Skip to content

Commit 2b1f581

Browse files
committed
new attack path content
1 parent e2dfce8 commit 2b1f581

File tree

6 files changed

+53
-14
lines changed

6 files changed

+53
-14
lines changed
263 KB
Loading
248 KB
Loading
261 KB
Loading

exposure-management/review-attack-paths.md

Lines changed: 25 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,23 +25,40 @@ Security Exposure Management is currently in public preview.
2525
- If you don't have licenses defined for workloads integrated and represented in the attack path.
2626
- If you don't fully define critical assets.
2727

28-
## View attack paths
28+
### Attack path dashboard
2929

30-
1. To access [attack paths](https://security.microsoft.com/attack-paths), select **Attack surface -> Attack path**.
30+
The dashboard provides a comprehensive overview of all identified attack paths within the environment. It enables security teams to gain valuable insights into the types of paths identified, top entry points, target assets, and more, helping to prioritize risk mitigation efforts effectively. The overview includes:
3131

32-
:::image type="content" source="./media/review-attack-paths/attack-paths.png" alt-text="Screenshot of the Security Exposure Management attack path window" lightbox="media/review-attack-paths/attack-paths.png":::
32+
- Graph of attack paths over time
33+
- Top choke points
34+
- Top attack path scenarios
35+
- Top targets
36+
- Top entry points
37+
38+
:::image type="content" source="media/work-attack-paths-overview/attack-paths-dashboard.png" alt-text="Screenshot of attack path dashboard" lightbox="media/work-attack-paths-overview/attack-paths-dashboard.png":::
39+
40+
### View attack paths
41+
42+
1. You can access [attack paths](https://security.microsoft.com/attack-paths) from the attack path dashboard, or by selecting **Attack surface -> Attack path**.
43+
44+
:::image type="content" source="media/review-attack-paths/attack-path-list.png" alt-text="Screenshot of attack path list" lightbox="media/review-attack-paths/attack-path-list.png":::
3345

3446
1. To change how attack paths are displayed, you can select a heading name to sort by a specific column heading.
3547

36-
## Group by choke points
48+
### Group attack paths
49+
50+
To group attack paths by specific criteria:
3751

38-
To group by choke point:
52+
Select **Group** to group by **Attack path name**, **Entry point**,**Entry point type**, **Target type**, **Risk level**, **Status**, **Target criticality**, **Target**.
3953

40-
1. Select **Attack surface -> Attack path**.
54+
### View choke points and blast radius
4155

42-
1. Select **Group** to group by **Name**, **Entry point type**, **Target type**, **Target criticality**, **Status**, or **choke point**.
56+
1. Go the choke points tab to view a list of choke points on the attack path dashboard. By focusing on these choke points, you can reduce risk by addressing high-impact assets, thus preventing attackers from progressing through various paths.
57+
1. Select a choke point to open the side panel, select **View blast radius** and explore the attack paths from a choke point. The blast radius provides a detailed visualization showing how the compromise of one asset could affect others. This enables security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
58+
59+
:::image type="content" source="media/review-attack-paths/choke points and blast radius.png" alt-text="Screenshot of chock point and blast radius " lightbox="media/review-attack-paths/choke points and blast radius.png":::
4360

44-
## Examine an attack path
61+
### Examine an attack path
4562

4663
1. Select a specific attack path to examine it further for potential exploitable vulnerabilities.
4764

exposure-management/whats-new.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,19 @@ Security Exposure Management is currently in public preview.
2525
>
2626
> `https://aka.ms/msem/rss`
2727
28+
## October 2024
29+
30+
### New in attack paths
31+
32+
We have introduced four new features designed to enhance your security management and risk mitigation efforts. These features provide valuable insights into the attack paths identified within your environment, enabling you to prioritize risk mitigation strategies effectively and reduce the impact of potential threats.
33+
34+
The new features include:
35+
36+
- **Attack path widget on exposure management overview page**: Provides users with an at-a-glance, high-level view of discovered attack paths. It displays a timeline of newly identified paths, key entry points, target types, and more, ensuring security teams stay informed about emerging threats and can respond quickly.
37+
- **Attack path dashboard**: Provides a comprehensive overview of all identified attack paths within the environment. This feature enables security teams to gain valuable insights into the types of paths identified, top entry points, target assets, and more, helping to prioritize risk mitigation efforts effectively.
38+
- **Choke points**: Highlights critical assets that multiple attack paths intersect, identifying them as key vulnerabilities within the environment. By focusing on these choke points, security teams can efficiently reduce risk by addressing high-impact assets, thus preventing attackers from progressing through various paths.
39+
- **Blast radius**: Allows users to visually explore the paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
40+
2841
## September 2024
2942

