|
1 | 1 | --- |
2 | | -title: What is Serverless protection |
| 2 | +title: What is Serverless protection (Preview) |
3 | 3 | description: Learn about Serverless protection in Microsoft Defender for Cloud and how it helps secure your serverless resources. |
4 | 4 | ms.topic: overview |
5 | | -ms.date: 03/01/2026 |
| 5 | +ms.date: 04/13/2026 |
6 | 6 | #customer intent: As a reader, I want to understand what Serverless protection is in Microsoft Defender for Cloud. |
7 | 7 | --- |
8 | 8 |
|
9 | | -# Serverless protection |
| 9 | +# Serverless protection (Preview) |
10 | 10 |
|
11 | | -Microsoft Defender for Cloud, as a Cloud-Native Application Protection Platform (CNAPP), delivers comprehensive visibility, security, and posture management for serverless workloads across multicloud environments. It extends coverage to Azure Web Apps, Azure Functions, and Amazon Web Service (AWS) Lambda, ensuring these resources are fully protected. |
| 11 | +Microsoft Defender for Cloud, as a Cloud-Native Application Protection Platform (CNAPP), delivers comprehensive visibility, security, and posture management for serverless workloads across multicloud environments. It extends coverage to Azure Web Apps, Azure Functions, and Amazon Web Service (AWS) Lambda, ensuring these resources are fully protected. |
12 | 12 |
|
13 | 13 | Serverless protection automatically discovers and inventories all Web Apps, Azure Functions, and AWS Lambda functions in your environment. Once it discovers these resources, Defender for Cloud identifies misconfigurations, vulnerabilities, and insecure dependencies. Defender for Cloud then offers remediation guidance and continuous posture assessment, helping organizations maintain strong posture management and reduce risk in dynamic, serverless architectures. |
14 | 14 |
|
15 | | -## Serverless protection requirements |
| 15 | +Learn more about the [cloud availability](support-matrix-defender-for-cloud.md#cloud-support) for this feature. |
| 16 | + |
| 17 | +## Serverless protection requirements and availability |
16 | 18 |
|
17 | 19 | Serverless protection is available as part of the [Defender Cloud Security Posture Management (CSPM) plan](concept-cloud-security-posture-management.md#cspm-plans). |
18 | 20 |
|
19 | 21 | To enable serverless protection, you must [Enable the Defender CSPM plan](tutorial-enable-cspm-plan.md) on your subscription, and [enable the Serverless protection component](tutorial-enable-cspm-plan.md#enable-the-components-of-the-defender-cspm-plan) of the Defender CSPM plan. |
20 | 22 |
|
| 23 | +Currently, the available features vary by portal. The following table shows which features are available in each portal: |
| 24 | + |
| 25 | +| Feature | Defender for Cloud portal | Defender portal | |
| 26 | +|--|--|--| |
| 27 | +| Onboarding through the Defender CSPM plan | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="../defender-for-cloud/media/icons/no-icon.png"::: | |
| 28 | +| Review misconfiguration recommendations | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | |
| 29 | +| Build queries with the cloud security explorer | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="../defender-for-cloud/media/icons/no-icon.png"::: | |
| 30 | +| Explore workloads in Cloud Inventory | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | |
| 31 | +| Investigate attack paths | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | |
| 32 | +| Vulnerability Assessment | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | |
| 33 | + |
| 34 | +To view the availability, see [cloud support](support-matrix-defender-for-cloud.md#cloud-support). |
| 35 | + |
21 | 36 | See [limitations](#limitations) for serverless resources. |
22 | 37 |
|
23 | 38 | ## Benefits of serverless protection |
@@ -59,11 +74,11 @@ Defender for Cloud provides a unified inventory of all discovered serverless res |
59 | 74 |
|
60 | 75 | After you filter your results, select any of the resources to view more details about its security posture, including any active security recommendations and their severity levels. |
61 | 76 |
|
62 | | -:::image type="content" source="media/serverless-protection/resource-health.png" alt-text="Screenshot that shows a selected resources health." lightbox="media/defender-for-apis-posture/resource-health.png"::: |
| 77 | +:::image type="content" source="media/serverless-protection/resource-health.png" alt-text="Screenshot that shows a selected resources health." lightbox="media/serverless-protection/resource-health.png"::: |
63 | 78 |
|
64 | 79 | You can also review the security recommendations associated with each resource to prioritize remediation efforts based on the severity of the findings and remediate them. |
65 | 80 |
|
66 | | -Learn how to [remediate security recommendations](implement-security-recommendations.md). |
| 81 | +Learn how to [remediate security recommendations](implement-security-recommendations.md). |
67 | 82 |
|
68 | 83 | ### Cloud Security Explorer |
69 | 84 |
|
|
0 commit comments