Skip to content

Commit 0cbcee0

Browse files
authored
Merge pull request #1520 from DebLanger/US319372_attack
new attack path content
2 parents 4963bf4 + 3d65209 commit 0cbcee0

File tree

8 files changed

+69
-33
lines changed

8 files changed

+69
-33
lines changed

exposure-management/exposure-insights-overview.md

Lines changed: 12 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -49,17 +49,15 @@ Security Exposure Management provides initiatives that currently include:
4949
> [!IMPORTANT]
5050
> Initiatives that are in preview are marked accordingly. Preview initiatives are still in development, and are subject to change.
5151
52-
5352
### Initiative elements
5453

5554
**Element** | **Goal** | **Details**
5655
--- | --- | ---
57-
**Initiative** | Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.| Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/> The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.
56+
**Initiative** | Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.| Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/> The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.
5857
**Metric** | Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.| Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.
5958
**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. | All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/> Within initiatives, recommendations are assigned a compliance state.
6059
**Events** | Events help you to monitor initiative changes. | Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.
6160

62-
6361
## Working with initiatives
6462

6563
You can prioritize which initiatives you want to see on the **Overview** dashboard. Review the initiative score, and drill down into initiatives to see associated metrics and understand where gaps or risks reside.
@@ -69,15 +67,15 @@ You can prioritize which initiatives you want to see on the **Overview** dashboa
6967
On the **Metrics** tab of an initiative, or in the **Metrics** section of **Exposure Insights**, you can see the metric state, its effect and relative importance in an initiative, and recommendations to improve the metric. For each metric you can:
7068

7169
- Review metrics properties, including:
72-
- **14-day trend**: Shows the metric value changes over the last 14 days.
73-
- **Affected items**: The number of items within the metric. In most cases, these items would be assets that are exposed or that create a risk factor. In other cases, affected items would be the number of missing Microsoft secure score points to effectively implement recommended controls.
74-
- **Total**: Total number of assets under the metric scope.
75-
- **Weight**: The relative weight (importance) of the metric within the initiative, and its effect on the initiative score. From one (lowest) to ten (highest).
76-
- **Score impact**: The impact that completing the metric (getting it to 0%) has on the security initiative. Meaning if a given metric is completed, the score impact is the addition seen to the initiative score.
77-
- **State**: Shows whether the metric needs attention, the risk was mitigated outside Security Exposure Management and shouldn't affect the initiative score, or was mitigated and the initiative score should be adjusted accordingly.
78-
- **Current value**: Current percentage of exposed assets within the total assets covered by the metric, with the state for each metric. Zero percent is best since there's no exposure, while 100% is worst.
79-
- **Recommendations**: Security recommendations associated with the metric.
80-
- **Last Updated** shows the last date the metric was updated.
70+
- **14-day trend**: Shows the metric value changes over the last 14 days.
71+
- **Affected items**: The number of items within the metric. In most cases, these items would be assets that are exposed or that create a risk factor. In other cases, affected items would be the number of missing Microsoft secure score points to effectively implement recommended controls.
72+
- **Total**: Total number of assets under the metric scope.
73+
- **Weight**: The relative weight (importance) of the metric within the initiative, and its effect on the initiative score. From one (lowest) to ten (highest).
74+
- **Score impact**: The impact that completing the metric (getting it to 0%) has on the security initiative. Meaning if a given metric is completed, the score impact is the addition seen to the initiative score.
75+
- **State**: Shows whether the metric needs attention, the risk was mitigated outside Security Exposure Management and shouldn't affect the initiative score, or was mitigated and the initiative score should be adjusted accordingly.
76+
- **Current value**: Current percentage of exposed assets within the total assets covered by the metric, with the state for each metric. Zero percent is best since there's no exposure, while 100% is worst.
77+
- **Recommendations**: Security recommendations associated with the metric.
78+
- **Last Updated** shows the last date the metric was updated.
8179

