Skip to content

Commit a30d9c6

Browse files
committed
edited to aks dashboard page
1 parent f9d9e97 commit a30d9c6

1 file changed

Lines changed: 44 additions & 31 deletions

File tree

articles/defender-for-cloud/cluster-security-dashboard.md

Lines changed: 44 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -9,72 +9,85 @@ CustomerIntent: As the person responsible for the security of a cluster, I want
99

1010
# Azure Kubernetes Service (AKS) Security Dashboard
1111

12-
The AKS security dashboard gives visibility and automated remediation for security issues. It lets platform engineering teams secure their Kubernetes environment more easily and effectively.
12+
The AKS security dashboard shows security findings for an Azure Kubernetes Service (AKS) cluster in Microsoft Defender for Cloud.
1313

14-
Consolidating security and operational data within the AKS portal gives engineers a unified view of their Kubernetes environment. This view helps detect and fix security issues efficiently, with minimal workflow disruption. It lowers the risk of missed security issues and speeds up remediation.
14+
It includes alerts, vulnerabilities, misconfigurations, and compliance results to help you identify and prioritize issues.
1515

16-
The AKS Security Dashboard helps you:
16+
## Prerequisites
1717

18-
- Review, investigate, and get guided remediation for runtime threat detection alerts, vulnerability assessment, security misconfigurations, and deviation from compliance standards.
19-
- Enable the Defender for Containers plan and configure settings for the specific AKS cluster.
20-
- Assign an owner and track progress on a security issue. This feature works when Defender Cloud Security Posture Management (Defender CSPM) is turned on for the subscription.
18+
To use the AKS Security dashvoard, ensure you have:
2119

22-
## Understand the dashboard sections
20+
- A Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
2321

24-
### Security findings for this cluster
22+
- [Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) enabled with one of the following plans:
23+
- [Defender for Containers](tutorial-enable-containers-azure.md)
24+
- [Defender CSPM](tutorial-enable-cspm-plan.md)
2525

26-
The security findings bar shows the security status of the cluster. For each findings type, it shows the number of the highest severity or risk issues. Use the top findings to decide whether to check the different tabs for further investigation.
26+
## Security alerts
2727

28-
:::image type="content" source="media/cluster-security-dashboard/security-findings-summary-bar.png" alt-text="Screenshot of the security findings summary bar." lightbox="media/cluster-security-dashboard/security-findings-summary-bar.png":::
28+
Security alerts indicate suspicious activity or potential threats detected in the cluster.
2929

30-
### Security alerts
30+
Alerts are prioritized by severity to help you identify which issues to investigate first:
3131

32-
Security alerts are notifications from Defender for Cloud about suspicious activity or active potential threats in your environment. The service prioritizes the alerts by risk.
32+
- **High** High probability that the resource is compromised. Investigate immediately.
33+
- **Medium** Indicates suspicious activity that might represent a compromise.
34+
- **Low** Might indicate a benign or blocked activity.
35+
- **Informational** Provides context and might be relevant when correlated with other alerts.
3336

34-
When you select an alert, you open a panel that provides more information about the detection that triggered the alert. The panel also suggests actions you can take to resolve the issue.
37+
### Investigate a security alert
3538

36-
#### Alert severity
39+
1. Sign in to the [Azure portal](https://portal.azure.com/).
3740

38-
- **High** There's a high probability that your resource is compromised. Investigate immediately.
41+
1. Search for **Kubernetes Services**.
3942

40-
- **Medium** The alert probably indicates suspicious activity and might show that a resource is compromised. The confidence in the analytic or finding is medium. The confidence of the malicious intent is medium to high. These alerts might come from machine learning or anomaly based detections.
43+
1. Go to **Clusters**.
4144

42-
- **Low** This alert might be a false positive or a blocked attack.
45+
1. Select the relevant AKS cluster.
4346

44-
- **Informational** An incident typically includes several alerts. Some alerts might appear on their own to be only informational, but in the context of the other alerts, they might warrant a closer look.
47+
5. In the **Security alerts** tab, select an alert.
4548

