You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/cluster-security-dashboard.md
+44-31Lines changed: 44 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,72 +9,85 @@ CustomerIntent: As the person responsible for the security of a cluster, I want
9
9
10
10
# Azure Kubernetes Service (AKS) Security Dashboard
11
11
12
-
The AKS security dashboard gives visibility and automated remediation for security issues. It lets platform engineering teams secure their Kubernetes environment more easily and effectively.
12
+
The AKS security dashboard shows security findings for an Azure Kubernetes Service (AKS) cluster in Microsoft Defender for Cloud.
13
13
14
-
Consolidating security and operational data within the AKS portal gives engineers a unified view of their Kubernetes environment. This view helps detect and fix security issues efficiently, with minimal workflow disruption. It lowers the risk of missed security issues and speeds up remediation.
14
+
It includes alerts, vulnerabilities, misconfigurations, and compliance results to help you identify and prioritize issues.
15
15
16
-
The AKS Security Dashboard helps you:
16
+
## Prerequisites
17
17
18
-
- Review, investigate, and get guided remediation for runtime threat detection alerts, vulnerability assessment, security misconfigurations, and deviation from compliance standards.
19
-
- Enable the Defender for Containers plan and configure settings for the specific AKS cluster.
20
-
- Assign an owner and track progress on a security issue. This feature works when Defender Cloud Security Posture Management (Defender CSPM) is turned on for the subscription.
18
+
To use the AKS Security dashvoard, ensure you have:
21
19
22
-
## Understand the dashboard sections
20
+
- A Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
23
21
24
-
### Security findings for this cluster
22
+
-[Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) enabled with one of the following plans:
23
+
-[Defender for Containers](tutorial-enable-containers-azure.md)
24
+
-[Defender CSPM](tutorial-enable-cspm-plan.md)
25
25
26
-
The security findings bar shows the security status of the cluster. For each findings type, it shows the number of the highest severity or risk issues. Use the top findings to decide whether to check the different tabs for further investigation.
26
+
## Security alerts
27
27
28
-
:::image type="content" source="media/cluster-security-dashboard/security-findings-summary-bar.png" alt-text="Screenshot of the security findings summary bar." lightbox="media/cluster-security-dashboard/security-findings-summary-bar.png":::
28
+
Security alerts indicate suspicious activity or potential threats detected in the cluster.
29
29
30
-
### Security alerts
30
+
Alerts are prioritized by severity to help you identify which issues to investigate first:
31
31
32
-
Security alerts are notifications from Defender for Cloud about suspicious activity or active potential threats in your environment. The service prioritizes the alerts by risk.
32
+
-**High** High probability that the resource is compromised. Investigate immediately.
33
+
-**Medium** Indicates suspicious activity that might represent a compromise.
34
+
-**Low** Might indicate a benign or blocked activity.
35
+
-**Informational** Provides context and might be relevant when correlated with other alerts.
33
36
34
-
When you select an alert, you open a panel that provides more information about the detection that triggered the alert. The panel also suggests actions you can take to resolve the issue.
37
+
### Investigate a security alert
35
38
36
-
#### Alert severity
39
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
37
40
38
-
-**High** There's a high probability that your resource is compromised. Investigate immediately.
41
+
1. Search for **Kubernetes Services**.
39
42
40
-
-**Medium** The alert probably indicates suspicious activity and might show that a resource is compromised. The confidence in the analytic or finding is medium. The confidence of the malicious intent is medium to high. These alerts might come from machine learning or anomaly based detections.
43
+
1. Go to **Clusters**.
41
44
42
-
-**Low** This alert might be a false positive or a blocked attack.
45
+
1. Select the relevant AKS cluster.
43
46
44
-
-**Informational** An incident typically includes several alerts. Some alerts might appear on their own to be only informational, but in the context of the other alerts, they might warrant a closer look.
47
+
5. In the **Security alerts** tab, select an alert.
45
48
46
-
To investigate alerts, see [How to use the AKS Security Dashboard](how-to-use-azure-kubernetes-service-dashboard.md#investigate-an-alert).