8280
- Filter metrics for specific findings.
8381
- Drill down into metrics to review and fix associated issues.
@@ -90,7 +88,6 @@ In some cases, metrics display grayed out because the underlying data for the me
9088

9189
Grayed out metrics aren't considered for score calculation.
9290

93-
9491
## Working with recommendations
9592

9693
Security Exposure Management ingests security recommendations from multiple sources, including Microsoft Defender for Cloud running the [Defender for Cloud Security Posture Management (CSPM) plan](/azure/defender-for-cloud/concept-cloud-security-posture-management), [Microsoft Secure Score](/defender-xdr/microsoft-secure-score), Microsoft threat analytics, and other Microsoft workloads. Security Exposure Management integrates all of these recommendations into a single security catalog.
@@ -122,7 +119,7 @@ Security Exposure Management uses secure score as one of its sources for initiat
122119

123120
The exposure state for a security initiative is reflected in the initiative score.
124121

125-
- **Initiatives with metrics**: For initiatives with metrics, the score is calculated based on the value and weight of metrics within the initiative.
122+
- **Initiatives with metrics**: For initiatives with metrics, the score is calculated based on the value and weight of metrics within the initiative.
126123
- **Initiatives without metrics**: For threat initiatives that don't have metrics, the initiative score is calculated in the same way that [Secure Score is calculated](/defender-xdr/microsoft-secure-score#how-recommended-actions-are-scored).
127124

128125
For initiatives with metrics:
@@ -139,7 +136,6 @@ On the **History** tab of an initiative, you can:
139136
- Filter for specific time points.
140137
- Drill down to specific changes.
141138

142-
143139
:::image type="content" source="media/exposure-insights-overview/initiatives-history.png" alt-text="Screenshot of the Initiative history tab showing the graph and dates of changes." lightbox="media/exposure-insights-overview/initiatives-history.png":::
144140

145141
When you drill down into a specific change, you can see the percentage effects of metrics in the initiative score, along with the change reason. Reasons include:
@@ -149,22 +145,19 @@ When you drill down into a specific change, you can see the percentage effects o
149145
- **Metric removed** - The metric is no longer relevant for that specific initiative. For instance, if a better suggestion is introduced or it becomes irrelevant.
150146
- **Metric depreciated** - The metric is removed globally.
151147

152-
153148
Selecting the metric that changed provides more details about the change. For instance, it might display the new weight of a property change, or the number of affected assets before or after the change.
154149

155150
:::image type="content" source="media/exposure-insights-overview/initiatives-history-details.png" alt-text="Screenshot of the metric change side panel in the Initiatives history tab." lightbox="media/exposure-insights-overview/initiatives-history-details.png":::
156151

157152
You can't control the metric or score changes in advance.
158153

159-
160154
## Reviewing events
161155

162-
163156
Events measure the score drop or worsening in the metric status. Events include:
164157

165158
- **Metric score drop events**: These events are issued with there's a decrease of at least 2% in metric score (exposure grew by 2%) since yesterday.
166159
- **Initiative score drop events**: These events are issued when there's a decrease of at least 2% in initiative score since yesterday.
167-
- **New Initiave event**: These events are issued when a new inititave is available in MSEM.
160+
- **New Initiative event**: These events are issued when a new initiative is available in MSEM.
168161

169162
## Next steps
170163

263 KB
Loading
248 KB
Loading
41.1 KB
Loading
261 KB
Loading

exposure-management/review-attack-paths.md

Lines changed: 27 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,23 +25,42 @@ Security Exposure Management is currently in public preview.
2525
- If you don't have licenses defined for workloads integrated and represented in the attack path.
2626
- If you don't fully define critical assets.
2727

28-
## View attack paths
28+
### Attack path dashboard
2929

30-
1. To access [attack paths](https://security.microsoft.com/attack-paths), select **Attack surface -> Attack path**.
30+
The dashboard provides a high-level overview of all identified attack paths within the environment. It enables security teams to gain valuable insights into the types of paths identified, top entry points, target assets, and more, helping to prioritize risk mitigation efforts effectively. The overview includes:
3131

