Skip to content

Commit f632a85

Browse files
Merge pull request #257886 from dcurwin/wi-159239-containers-ignite-nov7-2023
Container VA powered by MDVM GA
2 parents 38a50f7 + ccbc740 commit f632a85

19 files changed

Lines changed: 269 additions & 293 deletions

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -875,6 +875,11 @@
875875
"redirect_url": "/azure/defender-for-cloud/defender-for-dns-introduction",
876876
"redirect_document_id": true
877877
},
878+
{
879+
"source_path_from_root": "/articles/defender-for-cloud/support-agentless-containers-posture.md",
880+
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-containers",
881+
"redirect_document_id": false
882+
},
878883
{
879884
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
880885
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

articles/defender-for-cloud/TOC.yml

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -146,11 +146,9 @@
146146
displayName: coverage, machines, windows, linux, multicloud, supported features,
147147
endpoint protections
148148
href: support-matrix-defender-for-servers.md
149-
- name: Defender for Containers support matrices
149+
- name: Support matrices for Containers
150150
displayName: Containers, features availability, environment information
151151
href: support-matrix-defender-for-containers.md
152-
- name: Defender for Containers CSPM support matrices
153-
href: support-agentless-containers-posture.md
154152
- name: Protect multicloud resources
155153
items:
156154
- name: The Defender for Cloud multicloud solution
@@ -238,9 +236,9 @@
238236
href: concept-data-security-posture-prepare.md
239237
- name: Data security dashboard
240238
href: data-aware-security-dashboard-overview.md
241-
- name: Improve your container security posture
239+
- name: Improve your container security posture with Defender CSPM
242240
items:
243-
- name: Agentless container posture
241+
- name: Agentless container posture in Defender CSPM
244242
href: concept-agentless-containers.md
245243
- name: Security recommendations
246244
items:
@@ -444,7 +442,7 @@
444442
- name: Overview
445443
displayName: auto, provisioning, auto-provisioning, Settings & monitoring
446444
href: monitoring-components.md
447-
- name: Azure Monitor Agent in Defender for Cloud
445+
- name: Deploy the Azure Monitor agent
448446
displayName: AMA, Azure monitor agent
449447
href: auto-deploy-azure-monitoring-agent.md
450448
- name: Working with the Log Analytics agent
@@ -483,7 +481,7 @@
483481
- name: Overview
484482
displayName: auto, provisioning, auto-provisioning, Settings & monitoring
485483
href: monitoring-components.md
486-
- name: Azure Monitor Agent in Defender for Cloud
484+
- name: Deploy the Azure Monitor agent
487485
displayName: AMA, Azure monitor agent
488486
href: auto-deploy-azure-monitoring-agent.md
489487
- name: Working with the Log Analytics agent

articles/defender-for-cloud/agentless-container-registry-vulnerability-assessment.md

Lines changed: 14 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,16 @@ In every subscription where this capability is enabled, all images stored in ACR
1818

1919
Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerability Management) has the following capabilities:
2020

21-
- **Scanning OS packages** - container vulnerability assessment has the ability to scan vulnerabilities in packages installed by the OS package manager in Linux. See the [full list of the supported OS and their versions](support-matrix-defender-for-containers.md#registries-and-images-for-azure---powered-by-mdvm).
22-
- **Language specific packages** – support for language specific packages and files, and their dependencies installed or copied without the OS package manager. See the [complete list of supported languages](support-matrix-defender-for-containers.md#registries-and-images-for-azure---powered-by-mdvm).
21+
- **Scanning OS packages** - container vulnerability assessment has the ability to scan vulnerabilities in packages installed by the OS package manager in Linux. See the [full list of the supported OS and their versions](support-matrix-defender-for-containers.md#registries-and-images-support-for-azure---vulnerability-assessment-powered-by-mdvm).
22+
- **Language specific packages** – support for language specific packages and files, and their dependencies installed or copied without the OS package manager. See the [complete list of supported languages](support-matrix-defender-for-containers.md#registries-and-images-support-for-azure---vulnerability-assessment-powered-by-mdvm).
2323
- **Image scanning in Azure Private Link** - Azure container vulnerability assessment provides the ability to scan images in container registries that are accessible via Azure Private Links. This capability requires access to trusted services and authentication with the registry. Learn how to [allow access by trusted services](/azure/container-registry/allow-access-trusted-services).
2424
- **Exploitability information** - Each vulnerability report is searched through exploitability databases to assist our customers with determining actual risk associated with each reported vulnerability.
2525
- **Reporting** - Container Vulnerability Assessment for Azure powered by Microsoft Defender Vulnerability Management (MDVM) provides vulnerability reports using following recommendations:
2626

2727
| Recommendation | Description | Assessment Key
2828
|--|--|--|
29-
| [Container registry images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)-Preview](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c0b7cfc6-3172-465a-b378-53c7ff2cc0d5 |
30-
| [Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5)  | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5 |
29+
| [Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c0b7cfc6-3172-465a-b378-53c7ff2cc0d5 |
30+
| [Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5)  | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5 |
3131

