Skip to content

Commit 6430ffd

Browse files
Merge branch 'main' into wi-540425-mdc-ep-63
2 parents 517b38b + db7417d commit 6430ffd

51 files changed

Lines changed: 832 additions & 648 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -569,6 +569,11 @@
569569
"source_path_from_root": "/articles/defender-for-cloud/extract-resource-identifiers-support.md",
570570
"redirect_url": "/azure/defender-for-cloud/defender-portal/integration-faq#extracting-identifiers-for-support-cases",
571571
"redirect_document_id": false
572+
},
573+
{
574+
"source_path_from_root": "/articles/defender-for-cloud/monitor-connected-aws-resources.md",
575+
"redirect_url": "/azure/defender-for-cloud/quickstart-onboard-aws#validate-connector-health",
576+
"redirect_document_id": false
572577
}
573578
]
574579
}

articles/defender-for-cloud/TOC.yml

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -58,8 +58,6 @@
5858
href: quickstart-onboard-aws.md
5959
- name: Authentication architecture for AWS connectors
6060
href: concept-authentication-architecture-aws.md
61-
- name: Monitor connected AWS resources
62-
href: monitor-connected-aws-resources.md
6361
- name: Integrate AWS CloudTrail logs (Preview)
6462
href: integrate-cloud-trail.md
6563
- name: Connect GCP projects
@@ -509,6 +507,9 @@
509507
href: detect-exposed-ip-addresses.md
510508
- name: Review security recommendations
511509
items:
510+
- name: Security recommendations
511+
displayName: security, recommendations, overview, posture, management
512+
href: security-recommendations.md
512513
- name: Review security recommendations
513514
displayName: security, recommendations, owner, azure, resource, graph, azure resource graph, csv report
514515
href: review-security-recommendations.md
@@ -866,20 +867,13 @@
866867
href: defender-for-sql-scan-results.md
867868
- name: Investigate and remediate
868869
items:
869-
- name: Investigate Defender for SQL security Alerts, reporting, and queries
870+
- name: Investigate Defender for SQL security alerts
870871
displayName: SQL, SQL servers, defender, machines
871872
href: defender-for-sql-alerts.md
872873
- name: Find and remediate vulnerabilities
873874
href: sql-azure-vulnerability-assessment-find.md
874-
- name: Vulnerability assessment rules
875-
href: sql-azure-vulnerability-assessment-rules.md
876-
- name: SQL vulnerability assessment rules changelog
877-
href: sql-azure-vulnerability-assessment-rules-changelog.md
878875
- name: Consume and export scan results
879876
href: defender-for-sql-scan-results.md
880-
- name: Investigate Defender for SQL security alerts
881-
href: defender-for-sql-alerts.md
882-
883877
- name: Defender for App Service
884878
items:
885879
- name: Overview
@@ -1499,6 +1493,9 @@
14991493
- name: Agentless code scanning
15001494
DisplayName: Agentless code scanning
15011495
href: episode-sixty-three.md
1496+
- name: Storage aggregated logs
1497+
DisplayName: Storage aggregated logs, Advanced Hunting, CloudStorageAggregatedEvents
1498+
href: episode-sixty-four.md
15021499
- name: Microsoft Defender for IoT documentation
15031500
href: /azure/defender-for-iot/
15041501
- name: Azure security documentation

articles/defender-for-cloud/alerts-azure-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -381,7 +381,7 @@ It's possible that a SAS token was leaked or generated by a malicious actor eith
381381

382382
**Severity**: Low
383383

384-
### **Malicious file uploaded to storage account**
384+
### **Malicious blob uploaded to storage account**
385385

386386
Storage.Blob_AM.MalwareFound
387387

articles/defender-for-cloud/api-security-posture-overview.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.author: elkrieger
55
author: Elazark
66
ms.service: defender-for-cloud
77
ms.topic: concept-article
8-
ms.date: 06/18/2025
8+
ms.date: 01/04/2026
99
#customer intent: As a security professional, I want to understand how to manage and improve the security posture of my APIs using Microsoft Defender for Cloud, so that I can protect my cloud-native applications effectively.
1010
---
1111

