Skip to content

Commit 2dc46ec

Browse files
authored
Merge pull request #2631 from DebLanger/US562360_multicloud
Us562360 multicloud
2 parents 28c3aa9 + d0cf739 commit 2dc46ec

8 files changed

Lines changed: 883 additions & 15 deletions

articles/defender-for-cloud/azure-portal-vs-defender-portal-comparison.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Azure portal vs Defender portal feature comparison
33
description: Compare Microsoft Defender for Cloud features and capabilities between the Azure portal and Defender portal experiences to understand the enhanced functionality available in each platform.
44
author: dlanger
55
ms.author: dlanger
6-
ms.topic: product-comparison
7-
ms.date: 10/16/2025
6+
ms.topic: article
7+
ms.date: 03/29/2026
88
ms.service: defender-for-cloud
99
---
1010

@@ -31,7 +31,7 @@ This article provides a comprehensive comparison of Microsoft Defender for Cloud
3131
| Feature name | Azure portal | Defender portal |
3232
|-------------|--------------|-----------------|
3333
| **Security recommendations** | Yes | Yes - Integrated into Exposure Management<br><br>**Note**: In the Defender portal, some recommendations that previously appeared as a single aggregated item now display as multiple individual recommendations. |
34-
| **Asset inventory** | Yes | Yes |
34+
| **Asset inventory** | Yes<br><br>**Note**: Only assets that have security issues detected on them are reflected. | Yes<br><br>**Note**: All discovered resources in customers' environments are reflected, even if there are no security issues detected on them. |
3535
| **Secure score** | Yes | Yes - New risk-based secure score |
3636
| **Data visualization and reporting with Azure Workbooks** | Yes | No |
3737
| **Data exporting** | Yes | No |

articles/defender-for-cloud/recommendations-reference-app-services.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,12 @@ To learn about actions that you can take in response to these recommendations, s
5454

5555
**Severity**: Low
5656

57+
### Custom service accounts should be configured for App Engine applications
58+
59+
**Description**: Defender for Cloud identified the use of the default App Engine service account for your applications. This poses a risk because default accounts are often granted broad permissions, such as the Editor role, at the project level, which can be exploited if compromised. Custom service accounts restrict permissions to only those needed for operations, minimizing potential exposure and following the principle of least privilege.
60+
61+
**Severity**: Medium
62+
5763
### Diagnostic logs in App Service should be enabled
5864

5965
**Description**: Audit enabling of diagnostic logs on the app.
@@ -69,6 +75,12 @@ This enables you to recreate activity trails for investigation purposes if a sec
6975

7076
**Severity**: Medium
7177

78+
### Identity-Aware Proxy protection should be enabled on App Engine applications
79+
80+
**Description**: Defender for Cloud identified that Identity-Aware Proxy (IAP) is disabled in App Engine applications. IAP is a centralized authorization layer for HTTPS that verifies user identities and enforces contextual access controls before requests reach your application. Without IAP, your App Engine may be exposed to unauthorized access, increasing the risk of exploitation. Enabling IAP is recommended to strengthen your application's security.
81+
82+
**Severity**: Medium
83+
7284
### FTPS should be required in API apps
7385

7486
**Description**: Enable FTPS enforcement for enhanced security

articles/defender-for-cloud/recommendations-reference-compute.md

Lines changed: 82 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article lists all Microsoft Defender for Cloud compute securit
44
author: Elazark
55
ms.service: defender-for-cloud
66
ms.topic: reference
7-
ms.date: 05/18/2025
7+
ms.date: 03/30/2026
88
ms.author: elkrieger
99
ms.custom: generated
1010
ai-usage: ai-assisted
@@ -45,10 +45,10 @@ To learn about actions that you can take in response to these recommendations, s
4545

4646
**Severity**: High
4747

48-
### Allowlist rules in your adaptive application control policy should be updated
48+
### Allow list rules in your adaptive application control policy should be updated
4949

