Skip to content

Commit 258d7fa

Browse files
committed
First push of new module
1 parent d85b6ce commit 258d7fa

22 files changed

Lines changed: 483 additions & 0 deletions
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.identify-security-risks-posture-management.introduction
3+
metadata:
4+
title: Introduction
5+
description: Introduction to identifying security risks using Cloud Security Posture Management in Microsoft Defender for Cloud.
6+
ms.date: 03/26/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Introduction
12+
durationInMinutes: 2
13+
content: |
14+
[!include[](includes/1-introduction.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.identify-security-risks-posture-management.explore-plans-posture-visibility
3+
metadata:
4+
title: Explore CSPM plans and posture visibility
5+
description: Compare Foundational CSPM and Defender CSPM plan capabilities, navigate the Cloud Overview dashboard in the Defender portal, discover AI workloads with AI security posture management, and understand the risk-based Cloud Secure Score.
6+
ms.date: 03/26/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Explore CSPM plans and posture visibility
12+
durationInMinutes: 7
13+
content: |
14+
[!include[](includes/2-explore-plans-posture-visibility.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.identify-security-risks-posture-management.analyze-security-recommendations-risk-prioritization
3+
metadata:
4+
title: Analyze security recommendations with risk prioritization
5+
description: Use the risk-based prioritization model in Microsoft Defender for Cloud to triage security recommendations across cloud and AI workloads, identify AI-specific findings, and investigate individual recommendations.
6+
ms.date: 03/26/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Analyze security recommendations with risk prioritization
12+
durationInMinutes: 7
13+
content: |
14+
[!include[](includes/3-analyze-security-recommendations-risk-prioritization.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.identify-security-risks-posture-management.identify-attack-paths-choke-points
3+
metadata:
4+
title: Identify attack paths and choke points
5+
description: Use attack path analysis in Microsoft Defender for Cloud to locate externally exploitable attack chains, identify choke points, investigate nodes with MITRE ATT&CK context, and understand how attack paths extend to AI workloads.
6+
ms.date: 03/26/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Identify attack paths and choke points
12+
durationInMinutes: 7
13+
content: |
14+
[!include[](includes/4-identify-attack-paths-choke-points.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.identify-security-risks-posture-management.hunt-risks-cloud-security-explorer
3+
metadata:
4+
title: Hunt for risks with cloud security explorer
5+
description: Use Cloud Security Explorer in the Azure portal to build graph-based queries that proactively discover security risks — including internet exposure, secrets, and lateral movement paths — across your Azure environment.
6+
ms.date: 03/26/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Hunt for risks with cloud security explorer
12+
durationInMinutes: 7
13+
content: |
14+
[!include[](includes/5-hunt-risks-cloud-security-explorer.md)]
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.identify-security-risks-posture-management.knowledge-check
3+
metadata:
4+
title: Knowledge check
5+
description: Check your knowledge of identifying security risks using Cloud Security Posture Management in Microsoft Defender for Cloud.
6+
ms.date: 03/26/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Knowledge check
12+
durationInMinutes: 3
13+
content: |
14+
[!include[](includes/6-knowledge-check.md)]
15+
quiz:
16+
title: Check your knowledge
17+
questions:
18+
- content: "Your organization wants to enable attack path analysis and AI security posture management for Azure OpenAI and Azure AI Foundry workloads. Which Defender for Cloud plan provides these capabilities?"
19+
choices:
20+
- content: "Foundational CSPM"
21+
isCorrect: false
22+
explanation: "Incorrect. Foundational CSPM is enabled by default and provides secure score, recommendations, and asset inventory. It doesn't include attack path analysis or AI security posture management — those require the Defender CSPM plan."
23+
- content: "Defender CSPM"
24+
isCorrect: true
25+
explanation: "Correct. Defender CSPM is the paid plan that adds attack path analysis, risk prioritization, AI security posture management, cloud security explorer, and data security posture management beyond the free Foundational CSPM capabilities."
26+
- content: "Microsoft Defender for Servers"
27+
isCorrect: false
28+
explanation: "Incorrect. Defender for Servers provides workload protection and vulnerability assessment for virtual machines. It doesn't provide CSPM-level attack path analysis or AI workload posture management."
29+
- content: "Microsoft Defender for AI Services"
30+
isCorrect: false
31+
explanation: "Incorrect. Defender for AI Services provides real-time threat protection for Azure OpenAI and AI Model Inference services. It detects threats such as prompt injection and jailbreak attempts, but it doesn't provide posture management or attack path analysis."
32+
- content: "Two Azure storage accounts have the same misconfiguration. One stores patient health records and is internet-accessible; the other is a non-internet-accessible development storage account. How does the risk-based Cloud Secure Score model in the Defender portal treat these two findings?"
33+
choices:
34+
- content: "Both findings receive the same risk level because the underlying misconfiguration is identical."
35+
isCorrect: false
36+
explanation: "Incorrect. The risk-based model factors in asset context — not just the misconfiguration type. Context such as internet exposure, data sensitivity, and asset criticality determines the risk level, so two assets with the same misconfiguration can receive different risk ratings."
37+
- content: "The internet-exposed storage account with sensitive data receives a higher risk level."
38+
isCorrect: true
39+
explanation: "Correct. The risk-based prioritization engine considers internet exposure, data sensitivity, asset criticality, and lateral movement potential. The internet-exposed storage account with patient health records presents higher real-world exploitation risk and therefore receives a higher risk level."
40+