3232
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
3333
- **Query scan results via REST API** - Learn how to query scan results via [REST API](subassessment-rest-api.md).
@@ -39,34 +39,28 @@ Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerabi
3939
The triggers for an image scan are:
4040

4141
- **One-time triggering**:
42-
- each image pushed or imported to a container registry is scanned after being pushed or imported to a registry. In most cases, the scan is completed within a few minutes, but sometimes it might take up to an hour.
43-
- [Preview] each image pulled from a registry is triggered to be scanned within 24 hours.
42+
- Each image pushed or imported to a container registry is scanned after being pushed or imported to a registry. In most cases, the scan is completed within a few minutes, but sometimes it might take up to an hour.
43+
- Each image pulled from a registry is triggered to be scanned within 24 hours.
4444

45-
> [!NOTE]
46-
> While Container vulnerability assessment powered by MDVM is generally available for Defender CSPM, scan-on-push and scan-on-pull is currently in public preview.
47-
48-
- **Continuous rescan triggering** – Continuous rescan is required to ensure images that have been previously scanned for vulnerabilities are rescanned to update their vulnerability reports in case a new vulnerability is published.
45+
- **Continuous rescan triggering** – continuous rescan is required to ensure images that have been previously scanned for vulnerabilities are rescanned to update their vulnerability reports in case a new vulnerability is published.
4946
- **Re-scan** is performed once a day for:
50-
- images pushed in the last 90 days.
51-
- [Preview] images pulled in the last 30 days.
52-
- images currently running on the Kubernetes clusters monitored by Defender for Cloud (either via [agentless discovery and visibility for Kubernetes](how-to-enable-agentless-containers.md) or the [Defender agent](tutorial-enable-containers-azure.md#deploy-the-defender-agent-in-azure)).
47+
- Images pushed in the last 90 days.
48+
- Images pulled in the last 30 days.
49+
- Images currently running on the Kubernetes clusters monitored by Defender for Cloud (either via [Agentless discovery for Kubernetes](/azure/defender-for-cloud/defender-for-containers-enable#enablement-method-per-capability) or the [Defender agent](/azure/defender-for-cloud/defender-for-containers-enable#enablement-method-per-capability)).
5350

54-
> [!NOTE]
55-
> While Container vulnerability assessment powered by MDVM is generally available for Defender CSPM, scanning images pulled in the last 30 days is currently in public preview
56-
5751
## How does image scanning work?
5852

5953
A detailed description of the scan process is described as follows:
6054

6155
- When you enable the [container vulnerability assessment for Azure powered by MDVM](enable-vulnerability-assessment.md), you authorize Defender for Cloud to scan container images in your Azure Container registries.
6256
- Defender for Cloud automatically discovers all containers registries, repositories and images (created before or after enabling this capability).
6357
- Defender for Cloud receives notifications whenever a new image is pushed to an Azure Container Registry. The new image is then immediately added to the catalog of images Defender for Cloud maintains, and queues an action to scan the image immediately.
64-
- Once a day, or when an image is pushed to a registry:
58+
- Once a day, and for new images pushed to a registry:
6559

6660
- All newly discovered images are pulled, and an inventory is created for each image. Image inventory is kept to avoid further image pulls, unless required by new scanner capabilities.​
67-
- Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [agentless discovery and visibility within Kubernetes components](/azure/defender-for-cloud/concept-agentless-containers) and [inventory collected via the Defender agent running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-agent)
68-
- Vulnerability reports for container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5).
69-
- For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agent running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-agent), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
61+
- Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [Agentless discovery for Kubernetes](/azure/defender-for-cloud/defender-for-containers-enable#enablement-method-per-capability) and [inventory collected via the Defender agent running on AKS nodes](/azure/defender-for-cloud/defender-for-containers-enable#enablement-method-per-capability)
62+
- Vulnerability reports for registry container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5).
63+
- For customers using either [Agentless discovery for Kubernetes](/azure/defender-for-cloud/defender-for-containers-enable#enablement-method-per-capability) or [inventory collected via the Defender agent running on AKS nodes](/azure/defender-for-cloud/defender-for-containers-enable#enablement-method-per-capability), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster. For customers using only [Agentless discovery for Kubernetes](/azure/defender-for-cloud/defender-for-containers-enable#enablement-method-per-capability), the refresh time for inventory in this recommendation is once every seven hours. Clusters that are also running the [Defender agent](/azure/defender-for-cloud/defender-for-containers-enable#enablement-method-per-capability) benefit from a two hour inventory refresh rate. Image scan results are updated based on registry scan in both cases, and are therefore only refreshed every 24 hours.
7064

7165
> [!NOTE]
7266
> For [Defender for Container Registries (deprecated)](defender-for-container-registries-introduction.md), images are scanned once on push, on pull, and rescanned only once a week.

0 commit comments

Comments
 (0)