Skip to content

Commit 8d84931

Browse files
Merge pull request #312824 from n-bajaj/patch-21
Added security insights for DBs and web apps
2 parents 956aaf1 + 62bd461 commit 8d84931

1 file changed

Lines changed: 96 additions & 9 deletions

File tree

articles/migrate/insights-overview.md

Lines changed: 96 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,9 @@ This article describes the **Insights** (preview) feature in Azure Migrate, whic
2020
- Review security risks in your datacenter early during migration planning.
2121
- Plan mitigation to fix security issues and make your migration to Azure smooth and secure.
2222
- Identify and plan upgrade of Windows and Linux servers with end of support operating system, end of support software and pending updates.
23-
- Detect vulnerabilities in discovered software and take action to remediate risks.
23+
- Detect vulnerabilities in servers, databases, web apps and discovered software and take action to remediate risks.
2424
- Identify servers without security or patch management software, and plan to configure [Microsoft Defender for Cloud](/azure/defender-for-cloud/) and [Azure Update Manager](../update-manager/overview.md).
25+
- Review and plan upgrade of databases running on end of support database platform and web apps with end of support runtime.
2526

2627
## Security Insights data
2728

@@ -39,6 +40,12 @@ Azure Migrate currently focuses on a core set of security risk areas. Each area
3940
| Software | With security risks | Software with at least one of the security risks – end of support, vulnerabilities. |
4041
| | End of support | Software declared end of support by vendor. |
4142
| | With vulnerabilities| Software with known vulnerability (CVE). |
43+
| Databases | With security risks | Database with at least one of the security risks in database platform – end of support, vulnerabilities. |
44+
| | End of support | Databases with end of support database platform. |
45+
| | With vulnerabilities| Databases with known vulnerability (CVE) in database platform. |
46+
| Web apps | With security risks | Web apps with at least one of the security risks in framework/runtime – end of support, vulnerabilities. |
47+
| | End of support | Web apps with end of support framework/runtime. |
48+
| | With vulnerabilities| Web apps with known vulnerability (CVE) in framework/runtime. |
4249

4350
## How are Insights derived
4451

@@ -49,9 +56,9 @@ Azure Migrate identifies potential security risks in your datacenter using softw
4956
5057
Security risks are derived through a series of following analyses:
5158

52-
- **End-of-support software**: Azure Migrate checks the versions of discovered software against the publicly available [endoflife.date](https://endoflife.date/) repository. All end of life data is refreshed every 7 days. If software is found to be end of support (meaning the vendor no longer provides security updates), it flags it as a security risk. Identifying unsupported software early helps you plan upgrades or mitigations as part of your cloud migration.
59+
- **End-of-support**: Azure Migrate checks the versions of discovered Operating system, software, database platform and web app runtime against the publicly available [endoflife.date](https://endoflife.date/) repository. All end of life data is refreshed every 7 days. If software is found to be end of support (meaning the vendor no longer provides security updates), it flags it as a security risk. Similarly, a database instance is flagged as security risk if the database platform is end of support. Likewise, a web app is marked with security risk when it is built on a framework/runtime that is no longer supported. Identifying unsupported resources early helps you plan upgrade or mitigation as part of your cloud migration.
5360

54-
- **Vulnerabilities**: Azure Migrate identifies installed software and operating system (OS) for each server. It maps the discovered software and OS to CPE nomenclature (Common Platform Enumeration) using AI model, which provides a unique identification for each software version. It stores only software metadata (name, publisher, version) and doesn't capture any organization-specific information. Azure Migrate correlates the CPE names with known CVE IDs (Common Vulnerabilities and Exposures). CVE IDs are unique identifiers assigned to publicly disclosed cybersecurity vulnerabilities and help organizations identify and track vulnerabilities in a standard way. Refer to [CVE](https://www.cve.org/) for more details. Information about CVE IDs and related software comes from the publicly available [National Vulnerability Database](https://nvd.nist.gov/) (NVD), managed by NIST. This helps identify vulnerabilities in the software. Each vulnerability is categorized by risk level (Critical, High, Medium, Low) based on the [CVSS](https://nvd.nist.gov/vuln-metrics/cvss) score provided by NVD. This feature uses the NVD API but is not endorsed or certified by the NVD. All CVE data from NVD is refreshed every 7 days.
61+
- **Vulnerabilities**: Azure Migrate identifies installed software and operating system (OS) for each server. It maps the discovered software, OS, database platform and web app runtime to CPE nomenclature (Common Platform Enumeration) using AI model, which provides a unique identification for each version. Azure Migrate stores only software metadata (name, publisher, version) and doesn't capture any organization-specific information. It correlates the CPE names with known CVE IDs (Common Vulnerabilities and Exposures). CVE IDs are unique identifiers assigned to publicly disclosed cybersecurity vulnerabilities and help organizations identify and track vulnerabilities in a standard way. Refer to [CVE](https://www.cve.org/) for more details. Information about CVE IDs and related software comes from the publicly available [National Vulnerability Database](https://nvd.nist.gov/) (NVD), managed by NIST. This helps identify vulnerabilities in the software, operating system, database instance and web app. Each vulnerability is categorized by risk level (Critical, High, Medium, Low) based on the [CVSS](https://nvd.nist.gov/vuln-metrics/cvss) score provided by NVD. This feature uses the NVD API but is not endorsed or certified by the NVD. All CVE data from NVD is refreshed every 7 days.
5562