5050
**Description**: Monitor for changes in behavior on groups of machines configured for auditing by Defender for Cloud's adaptive application controls. Defender for Cloud uses machine learning to analyze the running processes on your machines and suggest a list of known-safe applications. These are presented as recommended apps to allow in adaptive application control policies.
51-
(Related policy: [Allowlist rules in your adaptive application control policy should be updated](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f123a3936-f020-408a-ba0c-47873faf1534)).
51+
(Related policy: [Allow list rules in your adaptive application control policy should be updated](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f123a3936-f020-408a-ba0c-47873faf1534)).
5252

5353
**Severity**: High
5454

@@ -279,7 +279,7 @@ Replaces the older recommendation *Virtual machines should encrypt temp disks, c
279279

280280
### Linux virtual machines should use only signed and trusted boot components
281281

282-
**Description**: With Secure Boot enabled, all OS boot components (boot loader, kernel, kernel drivers) must be signed by trusted publishers. Defender for Cloud has identified untrusted OS boot components on one or more of your Linux machines. To protect your machines from potentially malicious components, add them to your allowlist or remove the identified components.
282+
**Description**: With Secure Boot enabled, all OS boot components (boot loader, kernel, kernel drivers) must be signed by trusted publishers. Defender for Cloud has identified untrusted OS boot components on one or more of your Linux machines. To protect your machines from potentially malicious components, add them to your allow list or remove the identified components.
283283
(No related policy)
284284

285285
**Severity**: Low
@@ -711,7 +711,7 @@ To learn more about the supported runtimes that this control checks for the supp
711711

712712
**Severity**: Low
713713

714-
## GCP Compute recommendations
714+
## Additional GCP Compute recommendations
715715

716716
### Compute Engine VMs should use the Container-Optimized OS
717717

@@ -771,7 +771,7 @@ If you enable the interactive serial console on an instance, clients can attempt
771771
A virtual machine instance has four virtual serial ports. Interacting with a serial port is similar to using a terminal window, in that input and output is entirely in text mode and there's no graphical interface or mouse support.
772772
The instance's operating system, BIOS, and other system-level entities often write output to the serial ports, and can accept input such as commands or answers to prompts.
773773
Typically, these system-level entities use the first serial port (port 1) and serial port 1 is often referred to as the serial console.
774-
The interactive serial console doesn't support IP-based access restrictions such as IP allowlists. If you enable the interactive serial console on an instance, clients can attempt to connect to that instance from any IP address.
774+
The interactive serial console doesn't support IP-based access restrictions such as IP allow lists. If you enable the interactive serial console on an instance, clients can attempt to connect to that instance from any IP address.
775775
This allows anybody to connect to that instance if they know the correct SSH key, username, project ID, zone, and instance name.
776776
Therefore interactive serial console support should be disabled.
777777

@@ -995,6 +995,82 @@ At least business critical VMs should have VM disks encrypted with CSEK.
995995

