You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Azure Kubernetes Service (AKS) Security Dashboard
3
-
description: Explain the views and actions in the AKS security Dashboard to enable and protect an individual cluster with Defender for Containers.
2
+
title: Review security findings in the AKS security dashboard
3
+
description: Learn how to review and investigate alerts, vulnerabilities, misconfigurations, and compliance findings in the AKS security dashboard in Microsoft Defender for Cloud.
4
4
ms.author: elkrieger
5
-
ms.topic: concept-article
6
-
ms.date: 03/23/2026
7
-
CustomerIntent: As the person responsible for the security of a cluster, I want know what views and actions the cluster security dashboard provides, so I can remediate security issues in the cluster.
5
+
ms.topic: how-to
6
+
ms.date: 04/05/2026
7
+
ms.service: defender-for-cloud
8
8
---
9
9
10
-
# Azure Kubernetes Service (AKS) Security Dashboard
10
+
# Review security findings in the AKS security dashboard
11
11
12
12
The AKS security dashboard shows security findings for an Azure Kubernetes Service (AKS) cluster in Microsoft Defender for Cloud.
13
13
14
14
It includes alerts, vulnerabilities, misconfigurations, and compliance results to help you identify and prioritize issues.
15
15
16
16
## Prerequisites
17
17
18
-
To use the AKS Security dashvoard, ensure you have:
18
+
To use the AKS Security dashboard, ensure you have:
19
19
20
20
- A Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
21
21
22
22
-[Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) enabled with one of the following plans:
23
23
-[Defender for Containers](tutorial-enable-containers-azure.md)
24
24
-[Defender CSPM](tutorial-enable-cspm-plan.md)
25
25
26
+
## Review security findings
27
+
26
28
## Security alerts
27
29
28
30
Security alerts indicate suspicious activity or potential threats detected in the cluster.
@@ -38,25 +40,27 @@ Alerts are prioritized by severity to help you identify which issues to investig
38
40
39
41
1. Sign in to the [Azure portal](https://portal.azure.com/).
40
42
41
-
1. Search for **Kubernetes Services**.
42
-
43
-
1. Go to **Clusters**.
43
+
1. Go to **Kubernetes services** > **Clusters**.
44
44
45
45
1. Select the relevant AKS cluster.
46
46
47
-
5. In the **Security alerts** tab, select an alert.
48
-
49
47
1. Select **Microsoft Defender for Cloud**.
50
48
51
-
1. Review the alert details and recommended remediation steps.
49
+
1. In the **Security alerts** tab, select an alert to open the details pane.
50
+
51
+
In the details pane:
52
52
53
-
1. Use related entities to identify affected resources.
53
+
- Review the alert details and recommended remediation steps.
54
+
- Use related entities to identify affected resources.
55
+
- Select **Open logs** to investigate activity within the relevant timeframe.
56
+
- Create a suppression rule if the alert isn't relevant for your organization.
57
+
- Configure security rules for supported alert types.
54
58
55
-
1. Select **Open logs** to investigate activity within the relevant timeframe.
59
+
After you mitigate the issue, update the alert status.
56
60
57
-
1. Update the alert status after remediation.
61
+
:::image type="content" source="media/cluster-security-dashboard/alerts-tab-security-findings.png" alt-text="Screenshot of the Security alerts tab showing alert details." lightbox="media/cluster-security-dashboard/alerts-tab-security-findings.png":::
58
62
59
-
###Vulnerability assessment
63
+
## Vulnerability assessment
60
64
61
65
The vulnerability assessment section shows vulnerabilities for running container images and Kubernetes node pools.
62
66
@@ -69,53 +73,81 @@ Vulnerabilities can include:
69
73
-**OS packages** (Linux and Windows)
70
74
-**Language-specific packages** (Linux)
71
75
72
-
Learn how to [review vulnerability findings](how-to-use-azure-kubernetes-service-dashboard.md#review-vulnerability-assessment-findings).
76
+
For supported configurations, see the [support matrix for Defender for Containers](/azure/defender-for-cloud/support-matrix-defender-for-containers).
77
+
78
+
### Review vulnerability findings
79
+
80
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
81
+
82
+
1. Go to **Kubernetes services** > **Clusters**.
83
+
84
+
1. Select the relevant AKS cluster.
85
+
86
+
1. Select **Microsoft Defender for Cloud**.
87
+
88
+
1. In the **Vulnerabilities** tab, select a component to open the details pane.
89
+
90
+
In the details pane:
91
+
92
+
- Review affected packages and associated CVEs.
93
+
- Identify the fixed version for the vulnerable package.
94
+
- Update the container image or dependency to remediate the issue.