32-
:::image type="content" source="./media/review-attack-paths/attack-paths.png" alt-text="Screenshot of the Security Exposure Management attack path window" lightbox="media/review-attack-paths/attack-paths.png":::
32+
- Graph of attack paths over time
33+
- Top choke points
34+
- Top attack path scenarios
35+
- Top targets
36+
- Top entry points
37+
38+
:::image type="content" source="media/work-attack-paths-overview/attack-paths-dashboard.png" alt-text="Screenshot of attack path dashboard" lightbox="media/work-attack-paths-overview/attack-paths-dashboard.png":::
39+
40+
### View attack paths
41+
42+
1. You can access [attack paths](https://security.microsoft.com/attack-paths) from the attack path dashboard, or by selecting **Attack surface -> Attack path**.
43+
44+
:::image type="content" source="media/review-attack-paths/attack-path-list.png" alt-text="Screenshot of attack path list" lightbox="media/review-attack-paths/attack-path-list.png":::
3345

3446
1. To change how attack paths are displayed, you can select a heading name to sort by a specific column heading.
3547

36-
## Group by choke points
48+
### Group attack paths
49+
50+
To group attack paths by specific criteria:
51+
52+
Select **Group** to group by **Attack path name**, **Entry point**,**Entry point type**, **Target type**, **Risk level**, **Status**, **Target criticality**, **Target**.
3753

38-
To group by choke point:
54+
### View choke points and blast radius
3955

40-
1. Select **Attack surface -> Attack path**.
56+
1. Go the choke points tab to view a list of choke points on the attack path dashboard. By focusing on these choke points, you can reduce risk by addressing high-impact assets, thus preventing attackers from progressing through various paths.
57+
1. Select a choke point to open the side panel, select **View blast radius** and explore the attack paths from a choke point. The blast radius provides a detailed visualization showing how the compromise of one asset could affect others. This enables security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
58+
59+
:::image type="content" source="media/review-attack-paths/choke points and blast radius.png" alt-text="Screenshot of choke point and blast radius " lightbox="media/review-attack-paths/choke points and blast radius.png":::
4160

42-
1. Select **Group** to group by **Name**, **Entry point type**, **Target type**, **Target criticality**, **Status**, or **choke point**.
61+
:::image type="content" source="media/review-attack-paths/choke-points on map.png" alt-text="Screenshot of choke point on attack map" lightbox="media/review-attack-paths/choke-points on map.png":::
4362

44-
## Examine an attack path
63+
### Examine an attack path
4564

4665
1. Select a specific attack path to examine it further for potential exploitable vulnerabilities.
4766

exposure-management/whats-new.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,21 @@ Security Exposure Management is currently in public preview.
2525
>
2626
> `https://aka.ms/msem/rss`
2727
28+
## October 2024
29+
30+
### New in attack paths
31+
32+
We have introduced four new features designed to enhance your security management and risk mitigation efforts. These features provide valuable insights into the attack paths identified within your environment, enabling you to prioritize risk mitigation strategies effectively and reduce the impact of potential threats.
33+
34+
The new features include:
35+
36+
- **Attack path widget on exposure management overview page**: Provides users with an at-a-glance, high-level view of discovered attack paths. It displays a timeline of newly identified paths, key entry points, target types, and more, ensuring security teams stay informed about emerging threats and can respond quickly.
37+
- **Attack path dashboard**: Provides a high-level overview of all identified attack paths within the environment. This feature enables security teams to gain valuable insights into the types of paths identified, top entry points, target assets, and more, helping to prioritize risk mitigation efforts effectively.
38+
- **Choke points**: Highlights critical assets that multiple attack paths intersect, identifying them as key vulnerabilities within the environment. By focusing on these choke points, security teams can efficiently reduce risk by addressing high-impact assets, thus preventing attackers from progressing through various paths.
39+
- **Blast radius**: Allows users to visually explore the paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
40+
41+
For more information, see [Overview of attack paths](work-attack-paths-overview.md).
42+
2843
## September 2024
2944

