Skip to content

Commit ec98fcb

Browse files
authored
Merge pull request #2040 from MicrosoftDocs/chrisda
Link fixes per build report
2 parents cb89194 + 36c1c93 commit ec98fcb

File tree

2 files changed

+14
-18
lines changed

2 files changed

+14
-18
lines changed

CloudAppSecurityDocs/posture-overview.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
2-
title: SaaS security posture management (SSPM) - overview
2+
title: SaaS security posture management (SSPM) - overview
33
description: Learn what is SaaS security posture management (SSPM) in Microsoft Defender for cloud apps
44
ms.topic: how-to
55
ms.date: 11/17/2024
66
---
77

8-
# SaaS security posture management (SSPM) - overview
8+
# SaaS security posture management (SSPM) - overview
99

1010
> [!NOTE]
1111
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation).
1212
13-
One of Microsoft Defender for Cloud Apps core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](../exposure-management/microsoft-security-exposure-management.md) once you have a connector to an application. For example:
13+
One of Microsoft Defender for Cloud Apps' core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
1414

1515
![Screenshot of the SalesForce recommendations in Secure Score.](media/security-saas-sspm-in-secure-score-salesforce-filter.png)
1616

@@ -20,10 +20,9 @@ One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Postur
2020

2121
- Your organization must have Microsoft Defender for Cloud Apps licenses.
2222
- Your app must be connected to Defender for Cloud Apps. For more information, see:
23+
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
24+
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
2325

24-
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
25-
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
26-
2726
## Turn on SaaS security recommendations
2827

2928
Follow these steps to ensure that your application connector is set to show data in Microsoft Security Exposure Management.
@@ -57,7 +56,7 @@ For more information, see [Assess your security posture with Microsoft Secure Sc
5756
> [!IMPORTANT]
5857
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations in [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above.
5958
60-
To effectively manage your organizations SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
59+
To effectively manage your organization's SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
6160

6261
- [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative)
6362

@@ -70,7 +69,6 @@ In addition you can find a variety of SSPM recommendations under different initi
7069
- Business Email Compromise - Financial fraud
7170
- Zero Trust (Foundational)
7271

73-
7472
## Next steps
7573

7674
> [!div class="nextstepaction"]

CloudAppSecurityDocs/saas-security-initiative.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ description: Learn how to use the "SaaS security initiative" in Microsoft XDR
44
ms.topic: how-to
55
ms.date: 10/31/2024
66
---
7-
# SaaS Security Initiative
7+
# SaaS Security Initiative
88

99
> [!NOTE]
1010
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD.
1111
1212
The SaaS Security Initiative provides a centralized place for SaaS security best practices, enabling organizations to manage and prioritize security recommendations effectively. By focusing on the most impactful metrics, organizations can enhance their SaaS security posture efficiently.
13-
![Screenshot of the SaaS security initiative home page.](<media\saas-securty-initiative\screenshot-of-the-saas-security-initiative-home-page.png>)
1413

14+
![Screenshot of the SaaS security initiative home page.](<media\saas-securty-initiative\screenshot-of-the-saas-security-initiative-home-page.png>)
1515

1616
## What is the SaaS Security Initiative?
1717

@@ -22,16 +22,16 @@ The SaaS Security Initiative serves as the main hub for SaaS Security Posture Ma
2222
- Your organization must have Microsoft Defender for Cloud Apps licenses.
2323
- The app which you wish to see security recommendations for, must be connected.
2424
- For more information, see:
25-
26-
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
27-
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
25+
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
26+
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
2827

2928
## Operational Guidelines
29+
3030
To initiate the process, navigate to the **Exposure Management** blade and select **Initiatives**. Click on the **SaaS Security** initiative and then select **Open Initiative Page**.
3131

32-
On this page, you'll find 12 measurable metrics that categorize hundreds of best practice recommendations.
32+
On this page, you'll find 12 measurable metrics that categorize hundreds of best practice recommendations.
3333

34-
It's recommended to prioritize metrics with the highest **Impact on Initiative Score**, which is a composite measure that considers both the **Weight** of each recommendation and the percentage of **Non-Compliant** recommendations. To effectively monitor progress, it's advisable to set a **target score** for your organizations security posture. This target will serve as a benchmark for improvement and help track advancements over time.
34+
It's recommended to prioritize metrics with the highest **Impact on Initiative Score**, which is a composite measure that considers both the **Weight** of each recommendation and the percentage of **Non-Compliant** recommendations. To effectively monitor progress, it's advisable to set a **target score** for your organization's security posture. This target will serve as a benchmark for improvement and help track advancements over time.
3535

3636
For instance, to gain visibility into all best practice recommendations pertaining to privileged access within SaaS applications, select the metric labeled **Missing Best Practices to Secure Privileged Access in SaaS Apps**.
3737

@@ -40,6 +40,4 @@ Once selected, you can click on any of the **Non-Compliant** recommendations to
4040
## Additional Information
4141

4242
- Each metric includes a list of associated app connectors, encouraging organizations to enable more connectors for enhanced visibility. If you're interested in recommendations for specific applications, navigate to the **Security Recommendations** tab and filter by the relevant application.
43-
- To learn more about Exposure Management initiatives visit [here](../exposure-management/initiatives.md).
44-
45-
43+
- To learn more about Exposure Management initiatives visit [here](/security-exposure-management/initiatives).

0 commit comments

Comments
 (0)