73
95
74
-
### Misconfigurations
96
+
If expected vulnerabilities don't appear, verify that the image, package type, and environment are supported. See the [support matrix for Defender for Containers](/azure/defender-for-cloud/support-matrix-defender-for-containers).
97
+
98
+
:::image type="content" source="media/cluster-security-dashboard/vulnerabilities-assessment-tab.png" alt-text="Screenshot of the Vulnerabilities tab showing vulnerable components and severity." lightbox="media/cluster-security-dashboard/vulnerabilities-assessment-tab.png":::
99
+
100
+
## Misconfigurations
75
101
76
102
Misconfigurations identify security configuration issues in Kubernetes resources, cluster settings, and running workloads.
77
103
78
104
Findings are based on Azure Policy and Kubernetes configuration assessments.
79
105
80
106
Each finding includes remediation guidance. Some findings support automated remediation through **Quick Fix** or policy enforcement.
81
107
82
-
Learn how to [review and remediate misconfigurations](how-to-use-azure-kubernetes-service-dashboard.md#review-and-remediate-misconfigurations).
108
+
### Review and remediate misconfigurations
83
109
84
-
### Compliance
110
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
85
111
86
-
The compliance section shows the cluster’s status against regulatory standards and benchmarks.
112
+
1. Go to **Kubernetes services** > **Clusters**.
87
113
88
-
It lists controls that the cluster doesn't meet and provides recommendations to help you remediate them.
114
+
1. Select the relevant AKS cluster.
89
115
90
-
Learn how to [assess compliance](how-to-use-azure-kubernetes-service-dashboard.md#assess-compliance-with-regulatory-standards).
116
+
1. Select **Microsoft Defender for Cloud**.
91
117
92
-
### Settings
118
+
1. In the **Misconfigurations** tab, select a finding to open the details pane.
93
119
94
-
#### Plan enablement
120
+
In the details pane:
95
121
96
-
Enable Microsoft Defender for Cloud containers protection (Defender for Containers) for a single AKS cluster or at the subscription level to protect all clusters in that subscription.
122
+
- Review the description and remediation steps.
123
+
- For cluster-level misconfigurations, select **Quick Fix** when available.
124
+
- For workload issues, apply the recommended Azure Policy to prevent recurrence.
125
+
- Assign an owner to track remediation (requires Defender CSPM).
97
126
98
-
> [!NOTE]
99
-
>
100
-
> - When you enable Defender for Containers at the subscription level, you can only change plan settings at the subscription level.
101
-
>
102
-
> - By enabling other Microsoft Defender for Cloud plans, you can scan all your cloud assets to identify cross-resource attack paths, more accurately identify risk, and provide alerts and full visibility into cross-resource security incidents. [Learn more.](/azure/defender-for-cloud/defender-for-cloud-introduction)
103
-
>
104
-
> - If you configure settings at the subscription level, they override any settings configured at the cluster level.
127
+
:::image type="content" source="media/cluster-security-dashboard/misconfigurations-assessment-tab.png" alt-text="Screenshot of the Misconfigurations tab displaying security configuration issues." lightbox="media/cluster-security-dashboard/misconfigurations-assessment-tab.png":::
105
128
129
+
## Compliance
106
130
107
-
#### Plan configurations
131
+
The compliance section shows the cluster’s status against regulatory standards and benchmarks.
108
132
109
-
-**Defender Sensor** – Deploys the Defender for Containers agent on the cluster. This sensor is required for runtime threat protection and gated deployment capabilities.
133
+
It lists controls that the cluster doesn't meet and provides recommendations to help you remediate them.
134
+
135
+
### Assess compliance
136
+
137
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
110
138
111
-
-**Kubernetes API access**– Required for vulnerability assessment, misconfigurations, compliance assessment, and runtime threat protection.
139
+
1. Go to **Kubernetes services**> **Clusters**.
112
140
113
-
-**Registry access** – Required for vulnerability assessment and gated deployment capabilities.
141
+
1. Select the relevant AKS cluster.
142
+
143
+
1. Select **Microsoft Defender for Cloud**.
114
144
115
-
-**Azure policy**- Deploys an agent on the cluster to generate recommendations for hardening the cluster data plane.
145
+
1. In the **Compliance**tab, review failing controls.
116
146
147
+
1. Select a control to open the details pane.
117
148
118
-
## Next steps
149
+
1. Review the recommendation and remediation steps.
119
150
120
-
- Learn how to use the [AKS Security Dashboard](how-to-use-azure-kubernetes-service-dashboard.md)
151
+
1. Apply the required changes to meet the control.
121
152
153
+
:::image type="content" source="media/cluster-security-dashboard/compliance-standards-tab.png" alt-text="Screenshot of the Compliance tab showing regulatory compliance assessment results." lightbox="media/cluster-security-dashboard/compliance-standards-tab.png":::
0 commit comments