- content: "Both findings are rated the same because risk level is determined entirely by the MCSB control weight."
41+
isCorrect: false
42+
explanation: "Incorrect. The Microsoft Cloud Security Benchmark (MCSB) maps recommendations to compliance controls, but the risk level in the Defender portal's risk-based model is calculated from environmental context factors such as internet exposure and data sensitivity — not solely from MCSB control weights."
43+
- content: "Only resources with confirmed sensitive data classifications appear in risk-prioritized recommendations."
44+
isCorrect: false
45+
explanation: "Incorrect. Risk prioritization applies to all recommendations. Sensitive data classification is one risk factor that raises the risk level, but resources without detected sensitive data still appear in recommendations and can still have high risk levels based on other factors such as internet exposure."
46+
- content: "During attack path analysis in the Defender portal, you identify a storage account where five separate attack paths converge as they route from internet-exposed virtual machines toward Azure AI services. What term describes this storage account's role in the attack graph?"
47+
choices:
48+
- content: "Entry point"
49+
isCorrect: false
50+
explanation: "Incorrect. An entry point is the external access location where an attack begins, such as an internet-exposed virtual machine or publicly accessible endpoint. The storage account is an intermediate resource, not where the attack originates."
51+
- content: "Target asset"
52+
isCorrect: false
53+
explanation: "Incorrect. A target asset is the critical resource that the attacker is ultimately trying to reach, such as a database or AI service endpoint containing valuable data. The storage account in this example is an intermediate node, not the final target."
54+
- content: "Choke point"
55+
isCorrect: true
56+
explanation: "Correct. A choke point is a node in the attack graph where multiple attack paths converge. Remediating the security issue on a choke point can break several attack paths simultaneously, making choke points the highest-leverage remediation targets."
57+
- content: "Vulnerable node"
58+
isCorrect: false
59+
explanation: "Incorrect. A vulnerable node is any resource along an attack path that has a security issue enabling lateral movement. While a choke point is likely also a vulnerable node, the specific characteristic described — where multiple paths converge — defines a choke point."
60+
- content: "You want to use Cloud Security Explorer to build a custom query for virtual machines with high-severity vulnerabilities that also have network access to Azure AI services. In which portal do you access Cloud Security Explorer?"
61+
choices:
62+
- content: "Microsoft Defender portal (security.microsoft.com)"
63+
isCorrect: false
64+
explanation: "Incorrect. The Microsoft Defender portal is where you access the Cloud Overview dashboard, risk-prioritized recommendations, and attack path analysis. Cloud Security Explorer is accessed through the Azure portal."
65+
- content: "Azure portal (portal.azure.com)"
66+
isCorrect: true
67+
explanation: "Correct. Cloud Security Explorer is available in the Azure portal. Navigate to portal.azure.com, open Microsoft Defender for Cloud, and then select Cloud Security Explorer to build graph-based queries against the cloud security graph."
68+
- content: "Microsoft Entra admin center (entra.microsoft.com)"
69+
isCorrect: false
70+
explanation: "Incorrect. The Microsoft Entra admin center is used for managing identity, access, and conditional access policies. Cloud Security Explorer is a Defender for Cloud feature available in the Azure portal."
71+
- content: "Microsoft Azure Resource Manager"
72+
isCorrect: false
73+
explanation: "Incorrect. Azure Resource Manager is the deployment and management service for Azure resources. Cloud Security Explorer is a Microsoft Defender for Cloud feature accessed through the Azure portal."
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.identify-security-risks-posture-management.summary
3+
metadata:
4+
title: Summary
5+
description: Summary of identifying security risks using Cloud Security Posture Management in Microsoft Defender for Cloud.
6+
ms.date: 03/26/2026
7+
author: r-c-stewart
8+
ms.author: roberts
9+
ms.topic: unit
10+
ai-usage: ai-generated
11+
title: Summary
12+
durationInMinutes: 2
13+
content: |
14+
[!include[](includes/7-summary.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
Contoso Healthcare Systems operates a large Azure environment that includes core clinical and administrative workloads alongside expanding AI-powered applications — a patient triage assistant built on Azure OpenAI and an AI-driven medical records summarization service running on Azure AI Foundry. The security team receives hundreds of daily security recommendations but has no structured method to determine which risks represent real, exploitable threats to patient data, AI model integrity, or business continuity.
2+
3+
Microsoft Defender for Cloud's Cloud Security Posture Management (CSPM) capabilities provide continuous visibility, risk-based prioritization, attack path analysis, and proactive risk hunting to address exactly this challenge. CSPM helps you identify which misconfigurations and exposures matter most by showing you how attackers could exploit them to reach your critical assets.
4+
5+
In this module, you learn to use CSPM features to identify and prioritize security risks across your Azure environment. Specifically, you:
6+
7+
- Compare Foundational CSPM and Defender CSPM plan capabilities, including AI security posture management features
8+
- Interpret the Cloud Secure Score and security recommendations using the risk-based prioritization model in the Microsoft Defender portal
9+
- Identify externally exploitable attack paths — including those targeting AI workloads — using attack path analysis
10+
- **Initial Access** — internet-exposed resources that serve as entry points into the environment
11+
- **Lateral Movement** — paths an attacker can follow from one resource to another, including toward AI services
12+
- **Exfiltration** — routes that lead to critical data such as patient health records or AI model training datasets
13+
- **Privilege Escalation** — identity and permission misconfigurations that enable attackers to gain elevated access along a path
14+
- Run graph-based queries in Cloud Security Explorer to proactively discover security risks

0 commit comments

Comments
 (0)