3043
### New Enterprise IoT Security Initiative

exposure-management/work-attack-paths-overview.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,20 +20,29 @@ Security Exposure Management is currently in public preview.
2020

2121
[!INCLUDE [prerelease](../includes/prerelease.md)]
2222

23+
## Attack path dashboard
24+
25+
The attack path dashboard provides a high-level view of the attack paths in your organization. It shows the number of attack paths, the number of choke points, and the number of critical assets. You can use this information to understand the security posture of your organization and to prioritize your security efforts. From the dashboard, you can drill down into the details of the attack paths, choke points, and critical assets.
26+
27+
:::image type="content" source="media/work-attack-paths-overview/attack-paths-dashboard.png" alt-text="Screenshot of attack path dashboard" lightbox="media/work-attack-paths-overview/attack-paths-dashboard.png":::
28+
2329
## Identifying and resolving attack paths
2430

25-
Here's how Security Exposure Management helps you to identify and resolve attack paths.
31+
Here's how Exposure Management helps you to identify and resolve attack paths.
2632

2733
- **Attack path generation**: Security Exposure Management automatically generates attack paths based on the data collected across assets and workloads. It simulates attack scenarios, and identifies vulnerabilities and weaknesses that an attacker could exploit.
2834
- **Attack path visibility**: The attack path graph view uses [enterprise exposure graph](cross-workload-attack-surfaces.md) data to visualize the attack path to understand how potential threats might unfold.
2935
- Hovering over each node and connector icon provides you with additional information about how the attack path is build. For instance, from an initial virtual machine containing TLS/SSL keys all the way to permissions to storage accounts.
3036
- The [enterprise exposure map](enterprise-exposure-map.md) extends how you can visualize attack paths. Along with other data, it shows you multiple attack paths and choke points, nodes that create bottlenecks in the graph or map where attack paths converge. It visualizes exposure data, allowing you to see what assets are at risk, and where to prioritize your focus.
3137
- **Security recommendations**: Get actionable recommendations to mitigate potential attack paths.
32-
- **Choke point identification**: To manage choke points:
33-
- Security Exposure Management provides a way to group choke point nodes through which multiple attack paths flow, or where multiple attack paths intersect on the way to a critical asset.
34-
- Choke point visibility enables you to focus mitigation efforts strategically, addressing multiple attack paths by securing these critical points in the network.
35-
- Ensuring that choke points are secure protects your assets from threats.
36-
:::image type="content" source="./media/review-attack-paths/attack-paths-graph.png" alt-text="Screenshot of the graph visualization of attack path" lightbox="media/review-attack-paths/attack-paths-graph.png":::
38+
- **Choke points**: The attack path dashboard highlights critical assets where multiple attack paths intersect, identifying them as key vulnerabilities. By focusing on these choke points, security teams can efficiently reduce risk by addressing high-impact assets.
39+
40+
- **Identification**: View a list of choke points on the attack path dashboard.
41+
- **Grouping**: Security Exposure Management groups choke point nodes where multiple attack paths flow or intersect on the way to a critical asset.
42+
- **Strategic Mitigation**: Choke point visibility enables you to focus mitigation efforts strategically, addressing multiple attack paths by securing these critical points.
43+
- **Protection**: Ensuring that choke points are secure protects your assets from threats.
44+
- **Blast radius**: Allows users to visually explore the paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
45+
3746

3847
## Next steps
3948

0 commit comments

Comments
 (0)