You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/api-security-posture-overview.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.author: elkrieger
5
5
author: Elazark
6
6
ms.service: defender-for-cloud
7
7
ms.topic: concept-article
8
-
ms.date: 06/18/2025
8
+
ms.date: 01/04/2026
9
9
#customer intent: As a security professional, I want to understand how to manage and improve the security posture of my APIs using Microsoft Defender for Cloud, so that I can protect my cloud-native applications effectively.
10
10
---
11
11
@@ -14,7 +14,7 @@ ms.date: 06/18/2025
14
14
APIs are entry points into cloud-native apps. They connect services, apps, and data, making them targets for attackers. API security posture management helps protect APIs by assessing risks from misconfigurations and vulnerabilities. The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender for Cloud offers API discovery and posture across your Azure Function Apps and Logic Apps and your managed APIs across your Azure API Management Platform.
15
15
16
16
> [!NOTE]
17
-
> **API discovery and security posture for APIs hosted in Function Apps and Logic Apps is now available in Public Preview.** This includes visibility into APIs, posture insights including internetfacing APIs, inactive or dormant APIs, APIs missing authentication and APIs that permit unencrypted traffic which may pose security risk.
17
+
> **API discovery and security posture for APIs hosted in Function Apps and Logic Apps is now available in Public Preview.** This feature provides visibility into APIs and posture insights, including internet-facing APIs, inactive or dormant APIs, APIs missing authentication, and APIs that permit unencrypted traffic, which might pose a security risk.
18
18
19
19
## Capabilities
20
20
@@ -30,25 +30,25 @@ API security posture management in Defender for Cloud offers the following capab
30
30
-**Identify inactive or dormant APIs**:
31
31
Surface APIs that are no longer in use across Azure API Management, Function Apps, and Logic Apps.
32
32
-**Identify APIs allowing unencrypted traffic**:
33
-
Surface APIs that permit unencrypted communication, which may introduce risk.
33
+
Surface APIs that permit unencrypted communication, which might introduce risk.
34
34
-**Understand cloud application exposure risks** by linking APIs to backend environments like virtual machines, containers, storage, and databases.
35
35
-**Address API-driven attack paths** and prioritize mitigation with cloud [security explorer and API-led attack path analysis](concept-attack-path.md).
36
36
37
37
## Unified inventory
38
38
39
-
Defender for Cloud continuously discovers APIs across Azure API Management, Function Apps, and Logic Apps. You can view all APIs with posture insights in the Defender for Cloud [asset inventory](asset-inventory.md) and [API Security dashboard](defender-for-apis-introduction.md#review-api-security-findings). This helps you address API risks efficiently.
39
+
Defender for Cloud continuously discovers APIs across Azure API Management, Function Apps, and Logic Apps. You can view all APIs with posture insights in the Defender for Cloud [asset inventory](asset-inventory.md) and [API Security dashboard](defender-for-apis-introduction.md#review-api-security-findings). This insight helps you address API risks efficiently.
40
40
41
41
## Prioritize and implement API security best practices
42
42
43
-
Assess and secure your APIs against high-risk issues such as lack of encryption and anonymous access with broken or weak authentication. Gain insights into inactive APIs and those exposed directly to the internet. Defender for Cloud scans for API risks, considering potential exploitability and business impact. [Security recommendations](review-security-recommendations.md#understanding-risk-prioritization) are prioritized based on these factors, allowing you to fix critical vulnerabilities first.
43
+
Assess and secure your APIs against high-risk issues such as lack of encryption and anonymous access with broken or weak authentication. Gain insights into inactive APIs and those exposed directly to the internet. Defender for Cloud scans for API risks, considering potential exploitability and business impact. [Security recommendations](security-recommendations.md#understanding-risk-prioritization) are prioritized based on these factors, so you can fix critical vulnerabilities first.
44
44
45
45
## Classify APIs exposing sensitive data
46
46
47
-
Improve data security by assessing sensitive data exposed in API URL path parameters, query parameters, and request and response bodies, including the source of the data exposure. With[Microsoft Purview](/purview/sit-sensitive-information-type-learn-about), you can use custom sensitive information types and sensitivity labels to create a common taxonomy, covering data-in-transit risks.