996996
**Severity**: Medium
997997

998+
## AWS Compute recommendations for LightSail and additional services
999+
1000+
### Administrative ports should not be publicly accessible on LightSail instances
1001+
1002+
**Description**: Defender for Cloud identified publicly accessible administrative ports in your LightSail instance. Administrative ports, such as SSH on port 22 and RDP on port 3389, provide remote management access. Without IP restrictions, these ports are vulnerable to brute force and unauthorized access attacks that could compromise your system.
1003+
1004+
**Severity**: Medium
1005+
1006+
### Drift detections should be reviewed on AWS CloudFormation stacks
1007+
1008+
**Description**: Defender for Cloud identified configuration drift in AWS CloudFormation stacks, where deployed resources no longer match the declared template configuration due to changes made directly to resources outside the CloudFormation deployment process. This introduces security and compliance risk by bypassing infrastructure-as-code controls and allowing configurations to deviate from approved security policies.
1009+
1010+
**Severity**: Medium
1011+
1012+
### Explicit capacity provider strategy should be configured on ECS services
1013+
1014+
**Description**: Defender for Cloud identified an ECS service configuration issue where an explicit capacity provider strategy is missing. Without explicitly defining the capacity provider, ECS services default to the cluster's settings for task placement, which may inadvertently assign workloads to unmanaged or less-secure EC2 capacity providers instead of Fargate. This increases the attack surface and weakens isolation safeguards for your applications.
1015+
1016+
**Severity**: Low
1017+
1018+
### IMDSv2 enforcement should be enabled on LightSail instances
1019+
1020+
**Description**: Defender for Cloud identified that your LightSail instance does not enforce IMDSv2, a security enhancement of the Instance Metadata Service that requires additional authentication. Without enforcement, the metadata endpoint remains vulnerable to unauthorized HTTP requests, potentially exposing sensitive instance details and increasing the risk of exploitation.
1021+
1022+
**Severity**: Medium
1023+
1024+
### LifecycleConfigArn should be configured on AWS SageMaker app
1025+
1026+
**Description**: Defender for Cloud identified a missing LifecycleConfigArn configuration in your AWS SageMaker app. LifecycleConfigArn refers to the lifecycle configuration scripts responsible for initializing dependencies and setting up the runtime environment for training jobs, endpoints, or notebooks. Without this configuration, your app may experience inconsistent behavior, operational issues, and potential vulnerabilities due to incomplete environment setups.
1027+
1028+
**Severity**: Low
1029+
1030+
### Public exposure of non-essential ports should be disabled for LightSail instances
1031+
1032+
**Description**: Defender for Cloud identified non-essential ports open to the public in your LightSail instance. Non-essential ports refer to those beyond HTTP (80), HTTPS (443), and standard administrative ports (22 and 3389). Open access to these ports exposes your instance to unauthorized scanning and exploitation, increasing the risk of unauthorized access. Limiting access to these ports to trusted IP addresses is recommended to reduce these vulnerabilities.
1033+
1034+
**Severity**: Low
1035+
1036+
### Secure data recovery automatic snapshots should be enabled on LightSail instances
1037+
1038+
**Description**: Defender for Cloud identified that automatic snapshots are disabled on your LightSail instance. In this context, automatic snapshots refer to daily backups that store the seven most recent recovery points. Without these snapshots, your instance faces an increased risk of data loss and extended downtime in the event of a malware or ransomware attack. This assessment does not apply to Windows instances, as the feature is not supported on that platform.
1039+
1040+
**Severity**: Low
1041+
1042+
### Unintended termination protection should be enabled for AWS CloudFormation stacks
1043+
1044+
**Description**: Defender for Cloud identified that termination protection is not enabled for your AWS CloudFormation stacks. Termination protection is a feature that prevents accidental or unauthorized deletion of stacks. Without it, your stacks are at risk of being unintentionally terminated, which can lead to service interruptions and potential data loss. For more information on enabling termination protection, please visit https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html.
1045+
1046+
**Severity**: Medium
1047+
1048+
## GCP Compute recommendations for App Engine and Cloud Run
1049+
1050+
### Custom service accounts should be configured for App Engine applications
1051+
1052+
**Description**: Defender for Cloud identified the use of the default App Engine service account for your applications. This poses a risk because default accounts are often granted broad permissions, such as the Editor role, at the project level, which can be exploited if compromised. Custom service accounts restrict permissions to only those needed for operations, minimizing potential exposure and following the principle of least privilege.
1053+
1054+
**Severity**: Medium
1055+
1056+
### Custom service accounts should be configured on Cloud Run services
1057+
1058+
**Description**: Defender for Cloud identified Cloud Run services utilizing the default Compute Engine service account. Depending on your organization policy configuration, the default service account might automatically be granted the Editor role on your project. This configuration violates the principle of least privilege and poses a risk where a container compromise could allow an attacker to gain extensive administrative access to your GCP environment. Learn more.
1059+
1060+
**Severity**: High
1061+
1062+
### Identity-Aware Proxy protection should be enabled on App Engine applications
1063+
1064+
**Description**: Defender for Cloud identified that Identity-Aware Proxy (IAP) is disabled in App Engine applications. IAP is a centralized authorization layer for HTTPS that verifies user identities and enforces contextual access controls before requests reach your application. Without IAP, your App Engine may be exposed to unauthorized access, increasing the risk of exploitation. Enabling IAP is recommended to strengthen your application's security.
1065+
1066+
**Severity**: Medium
1067+
1068+
### Internal or load balancer ingress should be configured on Cloud Run services
1069+
1070+
**Description**: Defender for Cloud identified Cloud Run services that allow 'all' ingress traffic. This configuration allows the service to be directly reachable from the public internet via its default URL. This poses a risk of bypassing centralized security controls. Learn more.
1071+
1072+
**Severity**: Medium
1073+
9981074
## Related content
9991075

