Skip to content

Commit 643232c

Browse files
committed
new caps rules
1 parent bbbd2d9 commit 643232c

File tree

2 files changed

+19
-0
lines changed

2 files changed

+19
-0
lines changed

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,3 +110,7 @@ Current asset types are:
110110
| Immutable and Locked Azure Storage | Cloud resource | High | This rule applies to Azure storage accounts that have immutability support enabled with a locked policy. Immutability stores business data in a write once read many (WORM). Data protection is increased with a locked policy to ensure that data can’t be deleted or its retention time shortened. These settings usually indicate that the storage account holds critical or sensitive data that must be protected from modification or deletion. Data might also need to align with compliance policies for data protection. |
111111
| Azure Virtual Machine with a Critical User Signed-in | Cloud resource | High | This rule applies to virtual machines protected by Defender for Endpoint, where a user with a high or very high criticality level is signed in. The signed-in user can be through a joined or registered device, an active browser session, or other means. |
112112
| Azure Key Vaults with Many Connected Identities | Cloud resource | High | This rule identifies Key Vaults that can be accessed by a large number of identities, compared to other Key Vaults. This often indicates that the Key Vault is used by critical workloads, such as production services. |
113+
| Locked Azure Kubernetes service cluster | Cloud resource | Low | This is an Azure Kubernetes Service cluster that is safeguarded by a lock. Locks are used to protect assets from deletion and modifications. Usually, administrators use locks to safeguard critical cloud assets in their environment, and to protect them from accidental deletion and unauthorized modifications. |
114+
| Premium tier Azure Kubernetes Service cluster | Cloud resource | High | This rule applies to Azure Kubernetes Service clusters with premium tier cluster management. Premium tiers are recommended for running production or mission-critical workloads that need high availability and reliability. |
115+
| Azure Kubernetes service cluster with multiple nodes | Cloud resource | High | This rule applies to Azure Kubernetes Service clusters with a large number of nodes. This often indicates that the cluster is used for critical workloads, such as production workloads. |
116+
| Azure Arc cluster with multiple nodes | Cloud Resource | High | This rule applies to Azure Arc Kubernetes clusters with a large number of nodes. This often indicates that the cluster is used for critical workloads, such as production workloads. |

exposure-management/whats-new.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,19 @@ Learn more about MSEM by reading the blogs, [here](https://techcommunity.microso
2626
2727
## November 2024
2828

29+
### New predefined classifications
30+
31+
The following predefined classification rules were added to the critical assets list:
32+
33+
| Classification | Description |
34+
| :--------------------------------------------------- | :----------------------------------------------------------- |
35+
| Locked Azure Kubernetes Service cluster | This rule applies to Azure Kubernetes service clusters that are safeguarded by a lock. |
36+
| Premium tier Azure Kubernetes Service cluster | This rule applies to premium tier Azure Kubernetes service clusters. |
37+
| Azure Kubernetes Service cluster with multiple nodes | This rule applies to Azure Kubernetes service clusters with multiple nodes. |
38+
| Azure Arc Kubernetes cluster with multiple nodes | This rule applies to Azure Arc clusters with multiple nodes. |
39+
40+
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
41+
2942
### Announcing the General Availability of Microsoft Security Exposure Management
3043

3144
We are excited to announce the general availability of Microsoft Security Exposure Management. This powerful tool helps organizations focus on their most critical exposures and act swiftly. By integrating security insights across the entire digital estate, it provides a comprehensive view of risk posture, enabling faster, more informed decisions to reduce exposure before attackers can exploit it.
@@ -109,6 +122,8 @@ The following predefined classification rule was added to the critical assets li
109122
| ------------------------------------------------------------ | ------------------------------------------------------------ |
110123
| **Hyper-V Server** | This rule applies to devices identified as Hyper-V servers within a domain. These servers are essential for running and managing virtual machines within your infrastructure, serving as the core platform for their creation and management. |
111124

125+
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
126+
112127
### Enhanced visibility for scoped users
113128

114129
This change now allows users who have been granted access to only some of the organization's devices to see the list of affected assets in metrics, recommendations, events, and initiative history within their specific scope.

0 commit comments

Comments
 (0)