47
+
Improve data security by assessing sensitive data exposed in API URL path parameters, query parameters, and request and response bodies, including the source of the data exposure. By using[Microsoft Purview](/purview/sit-sensitive-information-type-learn-about), you can use custom sensitive information types and sensitivity labels to create a common taxonomy, covering data-in-transit risks.
48
48
49
49
### Sampling
50
50
51
-
Sensitive data exposure in your APIs is assessed using sampling methods within the Defender CSPM plan. This approach saves both cost and time.
51
+
Defender CSPM plan assesses sensitive data exposure in your APIs by using sampling methods. This approach saves both cost and time.
52
52
53
53
## Explore API risks and prioritize remediation
54
54
@@ -59,12 +59,12 @@ Attack path analysis identifies risks to your API endpoints, especially with mul
59
59
To use API security posture capabilities in Microsoft Defender for Cloud, you must:
60
60
61
61
1.**Enable the Defender Cloud Security Posture Management (CSPM) plan** in your subscription.
62
-
2.**Enable the [API Security Posture Management extension](enable-api-security-posture.md)** to allow Defender for Cloud to discover APIs and assess their posture.
62
+
1.**Enable the [API Security Posture Management extension](enable-api-security-posture.md)** to allow Defender for Cloud to discover APIs and assess their posture.
63
63
64
-
Once enabled, Defender for Cloud will automatically begin onboarding supported APIs and providing visibility and security insights.
64
+
After you enable these features, Defender for Cloud automatically starts onboarding supported APIs and providing visibility and security insights.
65
65
66
66
## Related content
67
67
-[Enable API security posture with Defender CSPM](enable-api-security-posture.md).
68
68
- Review of [security recommendations](review-security-recommendations.md).
69
69
-[Identify and remediate attack paths](how-to-manage-attack-path.md).
70
-
- Monitor API threats using [Defender for APIs Workload Protection](defender-for-apis-deploy.md).
70
+
- Monitor API threats by using [Defender for APIs Workload Protection](defender-for-apis-deploy.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/assign-regulatory-compliance-standards.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,19 @@
1
1
---
2
2
title: Assign regulatory compliance standards in Microsoft Defender for Cloud
3
3
description: Learn how to assign regulatory compliance standards in Microsoft Defender for Cloud.
4
-
ms.date: 10/19/2025
4
+
ms.date: 12/25/2025
5
5
ms.author: elkrieger
6
6
author: Elazark
7
7
ms.topic: how-to
8
-
ms.custom:
9
8
---
10
9
11
-
# Assign security standards
10
+
# Assign regulatory compliance standards in Defender for Cloud
12
11
13
-
Defender for Cloud's regulatory standards and benchmarks are represented as [security standards](security-policy-concept.md). Each standard is defined as an initiative in Azure Policy.
12
+
In Defender for Cloud, regulatory compliance standards are implemented using Azure Policy initiatives and evaluated through the Regulatory compliance dashboard.
14
13
15
-
In Defender for Cloud, assign security standards to specific scopes such as Azure subscriptions, Amazon Web Services (AWS) accounts, and Google Cloud Platform (GCP) projects with Defender for Cloud enabled.
14
+
You can assign regulatory compliance standards to specific scopes such as Azure subscriptions, Amazon Web Services (AWS) accounts, and Google Cloud Platform (GCP) projects.
16
15
17
-
Defender for Cloud continually assesses the scoped environment against the standards. Based on assessments, it shows whether in-scope resources are compliant or noncompliant with the standard and provides remediation recommendations.
18
-
19
-
This article explains how to add regulatory compliance standards as security standards in an Azure subscription, AWS account, or GCP project.
16
+
Defender for Cloud continually assesses the scoped environment against the standards. Based on these assessments, it shows whether in-scope resources are compliant or noncompliant with the standard and provides remediation recommendations.