10001076
- [learn about security recommendations](security-policy-concept.md)

articles/defender-for-cloud/recommendations-reference-container.md

Lines changed: 37 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article lists all Microsoft Defender for Cloud container secur
44
author: Elazark
55
ms.service: defender-for-cloud
66
ms.topic: reference
7-
ms.date: 03/04/2026
7+
ms.date: 03/29/2026
88
ms.author: elkrieger
99
ms.custom: generated
1010
ai-usage: ai-assisted
@@ -582,6 +582,42 @@ All the [Kubernetes data plane security recommendations](kubernetes-workload-pro
582582

583583
**Type**: Vulnerability Assessment
584584

585+
### AWS Batch job definitions should not run containers in privileged mode
586+
587+
**Description**: Running containers in privileged mode grants them elevated access to the host system, effectively bypassing container isolation controls. This significantly increases the risk of host compromise, unauthorized access to sensitive resources, and lateral movement within the environment. Disabling privileged mode enforces the principle of least privilege and reduces the impact of compromised or malicious container workloads.
588+
589+
**Severity**: High
590+
591+
### AWS Batch job definitions should use a read-only root filesystem
592+
593+
**Description**: Allowing containers to run with a writable root filesystem increases the risk of unauthorized modification of system binaries, configuration files, and runtime artifacts. This weakens container immutability guarantees and enables persistence, malware installation, and evasion techniques in the event of a container compromise. Enforcing a read-only root filesystem strengthens workload isolation and limits the blast radius of security incidents.
594+
595+
**Severity**: Medium
596+
597+
### Read-only root filesystem should be enabled for ECS Containers
598+
599+
**Description**: Defender for Cloud identified ECS task definitions with writable root filesystems. This configuration poses a risk by allowing runtime modifications to critical system paths, potentially enabling tampering, persistence of unauthorized changes, and exploitation of mutable directories. A read-only root filesystem limits these risks by preventing alterations during container execution, aligning with immutable infrastructure and least privilege best practices.
600+
601+
**Severity**: Medium
602+
603+
### Secrets should be configured for containers to prevent the use of sensitive plaintext environment variables
604+
605+
**Description**: Defender for Cloud identified plain text environment variables in your ECS task definitions. This issue arises when sensitive information such as credentials, tokens, or keys is stored directly within container configurations rather than secured using secrets. Plaintext variables can be accessed by any internal process or inadvertently logged, increasing the risk of unauthorized access and secret leakage.
606+
607+
**Severity**: High
608+
609+
### Secure networking modes should be enabled on ECS task definitions
610+
611+
**Description**: Defender for Cloud identified insecure networking configurations in your ECS task definitions. The evaluation found that Fargate tasks must use the awsvpc mode-allocating dedicated elastic network interfaces and security group boundaries-and that EC2 tasks should avoid host or none modes that bypass container isolation. Without secure modes, tasks have increased exposure to lateral movement and other networking risks, potentially compromising workload isolation.
612+
613+
**Severity**: Medium
614+
615+
### Transit encryption should be enabled on ECS task definitions using EFS
616+
617+
**Description**: Defender for Cloud identified ECS task definitions mounting Amazon EFS file systems without transit encryption enabled. Transit encryption secures data traveling between your ECS tasks and EFS mount targets by encrypting in transit, thereby minimizing the risk of network-based interception within your VPC. Without it, sensitive data is exposed to potential unauthorized access. Enabling transit encryption helps ensure that data-in-transit is adequately protected.
618+
619+
**Severity**: Medium
620+
585621
## Related content
586622

587623
- [Learn about security recommendations](security-policy-concept.md)

0 commit comments

Comments
 (0)