Skip to content

Commit fa5064f

Browse files
Merge pull request #4472 from DebLanger/patch-1
Update posture-overview.md
2 parents 6da0a13 + 63616c9 commit fa5064f

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

CloudAppSecurityDocs/posture-overview.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: SaaS security posture management (SSPM) - overview
33
description: Learn what is SaaS security posture management (SSPM) in Microsoft Defender for cloud apps
44
ms.topic: how-to
5-
ms.date: 10/31/2024
5+
ms.date: 11/17/2024
66
---
77

88
# SaaS security posture management (SSPM) - overview
99

1010
> [!NOTE]
11-
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
11+
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation).
1212
13-
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments may be configured in a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown via [Microsoft Security Exposure Management](https://learn.microsoft.com/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
13+
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](https://learn.microsoft.com/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
1414

1515
![Screenshot of the SalesForce recommendations in Secure Score.](media/security-saas-sspm-in-secure-score-salesforce-filter.png)
1616

@@ -26,23 +26,23 @@ One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Postur
2626

2727
## Turn on SaaS security recommendations
2828

29-
This procedure describes how to ensure that your application connector is set to show data in Microsoft Security Exposure Management.
29+
Follow these steps to ensure that your application connector is set to show data in Microsoft Security Exposure Management.
3030

3131
1. In Microsoft Defender XDR, select **Settings** > **Cloud Apps** > **Connected apps** > **App Connectors**.
3232

3333
1. Use the filter to locate the application where you want to turn on security recommendations.
3434

35-
1. Open the instance drawer and note whether 'Security recommendations' are turned on or off. For example, the following screenshot shows that 'Security recommendations' are turned on for **Okta Contoso EU** instance:
35+
1. Open the instance drawer and note whether 'Security recommendations' are turned on or off. For example, the following example shows that 'Security recommendations' are turned on for **Okta Contoso EU** instance:
3636
![Screenshot of an instance where Secure Score recommendations are turned on.](<media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png>)
3737

3838
If the instance is currently set to **Off**, select the **...** options menu and then select **Turn on 'Security recommendations'**. For example:
3939
![Screenshot of the Turn on Secure Score or 'Exposure management' recommendations option.](<media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png>)
4040

4141
> [!NOTE]
42-
> In case you have multiple instances of the same app, you can send security recommendations for each instance separately.
42+
> If you have multiple instances of the same app, you can send security recommendations for each instance separately.
4343
Security recommendations for the selected instance are added to Microsoft Security Exposure Management in addition to the current recommendations.
4444

45-
Security recommendations are shown automatically in [Microsoft Security Exposure Management](/microsoft-365/security/defender/microsoft-secure-score). Recommendations are based on Microsoft benchmarks, and may take up to 24 hours to update.
45+
Security recommendations are shown automatically in [Microsoft Security Exposure Management](/microsoft-365/security/defender/microsoft-secure-score). Recommendations are based on Microsoft benchmarks, and might take up to 24 hours to update.
4646

4747
In Microsoft Secure Score, filter the **Recommended actions** tab by product to view any recommended actions. If you have multiple instances of an app, you can select to filter recommendations from specific instances only. For example:
4848

@@ -52,11 +52,10 @@ Select a recommendation and then select the **Implementation** tab in the detail
5252

5353
For more information, see [Assess your security posture with Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score-improvement-actions).
5454

55-
5655
## How to manage your organization SaaS security posture
5756

5857
> [!IMPORTANT]
59-
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above
58+
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations in [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above.
6059
6160
To effectively manage your organization’s SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
6261

0 commit comments

Comments
 (0)