before you start
1717

18-
- Before you enable data-aware security posture, [review support and prerequisites](concept-data-security-posture-prepare.md).
19-
- When you enable Defender CSPM or Defender for Storage plans, the sensitive data discovery extension is automatically enabled. You can disable this setting if you don't want to use data-aware security posture, but we recommend that you use the feature to get the most value from Defender for Cloud.
18+
- Before you enable data security posture management, [review support and prerequisites](concept-data-security-posture-prepare.md).
19+
- When you enable Defender CSPM or Defender for Storage plans, the sensitive data discovery extension is automatically enabled. You can disable this setting if you don't want to use data security posture management, but we recommend that you use the feature to get the most value from Defender for Cloud.
2020
- Sensitive data is identified based on the data sensitivity settings in Defender for Cloud. You can [customize the data sensitivity settings](data-sensitivity-settings.md) to identify the data that your organization considers sensitive.
2121
- It takes up to 24 hours to see the results of a first discovery after enabling the feature.
2222

2323
## Enable in Defender CSPM (Azure)
2424

25-
Follow these steps to enable data-aware security posture. Don't forget to review [required permissions](concept-data-security-posture-prepare.md#whats-supported) before you start.
25+
Follow these steps to enable data security posture management. Don't forget to review [required permissions](concept-data-security-posture-prepare.md#whats-supported) before you start.
2626

2727
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
2828
1. Select the relevant Azure subscription.

articles/defender-for-cloud/data-security-review-risks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ ms.custom: template-how-to-pattern
1212

1313
After you [discover resources with sensitive data](data-security-posture-enable.md), Microsoft Defender for Cloud lets you explore sensitive data risk for those resources with these features:
1414

15-
- **Attack paths**: When sensitive data discovery is enabled in the Defender Cloud Security Posture Management (CSPM) plan, you can use attack paths to discover risk of data breaches. [Learn more](concept-data-security-posture.md#data-security-in-defender-cspm).
16-
- **Security Explorer**: When sensitive data discovery is enabled in the Defender CSPM plan, you can use Cloud Security Explorer to find sensitive data insights. [Learn more](concept-data-security-posture.md#data-security-in-defender-cspm).
15+
- **Attack paths**: When sensitive data discovery is enabled in the Defender Cloud Security Posture Management (CSPM) plan, you can use attack paths to discover risk of data breaches. For more information, see [Data security posture management in Defender CSPM](concept-data-security-posture.md#data-security-posture-management-in-defender-cspm).
16+
- **Security Explorer**: When sensitive data discovery is enabled in the Defender CSPM plan, you can use Cloud Security Explorer to find sensitive data insights. For more information, see [Data security posture management in Defender CSPM](concept-data-security-posture.md#data-security-posture-management-in-defender-cspm).
1717
- **Security alerts**: When sensitive data discovery is enabled in the Defender for Storage plan, you can prioritize and explore ongoing threats to sensitive data stores by applying sensitivity filters Security Alerts settings.
1818

1919
## Explore risks through attack paths

articles/defender-for-cloud/defender-for-cloud-glossary.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,9 +123,9 @@ Cloud Workload Protection Platform. See [CWPP](./overview-page.md).
123123

124124
## D
125125

126-
### Data Aware Security Posture
126+
### Data Security Posture Management
127127

128-
Data-aware security posture automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. Learn about [data-aware security posture](concept-data-security-posture.md).
128+
Data security posture management automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. Learn about [data security posture management](concept-data-security-posture.md).
129129

130130
### Defender sensor
131131

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Defender for Cloud includes Foundational CSPM capabilities for free. You can als
4747
| [Multicloud coverage](plan-multicloud-security-get-started.md) | Connect to your multicloud environments with agentless methods for CSPM insight and CWP protection. | Connect your [Amazon AWS](quickstart-onboard-aws.md) and [Google GCP](quickstart-onboard-gcp.md) cloud resources to Defender for Cloud | Foundational CSPM (Free) |
4848
| [Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) | Use the dashboard to see weaknesses in your security posture. | [Enable CSPM tools](enable-enhanced-security.md) | Foundational CSPM (Free) |
4949
| [Advanced Cloud Security Posture Management](concept-cloud-security-posture-management.md) | Get advanced tools to identify weaknesses in your security posture, including:</br>- Governance to drive actions to improve your security posture</br>- Regulatory compliance to verify compliance with security standards</br>- Cloud security explorer to build a comprehensive view of your environment | [Enable CSPM tools](enable-enhanced-security.md) | Defender CSPM |
50-
| [Data-aware Security Posture](concept-data-security-posture.md) | Data-aware security posture automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. | [Enable data-aware security posture](data-security-posture-enable.md) | Defender CSPM or Defender for Storage |
50+
| [Data Security Posture Management](concept-data-security-posture.md) | Data security posture management automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. | [Enable data security posture management](data-security-posture-enable.md) | Defender CSPM or Defender for Storage |
5151
| [Attack path analysis](concept-attack-path.md#what-is-attack-path-analysis) | Model traffic on your network to identify potential risks before you implement changes to your environment. | [Build queries to analyze paths](how-to-manage-attack-path.md) | Defender CSPM |
5252
| [Cloud Security Explorer](concept-attack-path.md#what-is-cloud-security-explorer) | A map of your cloud environment that lets you build queries to find security risks. | [Build queries to find security risks](how-to-manage-cloud-security-explorer.md) | Defender CSPM |
5353
| [Security governance](governance-rules.md) | Drive security improvements through your organization by assigning tasks to resource owners and tracking progress in aligning your security state with your security policy. | [Define governance rules](governance-rules.md) | Defender CSPM |

0 commit comments

Comments
 (0)