Skip to content

Commit 6445cdf

Browse files
authored
Merge pull request #2750 from aditdalvi/docs-editor/recommendations-reference-api-1776374307
Add missing documentation for recommendations for unauthenticated API endpoints in Function Apps and Logic Apps
2 parents f5a27c8 + 96f9f26 commit 6445cdf

2 files changed

Lines changed: 16 additions & 2 deletions

File tree

articles/defender-for-cloud/faq-general.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,8 @@ sections:
164164
- Azure API Management APIs should be onboarded to Defender for APIs
165165
- Unused API endpoints should be disabled and removed from Function Apps (Preview)
166166
- Unused API endpoints should be disabled and removed from Logic Apps (Preview)
167+
- Authentication should be enabled on API endpoints hosted in Function Apps (Preview)
168+
- Authentication should be enabled on API endpoints hosted in Logic Apps (Preview)
167169
168170
- question: |
169171
Are there any limitations to Defender for Cloud's identity and access protections?

articles/defender-for-cloud/recommendations-reference-api.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,16 +47,28 @@ To learn about actions that you can take in response to these recommendations, s
4747

4848
### Unused API endpoints should be disabled and removed from Function Apps (Preview)
4949

50-
**Description & related policy**: API endpoints that haven't received traffic for 30 days are considered unused and pose a potential security risk. These endpoints may have been left active accidentally when they should have been deprecated. Often, unused API endpoints lack the latest security updates, making them vulnerable. To prevent potential security breaches, we recommend disabling and removing these HTTP-triggered endpoints from Azure Function Apps.
50+
**Description & related policy**: API endpoints that haven't received traffic for 30 days are considered unused and pose a potential security risk. These endpoints may have been left active accidentally when they should have been deprecated. Often, unused API endpoints lack the latest security updates, making them vulnerable. To prevent potential security breaches, we recommend disabling and removing these HTTP-triggered endpoints from Azure Function Apps.
5151

5252
**Severity**: Low
5353

5454
### Unused API endpoints should be disabled and removed from Logic Apps (Preview)
5555

56-
**Description & related policy**: API endpoints that haven't received traffic for 30 days are considered unused and pose a potential security risk. These endpoints may have been left active accidentally when they should have been deprecated. Often, unused API endpoints lack the latest security updates, making them vulnerable. To prevent potential security breaches, we recommend disabling and removing these endpoints from Azure Logic Apps.
56+
**Description & related policy**: API endpoints that haven't received traffic for 30 days are considered unused and pose a potential security risk. These endpoints may have been left active accidentally when they should have been deprecated. Often, unused API endpoints lack the latest security updates, making them vulnerable. To prevent potential security breaches, we recommend disabling and removing these endpoints from Azure Logic Apps.
5757

5858
**Severity**: Low
5959

60+
### Authentication should be enabled on API endpoints hosted in Function Apps (Preview)
61+
62+
**Description & related policy**: API endpoints published within Azure Function Apps should enforce authentication to help minimize security risk. This is crucial to prevent unauthorized access and potential data breaches. Without proper authentication, sensitive data could be exposed, compromising the security of the system.
63+
64+
**Severity**: High
65+
66+
### Authentication should be enabled on API endpoints hosted in Logic Apps (Preview)
67+
68+
**Description & related policy**: API endpoints published within Azure Logic Apps should enforce authentication to help minimize security risk. This is crucial to prevent unauthorized access and potential data breaches. Without proper authentication, sensitive data could be exposed, compromising the security of the system.
69+
70+
**Severity**: High
71+
6072
## API management recommendations
6173

6274
### API Management subscriptions shouldn't be scoped to all APIs

0 commit comments

Comments
 (0)