20
17
21
18
## Prerequisites
22
19
@@ -33,7 +30,7 @@ If you assign a regulatory standard but don't have any relevant assessed resourc
33
30
34
31
:::image type="content" source="media/update-regulatory-compliance-packages/manage-compliance.png" alt-text="Screenshot of the regulatory compliance page that shows you where to select the manage compliance policy button." lightbox="media/update-regulatory-compliance-packages/manage-compliance.png":::
35
32
36
-
1. Select an account or management account (Azure subscription or management group, AWS account or management account, GCP project or organization) to assign the security standard.
33
+
1. Select an account or management account (Azure subscription or management group, AWS account or management account, GCP project or organization) to assign the regulatory compliance standard.
37
34
38
35
> [!NOTE]
39
36
> We recommend selecting the highest scope applicable to the standard so that compliance data is aggregated and tracked for all nested resources.
@@ -51,4 +48,5 @@ If you assign a regulatory standard but don't have any relevant assessed resourc
51
48
52
49
-[Create custom standards for Azure.](custom-security-policies.md)
53
50
-[Create custom standards for Amazon Web Services (AWS) accounts, and Google Cloud Platform (GCP) projects.](create-custom-recommendations.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/ci-cd-pipeline-scanning-with-defender-cli.md
+6-16Lines changed: 6 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,36 +15,26 @@ Microsoft Defender for Cloud Command‑Line Interface (Defender for Cloud CLI) l
15
15
## Key capabilities
16
16
17
17
* Container‑image vulnerability assessment and automatic ingestion into Cloud Security Explorer.
18
-
* Unified, cross‑platform CLI that works with any CI runner (Azure Pipelines, GitHub Actions, Jenkins, Bitbucket, GitLab, CircleCI, Travis CI, AWS CodeBuild, and more).
18
+
* Unified, cross‑platform CLI that works with any CI/CD tools.
19
19
* Standards‑based SARIF output that integrates with pull‑request annotations and quality gates.
20
20
* Token‑based authentication scoped to a single Azure subscription for granular control or Azure DevOps Connector authentication.
21
21
22
22
## Prerequisites
23
23
24
24
* An Azure Subscription with Defender for Cloud onboarded. If you don't already have an Azure account, [create one for free](https://azure.microsoft.com/pricing/purchase-options/azure-account).
25
25
* Defender CSPM enabled.
26
-
* One of the following CI/CD pipeline tools: Jenkins, BitBucket Pipelines, Google Cloud Build, Bamboo, CircleCI, Travis CI, TeamCity, Oracle DevOps services, or AWS CodeBuild.
26
+
* One of the following CI/CD pipeline tools: Azure Pipelines, GitHub Actions, Jenkins, BitBucket Pipelines, GitLab, Google Cloud Build, Bamboo, CircleCI, Travis CI, TeamCity, Oracle DevOps services, or AWS CodeBuild.
27
27
* Windows or Linux/WSL terminal for local desktop scans.
28
28
29
29
* Security Admin permission to create the client ID and secret tokens if using token‑based authentication, or an Azure DevOps or GitHub connector established if using connector‑based authentication.
30
30
31
31
## Authentication setup
32
32
33
-
Defender for Cloud CLI supports two authentication methods to align with enterprise security practices.
34
-
35
-
### Token‑based authentication
36
-
37
-
Security admins create tokens in the Microsoft Defender for Cloud (MDC) portal and configure them as environment variables in CI/CD pipelines or local terminals. This approach offers flexibility across build systems and enables targeted scoping by subscription.
38
-
39
-
### Connector-based authentication
40
-
41
-
Connector-based authentication is currently available for Azure DevOps or GitHub. When you establish a connector between Azure DevOps and Defender for Cloud, the authentication process happens automatically. You don't need to add tokens to your pipelines.
42
-
43
-
For detailed steps and examples, see:
44
-
45
-
*[Defender for Cloud CLI Authentication token-based instructions](defender-cli-authentication.md)
46
-
*[Connect your Azure DevOps organizations](quickstart-onboard-devops.md)
33
+
Defender for Cloud CLI supports two authentication methods to align with enterprise security practices. Connector-based authentication is currently available and the preferred method of authentication for Azure DevOps and GitHub.
0 commit comments