Skip to content

Commit ddcdd67

Browse files
committed
documentor
1 parent 573b0df commit ddcdd67

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

articles/defender-for-cloud/gated-deployment-infrastructure-as-code.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010

1111
# Gated deployment for Infrastructure as Code
1212

13-
Microsoft Defender for Cloud's gated deployment agent is a Kubernetes admission controller that enforces container image security policies at deployment time. Gated deployment acts a gatekeeper for container images for known security issues at deployment time and decides whether theyre allowed to run.
13+
Microsoft Defender for Cloud's gated deployment agent is a Kubernetes admission controller that enforces container image security policies at deployment time. Gated deployment acts as a gatekeeper for container images for known security problems at deployment time and decides whether they're allowed to run.
1414

1515
The gated deployment agent requires read access to all of your Azure Container Registries (ACRs) associated with the cluster. These registries store the container images alongside the vulnerability assessment artifacts generated by Defender for Containers. To enable this access, configure a Managed Service Identity (MSI) with the required ACR read permissions and assign it to the agent.
1616

@@ -22,11 +22,11 @@ The gated deployment agent requires read access to all of your Azure Container R
2222

2323
## Deploy the gated agent
2424

25-
1. [Create a Managed Service Identity (MSI) that the gated deployment agent uses.](/entra/identity/managed-identities-azure-resources/manage-user-assigned-managed-identities-azure-portal).
25+
1. [Create a Managed Service Identity (MSI) that the gated deployment agent uses](/entra/identity/managed-identities-azure-resources/manage-user-assigned-managed-identities-azure-portal).
2626

27-
1. [Assign the AcrPull role (or equivalent read role)](/azure/container-registry/container-registry-rbac-built-in-roles-overview?tabs=registries-configured-with-rbac-registry-abac-repository-permissions) to the MSI on all ACRs used by the cluster.
27+
1. [Assign the AcrPull role (or equivalent read role)](/azure/container-registry/container-registry-rbac-built-in-roles-overview?tabs=registries-configured-with-rbac-registry-abac-repository-permissions) to the MSI on all ACRs the cluster uses.
2828

29-
1. [Add a Federated Identity Credential (FIC) to the MSI](/graph/api/resources/federatedidentitycredentials-overview?view=graph-rest-1.0) that allows the gated deployment agent to authenticate using AKS Workload Identity, with the following FIC parameters:
29+
1. [Add a Federated Identity Credential (FIC) to the MSI](/graph/api/resources/federatedidentitycredentials-overview?view=graph-rest-1.0) that allows the gated deployment agent to authenticate by using AKS Workload Identity, with the following FIC parameters:
3030

3131
- **Issuer**: The AKS OIDC issuer URL
3232
- **Subject**: The service account used by the gated deployment agent `system:serviceaccount:kube-system:defender-admission-controller-serviceaccount`.

0 commit comments

Comments
 (0)