@@ -14,7 +14,7 @@ ms.date: 06/18/2025
1414
APIs are entry points into cloud-native apps. They connect services, apps, and data, making them targets for attackers. API security posture management helps protect APIs by assessing risks from misconfigurations and vulnerabilities. The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender for Cloud offers API discovery and posture across your Azure Function Apps and Logic Apps and your managed APIs across your Azure API Management Platform.
1515

1616
> [!NOTE]
17-
> **API discovery and security posture for APIs hosted in Function Apps and Logic Apps is now available in Public Preview.** This includes visibility into APIs, posture insights including internet facing APIs, inactive or dormant APIs, APIs missing authentication and APIs that permit unencrypted traffic which may pose security risk.
17+
> **API discovery and security posture for APIs hosted in Function Apps and Logic Apps is now available in Public Preview.** This feature provides visibility into APIs and posture insights, including internet-facing APIs, inactive or dormant APIs, APIs missing authentication, and APIs that permit unencrypted traffic, which might pose a security risk.
1818
1919
## Capabilities
2020

@@ -30,25 +30,25 @@ API security posture management in Defender for Cloud offers the following capab
3030
- **Identify inactive or dormant APIs**:
3131
Surface APIs that are no longer in use across Azure API Management, Function Apps, and Logic Apps.
3232
- **Identify APIs allowing unencrypted traffic**:
33-
Surface APIs that permit unencrypted communication, which may introduce risk.
33+
Surface APIs that permit unencrypted communication, which might introduce risk.
3434
- **Understand cloud application exposure risks** by linking APIs to backend environments like virtual machines, containers, storage, and databases.
3535
- **Address API-driven attack paths** and prioritize mitigation with cloud [security explorer and API-led attack path analysis](concept-attack-path.md).
3636

3737
## Unified inventory
3838

39-
Defender for Cloud continuously discovers APIs across Azure API Management, Function Apps, and Logic Apps. You can view all APIs with posture insights in the Defender for Cloud [asset inventory](asset-inventory.md) and [API Security dashboard](defender-for-apis-introduction.md#review-api-security-findings). This helps you address API risks efficiently.
39+
Defender for Cloud continuously discovers APIs across Azure API Management, Function Apps, and Logic Apps. You can view all APIs with posture insights in the Defender for Cloud [asset inventory](asset-inventory.md) and [API Security dashboard](defender-for-apis-introduction.md#review-api-security-findings). This insight helps you address API risks efficiently.
4040

4141
## Prioritize and implement API security best practices
4242

43-
Assess and secure your APIs against high-risk issues such as lack of encryption and anonymous access with broken or weak authentication. Gain insights into inactive APIs and those exposed directly to the internet. Defender for Cloud scans for API risks, considering potential exploitability and business impact. [Security recommendations](review-security-recommendations.md#understanding-risk-prioritization) are prioritized based on these factors, allowing you to fix critical vulnerabilities first.
43+
Assess and secure your APIs against high-risk issues such as lack of encryption and anonymous access with broken or weak authentication. Gain insights into inactive APIs and those exposed directly to the internet. Defender for Cloud scans for API risks, considering potential exploitability and business impact. [Security recommendations](security-recommendations.md#understanding-risk-prioritization) are prioritized based on these factors, so you can fix critical vulnerabilities first.
4444

4545
## Classify APIs exposing sensitive data
4646

47-
Improve data security by assessing sensitive data exposed in API URL path parameters, query parameters, and request and response bodies, including the source of the data exposure. With [Microsoft Purview](/purview/sit-sensitive-information-type-learn-about), you can use custom sensitive information types and sensitivity labels to create a common taxonomy, covering data-in-transit risks.
47+
Improve data security by assessing sensitive data exposed in API URL path parameters, query parameters, and request and response bodies, including the source of the data exposure. By using [Microsoft Purview](/purview/sit-sensitive-information-type-learn-about), you can use custom sensitive information types and sensitivity labels to create a common taxonomy, covering data-in-transit risks.
4848

