You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/kubernetes-workload-protections.md
+20-19Lines changed: 20 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use Microsoft Defender for Cloud's set of Kubernetes d
4
4
ms.topic: how-to
5
5
author: Elazark
6
6
ms.author: elkrieger
7
-
ms.date: 03/15/2026
7
+
ms.date: 03/23/2026
8
8
---
9
9
10
10
# Protect your Kubernetes data plane hardening
@@ -56,11 +56,11 @@ If you disabled the "Azure Policy for Kubernetes" settings under the containers
56
56
57
57
1. Select **Settings**.
58
58
59
-
:::image type="content" source="media/kubernetes-workload-protections/containers-settings.png" alt-text="Screenshot showing the settings button in the Defender plan." lightbox="media/kubernetes-workload-protections/containers-settings.png":::
59
+
:::image type="content" source="media/kubernetes-workload-protections/containers-settings.png" alt-text="Screenshot showing the settings button in the Defender plan." lightbox="media/kubernetes-workload-protections/containers-settings.png":::
60
60
61
61
1. In the Settings & Monitoring page, toggle the **Azure Policy for Kubernetes** to **On**.
62
62
63
-
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
63
+
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
64
64
65
65
#### Enable for GCP projects
66
66
@@ -86,12 +86,14 @@ You can manually configure the Azure Policy for Kubernetes on existing Kubernete
86
86
-**Azure -**`"Azure Kubernetes Service clusters should have the Azure Policy add-on for Kubernetes installed"`
87
87
-**GCP** - `"GKE clusters should have the Azure Policy extension"`.
88
88
-**AWS and On-premises** - `"Azure Arc-enabled Kubernetes clusters should have the Azure policy extension for Kubernetes extension installed"`.
89
-
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
89
+
90
+
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
90
91
91
92
1. Select a found recommendation.
92
93
93
94
1. Select **Fix**.
94
-
:::image type="content" source="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png" alt-text="Screenshot of a recommendation with the Fix button highlighted.":::
95
+
96
+
:::image type="content" source="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png" alt-text="Screenshot of a recommendation with the Fix button highlighted." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png":::
95
97
96
98
1. Repeat for each additional recommendation.
97
99
@@ -138,33 +140,30 @@ For recommendations with parameters that need to be customized, you need to set
138
140
1. Select the relevant subscription.
139
141
140
142
1. From the navigation menu, select **Security policies**.
141
-
:::image type="content" source="media/kubernetes-workload-protections/security-policies-page.png" alt-text="Screenshot of the Security policies page.":::
143
+
144
+
:::image type="content" source="media/kubernetes-workload-protections/security-policies-page.png" alt-text="Screenshot of the Security policies page." lightbox="media/kubernetes-workload-protections/security-policies-page.png":::
142
145
143
146
1. On the **Standards** tab, search for the appropriate security standard.
144
147
145
148
1. Select the security standard's 3-dot menu and select **Manage**.
146
-
:::image type="content" source="media/kubernetes-workload-protections/security-policies-select-manage.png" alt-text="Screenshot of selecting Manage from the recommendation's 3-dot menu.":::
149
+
150
+
:::image type="content" source="media/kubernetes-workload-protections/security-policies-select-manage.png" alt-text="Screenshot of selecting Manage from the recommendation's 3-dot menu." lightbox="media/kubernetes-workload-protections/security-policies-select-manage.png":::
147
151
148
152
1. Select the relevant policy assignment's 3-dot menu and select **Manage effect and parameters**.
149
-
:::image type="content" source="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png" alt-text="Screenshot of selecting the 3-dot menu and then selecting Manage effect and aparameters.":::
153
+
154
+
:::image type="content" source="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png" alt-text="Screenshot of selecting the 3-dot menu and then selecting Manage effect and aparameters." lightbox="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png":::
150
155
151
156
1. Modify the values as required.
152
-
153
-
154
-
1. Select the relevant assignment. The default assignment is `ASC default`.
155
-
156
-
1. Open the **Parameters** tab and modify the values as required.
157
-
:::image type="content" source="media/kubernetes-workload-protections/manage-effect-and-parameters.png" alt-text="Screenshot of the paraments panel.":::
158
-
159
-
:::image type="content" source="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png" alt-text="Screenshot showing where to modify the parameters for one of the recommendations in the Kubernetes data plane hardening protection bundle." lightbox="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png":::
157
+
158
+
:::image type="content" source="media/kubernetes-workload-protections/manage-effect-and-parameters.png" alt-text="Screenshot of the paraments panel." lightbox="media/kubernetes-workload-protections/manage-effect-and-parameters.png":::
160
159
161
160
1. Select **Save**.
162
161
163
162
**To enforce any of the recommendations**:
164
163
165
164
1. Open the recommendation details page and select **Deny**:
166
165
167
-
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
166
+
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
168
167
169
168
The pane to set the scope opens.
170
169
@@ -177,15 +176,17 @@ For recommendations with parameters that need to be customized, you need to set
177
176
1. Go to **Defender for Cloud** > **Inventory**.
178
177
179
178
1. Set the resource type filter to **Kubernetes services** and select **Apply**.
180
-
:::image type="content" source="media/kubernetes-workload-protections/resource-type-kubernetes-service.png" alt-text="Screenshot of using the resource type filter to select kubernetes service.":::
179
+
180
+
:::image type="content" source="media/kubernetes-workload-protections/resource-type-kubernetes-service.png" alt-text="Screenshot of using the resource type filter to select kubernetes service." lightbox="media/kubernetes-workload-protections/resource-type-kubernetes-service.png":::
181
181
182
182
1. Select a cluster to investigate.
183
183
184
184
1. Review the available recommendations for it. When you view a recommendation from the workload protection set, the number of affected pods ("Kubernetes components") is listed alongside the cluster.
185
185
186
186
187
187
1. Optional: For a list of the specific pods, select the recommendation.
188
-
:::image type="content" source="media/kubernetes-workload-protections/resource-health-recommendation.png" alt-text="Screenshot of selecting a recommendation from the Resource health page.":::
188
+
189
+
:::image type="content" source="media/kubernetes-workload-protections/resource-health-recommendation.png" alt-text="Screenshot of selecting a recommendation from the Resource health page." lightbox="media/kubernetes-workload-protections/resource-health-recommendation.png":::
189
190
1. and then select **Take action**.
190
191
191
192
:::image type="content" source="./media/defender-for-kubernetes-usage/view-affected-pods-for-recommendation.gif" alt-text="Screenshot showing where to view the affected pods for a Kubernetes recommendation.":::
0 commit comments