46-
To investigate alerts, see [How to use the AKS Security Dashboard](how-to-use-azure-kubernetes-service-dashboard.md#investigate-an-alert).
49+
1. Select **Microsoft Defender for Cloud**.
4750

51+
1. Review the alert details and recommended remediation steps.
4852

49-
### Vulnerability assessment
53+
1. Use related entities to identify affected resources.
54+
55+
1. Select **Open logs** to investigate activity within the relevant timeframe.
56+
57+
1. Update the alert status after remediation.
5058

51-
The AKS security dashboard shows software vulnerability scan results for running containers and the cluster's node pools. It generates a prioritized list of vulnerable components. A dynamic engine ranks this list by assessing the risks in your environment (available with Defender CSPM plan enabled) and considers the potential for exploitation.
59+
### Vulnerability assessment
5260

53-
The scanning of container images includes the following types of packages:
61+
The vulnerability assessment section shows vulnerabilities for running container images and Kubernetes node pools.
5462

55-
- **OS packages:** Scans for vulnerabilities in packages that the OS package manager installs in both Linux and Windows OS. See the [full list of the supported OS and their versions](/azure/defender-for-cloud/support-matrix-defender-for-containers).
63+
Findings are prioritized by severity. When Defender CSPM is enabled, prioritization also considers contextual risk signals.
5664

57-
- **Language-specific packages (Linux only):** Supports scanning for language-specific packages and files, along with their dependencies, that are installed or copied without using the OS package manager. See the [complete list of supported languages](/azure/defender-for-cloud/support-matrix-defender-for-containers).
65+
Each finding includes affected packages, associated CVEs, and the fixed version to remediate the issue.
5866

59-
For more details on how to use the vulnerability assessment findings, see [review vulnerability assessment findings](how-to-use-azure-kubernetes-service-dashboard.md#review-vulnerability-assessment-findings).
67+
Vulnerabilities can include:
6068

61-
To review and remediate vulnerabilities, see [Review vulnerability findings](how-to-use-azure-kubernetes-service-dashboard.md#review-vulnerability-assessment-findings).
69+
- **OS packages** (Linux and Windows)
70+
- **Language-specific packages** (Linux)
6271

72+
Learn how to [review vulnerability findings](how-to-use-azure-kubernetes-service-dashboard.md#review-vulnerability-assessment-findings).
6373

6474
### Misconfigurations
6575

66-
Microsoft Defender for Cloud continuously monitors Azure and AKS APIs, along with Kubernetes workloads. It identifies configurations within the cluster or its running containers that could affect the cluster's security posture and expose the cluster to risk. Defender also offers guidelines and automatic fixes to address these issues.
76+
Misconfigurations identify security configuration issues in Kubernetes resources, cluster settings, and running workloads.
6777

68-
To review and fix misconfigurations, see [Review misconfigurations](how-to-use-azure-kubernetes-service-dashboard.md#review-misconfiguration-assessment-findings).
78+
Findings are based on Azure Policy and Kubernetes configuration assessments.
6979

80+
Each finding includes remediation guidance. Some findings support automated remediation through **Quick Fix** or policy enforcement.
7081

71-
### Compliance
82+
Learn how to [review and remediate misconfigurations](how-to-use-azure-kubernetes-service-dashboard.md#review-and-remediate-misconfigurations).
7283

73-
Defender for Cloud continuously assesses your environment against selected regulatory standards and benchmarks. It provides a clear view of your compliance status, highlights unmet requirements, and offers recommendations to help you improve your cloud security posture.
84+
### Compliance
7485

86+
The compliance section shows the cluster’s status against regulatory standards and benchmarks.
7587

76-
To assess and remediate compliance issues, see [Assess compliance with regulatory standards](how-to-use-azure-kubernetes-service-dashboard.md#assess-compliance-with-regulatory-standards).
88+
It lists controls that the cluster doesn't meet and provides recommendations to help you remediate them.
7789

90+
Learn how to [assess compliance](how-to-use-azure-kubernetes-service-dashboard.md#assess-compliance-with-regulatory-standards).
7891

7992
### Settings
8093

0 commit comments

Comments
 (0)