4949
### Sampling
5050

51-
Sensitive data exposure in your APIs is assessed using sampling methods within the Defender CSPM plan. This approach saves both cost and time.
51+
Defender CSPM plan assesses sensitive data exposure in your APIs by using sampling methods. This approach saves both cost and time.
5252

5353
## Explore API risks and prioritize remediation
5454

@@ -59,12 +59,12 @@ Attack path analysis identifies risks to your API endpoints, especially with mul
5959
To use API security posture capabilities in Microsoft Defender for Cloud, you must:
6060

6161
1. **Enable the Defender Cloud Security Posture Management (CSPM) plan** in your subscription.
62-
2. **Enable the [API Security Posture Management extension](enable-api-security-posture.md)** to allow Defender for Cloud to discover APIs and assess their posture.
62+
1. **Enable the [API Security Posture Management extension](enable-api-security-posture.md)** to allow Defender for Cloud to discover APIs and assess their posture.
6363

64-
Once enabled, Defender for Cloud will automatically begin onboarding supported APIs and providing visibility and security insights.
64+
After you enable these features, Defender for Cloud automatically starts onboarding supported APIs and providing visibility and security insights.
6565

6666
## Related content
6767
- [Enable API security posture with Defender CSPM](enable-api-security-posture.md).
6868
- Review of [security recommendations](review-security-recommendations.md).
6969
- [Identify and remediate attack paths](how-to-manage-attack-path.md).
70-
- Monitor API threats using [Defender for APIs Workload Protection](defender-for-apis-deploy.md).
70+
- Monitor API threats by using [Defender for APIs Workload Protection](defender-for-apis-deploy.md).

articles/defender-for-cloud/assign-regulatory-compliance-standards.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,19 @@
11
---
22
title: Assign regulatory compliance standards in Microsoft Defender for Cloud
33
description: Learn how to assign regulatory compliance standards in Microsoft Defender for Cloud.
4-
ms.date: 10/19/2025
4+
ms.date: 12/25/2025
55
ms.author: elkrieger
66
author: Elazark
77
ms.topic: how-to
8-
ms.custom:
98
---
109

11-
# Assign security standards
10+
# Assign regulatory compliance standards in Defender for Cloud
1211

13-
Defender for Cloud's regulatory standards and benchmarks are represented as [security standards](security-policy-concept.md). Each standard is defined as an initiative in Azure Policy.
12+
In Defender for Cloud, regulatory compliance standards are implemented using Azure Policy initiatives and evaluated through the Regulatory compliance dashboard.
1413

15-
In Defender for Cloud, assign security standards to specific scopes such as Azure subscriptions, Amazon Web Services (AWS) accounts, and Google Cloud Platform (GCP) projects with Defender for Cloud enabled.
14+
You can assign regulatory compliance standards to specific scopes such as Azure subscriptions, Amazon Web Services (AWS) accounts, and Google Cloud Platform (GCP) projects.
1615

17-
Defender for Cloud continually assesses the scoped environment against the standards. Based on assessments, it shows whether in-scope resources are compliant or noncompliant with the standard and provides remediation recommendations.
18-
19-
This article explains how to add regulatory compliance standards as security standards in an Azure subscription, AWS account, or GCP project.
16+
Defender for Cloud continually assesses the scoped environment against the standards. Based on these assessments, it shows whether in-scope resources are compliant or noncompliant with the standard and provides remediation recommendations.
2017

2118
## Prerequisites
2219

@@ -33,7 +30,7 @@ If you assign a regulatory standard but don't have any relevant assessed resourc
3330

3431
:::image type="content" source="media/update-regulatory-compliance-packages/manage-compliance.png" alt-text="Screenshot of the regulatory compliance page that shows you where to select the manage compliance policy button." lightbox="media/update-regulatory-compliance-packages/manage-compliance.png":::
3532

36-
1. Select an account or management account (Azure subscription or management group, AWS account or management account, GCP project or organization) to assign the security standard.
33+
1. Select an account or management account (Azure subscription or management group, AWS account or management account, GCP project or organization) to assign the regulatory compliance standard.
3734

