You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/manage-cloud-security-posture-management/includes/4-measure-enforce-regulatory-compliance.md
+7-10Lines changed: 7 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,20 @@
1
1
Microsoft Defender for Cloud continually compares the configuration of your resources with requirements in industry standards, regulations, and benchmarks. The regulatory compliance dashboard provides insights into your compliance posture based on how you're meeting specific compliance requirements.
2
2
3
-
4
-
:::image type="content" source="../media/compliance-dashboard.png" alt-text="Screenshot of the Regulatory compliance dashboard.":::
5
-
3
+
:::image type="content" source="../media/compliance-dashboard.png" alt-text="Screenshot of the Regulatory compliance dashboard." lightbox="../media/compliance-dashboard.png":::
6
4
7
5
## How are regulatory compliance standards represented in Defender for Cloud?
8
-
Industry standards, regulatory standards, and benchmarks are represented in Defender for Cloud's regulatory compliance dashboard. Each standard is an initiative defined in Azure Policy.
9
6
10
-
To see compliance data mapped as assessments in your dashboard, add a compliance standard to your management group or subscription from within the Security policy page.
7
+
Industry standards, regulatory standards, and benchmarks are represented in Defender for Cloud's regulatory compliance dashboard. Each standard is an initiative defined in Azure Policy.
11
8
12
-
When you've assigned a standard or benchmark to your selected scope, the standard appears in your regulatory compliance dashboard with all associated compliance data mapped as assessments. You can also download summary reports for any of the standards that have been assigned.
9
+
To see compliance data mapped as assessments in your dashboard, add a compliance standard to your management group or subscription from within the Security policy page.
13
10
14
-
Microsoft tracks the regulatory standards themselves and automatically improves its coverage in some of the packages over time. When Microsoft releases new content for the initiative, it will appear automatically in your dashboard as new policies mapped to controls in the standard.
11
+
When you've assigned a standard or benchmark to your selected scope, the standard appears in your regulatory compliance dashboard with all associated compliance data mapped as assessments. You can also download summary reports for any of the standards that are assigned.
15
12
13
+
Microsoft tracks the regulatory standards themselves and automatically improves its coverage in some of the packages over time. When Microsoft releases new content for the initiative, it appears automatically in your dashboard as new policies mapped to controls in the standard.
16
14
17
15
## What regulatory compliance standards are available in Defender for Cloud?
18
-
By default, every subscription has the **Azure Security Benchmark** assigned. This is the Microsoft-authored, Azure-specific guidelines for security and compliance best practices based on common compliance frameworks.
19
16
17
+
By default, every subscription has the **Microsoft Cloud Security Benchmark** assigned. This is the Microsoft-authored, Azure-specific guidelines for security, and compliance best practices based on common compliance frameworks.
20
18
21
19
Available regulatory standards:
22
20
@@ -37,11 +35,10 @@ Available regulatory standards:
37
35
- FedRAMP H
38
36
- FedRAMP M
39
37
40
-
41
38
## Add a regulatory standard to your dashboard
42
39
43
-
44
40
### Prerequisites
41
+
45
42
To add standards to your dashboard:
46
43
47
44
- The subscription must have Defender for Cloud's enhanced security features enabled
0 commit comments