5663
- **Pending updates for servers**: Azure Migrate identifies machines that are not fully patched or updated based on [Windows Update](/windows/deployment/update/windows-update-overview) metadata for Windows servers and Linux package manager metadata for Linux servers. It also retrieves the classification of these updates (Critical, Security, Other updates) and shows them for further consideration. Azure Migrate refreshes data from Windows Updates and Linux package managers every 24 hours. This insight appears as Servers with pending security and critical updates, indicating that the server is not fully patched and should be updated.
5764

@@ -66,12 +73,24 @@ Use the following formula to calculate number of security risks for a server:
6673
OS end-of-support flag + Software end-of-support flag + Number of vulnerabilities + Number of pending critical and security updates + Security software flag + Patch management software flag
6774

6875
- **OS end-of-support flag** = 1 if the server operating system is at end of support; otherwise, 0.
69-
- **Software end-of-support flag** = 1 if the software is at end of support; otherwise, 0.
76+
- **Software end-of-support flag** = 1 if the software is end of support; otherwise, 0.
7077
- **Number of vulnerabilities** = Count of CVEs identified for the server.
7178
- **Number of pending critical and security updates** = Pending updates for Windows and Linux servers that are classified as Critical or Security.
7279
- **Security software flag** = 1 if no software belonging to the Security category was discovered on the server; otherwise, 0.
7380
- **Patch management software flag** = 1 if no software belonging to the Patch Management sub-category was discovered on the server; otherwise, 0.
74-
81+
82+
On similar lines, number of security risks for a database instance is calculated as:
83+
Database platform end-of-support flag + Number of vulnerabilities
84+
85+
- **Database platform end-of-support flag** = 1 if the database platform is end of support; otherwise, 0.
86+
- **Number of vulnerabilities** = Count of CVEs identified for the Database platform.
87+
88+
In the same way, number of security risks for a web app is calculated as:
89+
Runtime end-of-support flag + Number of vulnerabilities
90+
91+
- **Runtime end-of-support flag** = 1 if the web app runtime version is end of support; otherwise, 0.
92+
- **Number of vulnerabilities** = Count of CVEs identified for the runtime version.
93+
7594
>[!Note]
7695
> Security insights in Azure Migrate help guide and highlight potential security risks in the datacenter. They are not meant to be compared with specialized security tools. We recommend to adopt Azure services such as, [Microsoft Defender for Cloud](/azure/defender-for-cloud/) and [Azure Update Manager](../update-manager/overview.md) for comprehensive protection of your hybrid environment.
7796
@@ -117,13 +136,21 @@ The **Servers card** shows a summary of all discovered servers with security ris
117136

118137
### Review Software risk assessment
119138

120-
The **Software Card** shows a summary of all discovered software with security risks. Software is flagged as at risk if it is either end-of-support or has known vulnerabilities (CVEs). The card displays the number of end-of-support software and software with vulnerabilities as fractions of the total software with security risks.
139+
The **Software card** shows a summary of all discovered software with security risks. Software is flagged to be at risk if it is either end-of-support or has known vulnerabilities (CVEs). The card displays the number of end-of-support software and software with vulnerabilities as fractions of the total software with security risks.
121140

122141
:::image type="content" source="./media/security-insights-overview/software-card.png" alt-text="Screenshot provides aggregated view of all software with security risks out of total discovered software." lightbox="./media/security-insights-overview/software-card.png":::
123142

143+
### Review Database risk assessment
144+
145+
The **Database instances card** shows a summary of all database instances with security risks. Database instance is flagged to be at risk if its database platform is either end-of-support or has known vulnerabilities (CVEs). The card displays the number of database instances on end-of-support platform and database instances with vulnerabilities as fractions of total database instances with security risks.
146+
147+
### Review Web apps risk assessment
148+
149+
The **Web apps card** shows a summary of all web apps with security risks. Web app is flagged to be at risk if its runtime is either end-of-support or has known vulnerabilities (CVEs). The card displays the number of web apps with end-of-support runtime and web apps with vulnerabilities as fractions of total web apps with security risks.
150+
124151
## Review detailed Security Insights
125152