3835
> [!NOTE]
3936
> We recommend selecting the highest scope applicable to the standard so that compliance data is aggregated and tracked for all nested resources.
@@ -51,4 +48,5 @@ If you assign a regulatory standard but don't have any relevant assessed resourc
5148

5249
- [Create custom standards for Azure.](custom-security-policies.md)
5350
- [Create custom standards for Amazon Web Services (AWS) accounts, and Google Cloud Platform (GCP) projects.](create-custom-recommendations.md)
54-
- [Improve regulatory compliance.](regulatory-compliance-dashboard.md)
51+
- [Improve regulatory compliance.](regulatory-compliance-dashboard.md)
52+
- [Regulatory compliance in Defender for Cloud.](concept-regulatory-compliance.md)

articles/defender-for-cloud/ci-cd-pipeline-scanning-with-defender-cli.md

Lines changed: 6 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,36 +15,26 @@ Microsoft Defender for Cloud Command‑Line Interface (Defender for Cloud CLI) l
1515
## Key capabilities
1616

1717
* Container‑image vulnerability assessment and automatic ingestion into Cloud Security Explorer.
18-
* Unified, cross‑platform CLI that works with any CI runner (Azure Pipelines, GitHub Actions, Jenkins, Bitbucket, GitLab, CircleCI, Travis CI, AWS CodeBuild, and more).
18+
* Unified, cross‑platform CLI that works with any CI/CD tools.
1919
* Standards‑based SARIF output that integrates with pull‑request annotations and quality gates.
2020
* Token‑based authentication scoped to a single Azure subscription for granular control or Azure DevOps Connector authentication.
2121

2222
## Prerequisites
2323

2424
* An Azure Subscription with Defender for Cloud onboarded. If you don't already have an Azure account, [create one for free](https://azure.microsoft.com/pricing/purchase-options/azure-account).
2525
* Defender CSPM enabled.
26-
* One of the following CI/CD pipeline tools: Jenkins, BitBucket Pipelines, Google Cloud Build, Bamboo, CircleCI, Travis CI, TeamCity, Oracle DevOps services, or AWS CodeBuild.
26+
* One of the following CI/CD pipeline tools: Azure Pipelines, GitHub Actions, Jenkins, BitBucket Pipelines, GitLab, Google Cloud Build, Bamboo, CircleCI, Travis CI, TeamCity, Oracle DevOps services, or AWS CodeBuild.
2727
* Windows or Linux/WSL terminal for local desktop scans.
2828

2929
* Security Admin permission to create the client ID and secret tokens if using token‑based authentication, or an Azure DevOps or GitHub connector established if using connector‑based authentication.
3030

3131
## Authentication setup
3232

33-
Defender for Cloud CLI supports two authentication methods to align with enterprise security practices.
34-
35-
### Token‑based authentication
36-
37-
Security admins create tokens in the Microsoft Defender for Cloud (MDC) portal and configure them as environment variables in CI/CD pipelines or local terminals. This approach offers flexibility across build systems and enables targeted scoping by subscription.
38-
39-
### Connector-based authentication
40-
41-
Connector-based authentication is currently available for Azure DevOps or GitHub. When you establish a connector between Azure DevOps and Defender for Cloud, the authentication process happens automatically. You don't need to add tokens to your pipelines.
42-
43-
For detailed steps and examples, see:
44-
45-
* [Defender for Cloud CLI Authentication token-based instructions](defender-cli-authentication.md)
46-
* [Connect your Azure DevOps organizations](quickstart-onboard-devops.md)
33+
Defender for Cloud CLI supports two authentication methods to align with enterprise security practices. Connector-based authentication is currently available and the preferred method of authentication for Azure DevOps and GitHub.
4734

35+
1. [Connector-based authentication](defender-cli-authentication.md#connector-based-ado-and-github)
36+
2. [Token‑based authentication](defender-cli-authentication.md#token-based)
37+
4838
## Configure your CI/CD pipeline
4939

5040
Choose the configuration example that matches your CI/CD platform and authentication method.

0 commit comments

Comments
 (0)