49
+
1. Select **Microsoft Defender for Cloud**.
47
50
51
+
1. Review the alert details and recommended remediation steps.
48
52
49
-
### Vulnerability assessment
53
+
1. Use related entities to identify affected resources.
54
+
55
+
1. Select **Open logs** to investigate activity within the relevant timeframe.
56
+
57
+
1. Update the alert status after remediation.
50
58
51
-
The AKS security dashboard shows software vulnerability scan results for running containers and the cluster's node pools. It generates a prioritized list of vulnerable components. A dynamic engine ranks this list by assessing the risks in your environment (available with Defender CSPM plan enabled) and considers the potential for exploitation.
59
+
### Vulnerability assessment
52
60
53
-
The scanning of container images includes the following types of packages:
61
+
The vulnerability assessment section shows vulnerabilities for running container images and Kubernetes node pools.
54
62
55
-
-**OS packages:** Scans for vulnerabilities in packages that the OS package manager installs in both Linux and Windows OS. See the [full list of the supported OS and their versions](/azure/defender-for-cloud/support-matrix-defender-for-containers).
63
+
Findings are prioritized by severity. When Defender CSPM is enabled, prioritization also considers contextual risk signals.
56
64
57
-
-**Language-specific packages (Linux only):** Supports scanning for language-specific packages and files, along with their dependencies, that are installed or copied without using the OS package manager. See the [complete list of supported languages](/azure/defender-for-cloud/support-matrix-defender-for-containers).
65
+
Each finding includes affected packages, associated CVEs, and the fixed version to remediate the issue.
58
66
59
-
For more details on how to use the vulnerability assessment findings, see [review vulnerability assessment findings](how-to-use-azure-kubernetes-service-dashboard.md#review-vulnerability-assessment-findings).
67
+
Vulnerabilities can include:
60
68
61
-
To review and remediate vulnerabilities, see [Review vulnerability findings](how-to-use-azure-kubernetes-service-dashboard.md#review-vulnerability-assessment-findings).
69
+
-**OS packages** (Linux and Windows)
70
+
-**Language-specific packages** (Linux)
62
71
72
+
Learn how to [review vulnerability findings](how-to-use-azure-kubernetes-service-dashboard.md#review-vulnerability-assessment-findings).
63
73
64
74
### Misconfigurations
65
75
66
-
Microsoft Defender for Cloud continuously monitors Azure and AKS APIs, along with Kubernetes workloads. It identifies configurations within the cluster or its running containers that could affect the cluster's security posture and expose the cluster to risk. Defender also offers guidelines and automatic fixes to address these issues.
76
+
Misconfigurations identify security configuration issues in Kubernetes resources, cluster settings, and running workloads.
67
77
68
-
To review and fix misconfigurations, see [Review misconfigurations](how-to-use-azure-kubernetes-service-dashboard.md#review-misconfiguration-assessment-findings).
78
+
Findings are based on Azure Policy and Kubernetes configuration assessments.
69
79
80
+
Each finding includes remediation guidance. Some findings support automated remediation through **Quick Fix** or policy enforcement.
70
81
71
-
### Compliance
82
+
Learn how to [review and remediate misconfigurations](how-to-use-azure-kubernetes-service-dashboard.md#review-and-remediate-misconfigurations).
72
83
73
-
Defender for Cloud continuously assesses your environment against selected regulatory standards and benchmarks. It provides a clear view of your compliance status, highlights unmet requirements, and offers recommendations to help you improve your cloud security posture.
84
+
### Compliance
74
85
86
+
The compliance section shows the cluster’s status against regulatory standards and benchmarks.
75
87
76
-
To assess and remediate compliance issues, see [Assess compliance with regulatory standards](how-to-use-azure-kubernetes-service-dashboard.md#assess-compliance-with-regulatory-standards).
88
+
It lists controls that the cluster doesn't meet and provides recommendations to help you remediate them.
77
89
90
+
Learn how to [assess compliance](how-to-use-azure-kubernetes-service-dashboard.md#assess-compliance-with-regulatory-standards).
0 commit comments