126-
To review detailed security risks for Servers and Software, perform the following actions:
153+
To review detailed security risks for Servers, Software, Database instances and Web apps, perform the following actions:
127154

128155
### Review Servers with security risks
129156

@@ -166,7 +193,7 @@ To review software with identified security risks, follow these steps:
166193

167194
:::image type="content" source="./media/security-insights-overview/metadata-export-view.png" alt-text="Screenshot shows detailed list of discovered software and its metadata." lightbox="./media/security-insights-overview/metadata-export-view.png":::
168195

169-
1. To view software with specific security risks, go to the **Insights** (preview) pane. here, you see a detailed list of software affected due to the following issues:
196+
1. To view software with specific security risks, go to the **Insights** (preview) pane. Here, you see a detailed list of software affected due to the following issues:
170197

171198
- End-of-support status
172199
- Known vulnerabilities (CVEs)
@@ -193,6 +220,66 @@ To view detailed security insights for a specific server:
193220

194221
:::image type="content" source="./media/security-insights-overview/pending-updates.png" alt-text="Screenshot shows the pending updates and vulnerabilities." lightbox="./media/security-insights-overview/pending-updates.png":::
195222

223+
### Review Database instances with security risks
224+
225+
To review Database instances with identified security risks, follow these steps:
226+
227+
1. Go to the **Insights** (preview) pane.
228+
1. In the **Database instances** card, select the link that shows the number of Database instances with security risks.
229+
230+
231+
232+
1. You can view the detailed list of database instances, examine associated metadata, and export the data as a .csv file.
233+
234+
235+
236+
1. To view database instances with specific security risks, go to the **Insights** (preview) pane. Here, you see a detailed list of database instances affected due to the following issues:
237+
238+
- End-of-support database platform
239+
- Known vulnerabilities (CVEs) in database platform
240+
241+
242+
### Review detailed Security Insights for a Database instance
243+
244+
To view detailed security insights for a specific Database instance:
245+
246+
1. Go to the **Databases** pane from the left menu and select the database instance you want to review.
247+
1. Select the **Insights** (preview) tab.
248+
The tab displays security insights for the selected database instance, including:
249+
- Database platform support status
250+
- Known vulnerabilities (CVEs) in database platform
251+
252+
253+
### Review Web apps with security risks
254+
255+
To review web apps with identified security risks, follow these steps:
256+
257+
1. Go to the **Insights** (preview) pane.
258+
1. In the **Web apps** card, select the link that shows the number of Web apps with security risks.
259+
260+
261+
262+
1. You can view the detailed list of Web apps, examine associated metadata, and export the data as a .csv file.
263+
264+
265+
266+
1. To view Web apps with specific security risks, go to the **Insights** (preview) pane. Here, you see a detailed list of Web apps affected due to the following issues:
267+
268+
- End-of-support runtime/framework
269+
- Known vulnerabilities (CVEs) in runtime/framework
270+
271+
272+
### Review detailed Security Insights for a Web app
273+
274+
To view detailed security insights for a specific Web app:
275+
276+
1. Go to the **Web apps** pane from the left menu and select the web app you want to review.
277+
1. Select the **Insights** (preview) tab.
278+
The tab displays security insights for the selected web app, including:
279+
- Runtime support status
280+
- Known vulnerabilities (CVEs) in runtime
281+
282+
196283
## Manage permissions for Security Insights
197284

198285
Security insights are enabled by default for all users. To manage access, create [custom roles](/azure/role-based-access-control/custom-roles-portal#step-3-basics) and remove the following permissions:
@@ -220,7 +307,7 @@ Below error message is displayed when a user does not have permissions to view I
220307

221308
Azure offers integrated solutions to identify and mitigate security risks and strengthen cloud security posture:
222309

223-
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) delivers unified security management and advanced threat protection. It continuously evaluates resources for misconfigurations and vulnerabilities, providing actionable recommendations to harden your infrastructure. By aligning with industry compliance standards, it ensures your workloads remain secure and compliant.
310+
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) delivers unified security management and advanced threat protection. It continuously evaluates resources for misconfigurations and vulnerabilities, providing actionable recommendations to harden your infrastructure. By aligning with industry compliance standards, it ensures your resources remain secure and compliant.
224311
- [Azure Update Manager](/azure/update-manager/overview) streamlines operating system patching without additional infrastructure. It automates update schedules to minimize security risks from unpatched systems and offers detailed compliance reporting. With granular control over deployments, it helps maintain system integrity and resilience against evolving threats.
225312

226313
## Next steps

0 commit comments

Comments
 (0)