3045
### New Enterprise IoT Security Initiative

exposure-management/work-attack-paths-overview.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,15 @@ Security Exposure Management is currently in public preview.
2020

2121
[!INCLUDE [prerelease](../includes/prerelease.md)]
2222

23+
## Attack path dashboard
24+
25+
The attack path dashboard provides a high-level view of the attack paths in your organization. It shows the number of attack paths, the number of choke points, and the number of critical assets. You can use this information to understand the security posture of your organization and to prioritize your security efforts. From the dashboard, you can drill down into the details of the attack paths, choke points, and critical assets.
26+
27+
:::image type="content" source="media/work-attack-paths-overview/attack-paths-dashboard.png" alt-text="Screenshot of attack path dashboard" lightbox="media/work-attack-paths-overview/attack-paths-dashboard.png":::
28+
2329
## Identifying and resolving attack paths
2430

25-
Here's how Security Exposure Management helps you to identify and resolve attack paths.
31+
Here's how Exposure Management helps you to identify and resolve attack paths.
2632

2733
- **Attack path generation**: Security Exposure Management automatically generates attack paths based on the data collected across assets and workloads. It simulates attack scenarios, and identifies vulnerabilities and weaknesses that an attacker could exploit.
2834
- The number of attack paths visible in the portal can fluctuate due to the dynamic nature of IT environments. Our system dynamically generates attack paths based on the real-time conditions of each customer's environment. Changes such as the addition or removal of assets, updates to configurations, a user logging on or off from a machine, a user added or removed to a group, and the implementation of new network segmentation or security policies can all influence the number and types of attack paths identified.
@@ -31,11 +37,14 @@ Here's how Security Exposure Management helps you to identify and resolve attack
3137
- Hovering over each node and connector icon provides you with additional information about how the attack path is build. For instance, from an initial virtual machine containing TLS/SSL keys all the way to permissions to storage accounts.
3238
- The [enterprise exposure map](enterprise-exposure-map.md) extends how you can visualize attack paths. Along with other data, it shows you multiple attack paths and choke points, nodes that create bottlenecks in the graph or map where attack paths converge. It visualizes exposure data, allowing you to see what assets are at risk, and where to prioritize your focus.
3339
- **Security recommendations**: Get actionable recommendations to mitigate potential attack paths.
34-
- **Choke point identification**: To manage choke points:
35-
- Security Exposure Management provides a way to group choke point nodes through which multiple attack paths flow, or where multiple attack paths intersect on the way to a critical asset.
36-
- Choke point visibility enables you to focus mitigation efforts strategically, addressing multiple attack paths by securing these critical points in the network.
37-
- Ensuring that choke points are secure protects your assets from threats.
38-
:::image type="content" source="./media/review-attack-paths/attack-paths-graph.png" alt-text="Screenshot of the graph visualization of attack path" lightbox="media/review-attack-paths/attack-paths-graph.png":::
40+
- **Choke points**: The attack path dashboard highlights critical assets where multiple attack paths intersect, identifying them as key vulnerabilities. By focusing on these choke points, security teams can efficiently reduce risk by addressing high-impact assets.
41+
42+
- **Identification**: View a list of choke points on the attack path dashboard.
43+
- **Grouping**: Security Exposure Management groups choke point nodes where multiple attack paths flow or intersect on the way to a critical asset.
44+
- **Strategic Mitigation**: Choke point visibility enables you to focus mitigation efforts strategically, addressing multiple attack paths by securing these critical points.
45+
- **Protection**: Ensuring that choke points are secure protects your assets from threats.
46+
- **Blast radius**: Allows users to visually explore the paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
47+
3948

4049
## Next steps
4150

0 commit comments

Comments
 (0)