You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/2-evaluate-security-posture-microsoft-cloud-security-benchmark.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@ Microsoft Defender for Cloud serves as the primary tool for evaluating security
2
2
3
3
## Understanding the Microsoft Cloud Security Benchmark
4
4
5
-
MCSB is a comprehensive set of security best practices organized into security domains. Each domain groups related security recommendations that address a specific area of concern:
5
+
MCSB is a comprehensive set of security best practices organized into security domains. Each domain groups related security recommendations that address a specific area of concern. The following table shows the 12 security domains defined in MCSB v2:
6
6
7
7
| Security domain | Focus area |
8
8
|---|---|
@@ -17,7 +17,6 @@ MCSB is a comprehensive set of security best practices organized into security d
| Artificial intelligence security (AI) | AI platform security, AI application security, AI security monitoring |
22
21
23
22
Each security domain contains security controls and security subcontrols that provide granular, actionable implementation guidance. Controls include a control ID, description, and platform-specific guidance for Azure, AWS, and GCP. MCSB also maps each control to industry frameworks including NIST SP 800-53, CIS Controls, and PCI-DSS, making it suitable as a unified standard for organizations operating across multiple cloud providers.
@@ -57,13 +56,13 @@ When designing your posture management solution, use security baselines to defin
57
56
58
57
Use the following approach to evaluate your security posture against MCSB:
59
58
60
-
**Assess control coverage**: Review each MCSB control domain and determine which controls apply to your environment. Not every control applies to every organization—document which controls are applicable based on your workload types and cloud platforms.
59
+
-**Assess control coverage**: Review each MCSB control domain and determine which controls apply to your environment. Not every control applies to every organization—document which controls are applicable based on your workload types and cloud platforms.
61
60
62
-
**Review recommendations by domain**: In Defender for Cloud, filter security recommendations by MCSB control domain to identify where your resources meet the benchmark and where gaps exist. Focus attention on controls in domains most relevant to your risk profile, such as data protection for environments handling sensitive information, or network security for internet-facing workloads.
61
+
-**Review recommendations by domain**: In Defender for Cloud, filter security recommendations by MCSB control domain to identify where your resources meet the benchmark and where gaps exist. Focus attention on controls in domains most relevant to your risk profile, such as data protection for environments handling sensitive information, or network security for internet-facing workloads.
63
62
64
-
**Map regulatory requirements**: If your organization must comply with standards like NIST SP 800-53, PCI-DSS, or ISO 27001, use MCSB's framework mapping to identify which controls satisfy your regulatory requirements and where extra controls are needed.
63
+
-**Map regulatory requirements**: If your organization must comply with standards like NIST SP 800-53, PCI-DSS, or ISO 27001, use MCSB's framework mapping to identify which controls satisfy your regulatory requirements and where extra controls are needed.
65
64
66
-
**Design an exception process**: For controls that don't apply to specific workloads, create documented exceptions that include the specific control and reasoning, any compensating controls in place, a review cadence for reevaluation, and approval from the appropriate stakeholder.
65
+
-**Design an exception process**: For controls that don't apply to specific workloads, create documented exceptions that include the specific control and reasoning, any compensating controls in place, a review cadence for reevaluation, and approval from the appropriate stakeholder.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/4-evaluate-security-posture-microsoft-defender-cloud.md
Secure score appears in multiple locations, each serving a different evaluation purpose:
50
50
51
-
**Overview dashboard**: The Defender for Cloud overview shows your current score alongside other key security metrics including active recommendations, security alerts, and resource health.
51
+
-**Overview dashboard**: The Defender for Cloud overview shows your current score alongside other key security metrics including active recommendations, security alerts, and resource health.
52
52
53
-
**Secure score dedicated page**: Breaks down the score by subscription. Use this view to compare posture across subscriptions and identify which environments need the most attention.
53
+
-**Secure score dedicated page**: Breaks down the score by subscription. Use this view to compare posture across subscriptions and identify which environments need the most attention.
54
54
55
-
**Management group view**: Toggle the management group view on the secure score page to see scores organized by your Azure management group hierarchy. This helps evaluate posture across organizational units and identify management groups with the weakest security posture.
55
+
-**Management group view**: Toggle the management group view on the secure score page to see scores organized by your Azure management group hierarchy. This helps evaluate posture across organizational units and identify management groups with the weakest security posture.
56
56
57
57
# [Overview dashboard](#tab/overview)
58
58
:::image type="content" source="../media/score-on-main-dashboard.png" alt-text="Screenshot of the Defender for Cloud overview page highlighting the secure score section." lightbox="../media/score-on-main-dashboard.png":::
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/6-design-cloud-workload-protection-microsoft-defender-cloud.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ The key design principle: enable protection plans based on workloads present in
20
20
| APIs | Defender for APIs | APIs published in Azure API Management |
21
21
| Key Vault | Defender for Key Vault | Azure Key Vault secrets, keys, and certificates |
22
22
| Resource Manager | Defender for Resource Manager | Azure Resource Manager control plane activity |
23
-
| AI workloads | Defender for AI Services |Azure OpenAI and other Azure AI services|
23
+
| AI workloads | Defender for AI Services |AI workloads, including Azure OpenAI Service and Microsoft Foundry|
24
24
25
25
## Designing server protection
26
26
@@ -41,9 +41,7 @@ Server protection requires the most architectural decisions. Defender for Server
41
41
42
42
**Plan selection**: Choose Plan 1 for EDR integration and agent-based vulnerability scanning. Choose Plan 2 for agentless scanning, just-in-time access, file integrity monitoring, or premium vulnerability management features. Consider Plan 2 for production servers and Plan 1 for development environments.
43
43
44
-
:::image type="content" source="../media/agentless-scanning-process.png" alt-text="Diagram showing the agentless scanning process where a disk snapshot is taken from a virtual machine, analyzed in an isolated scanning environment, and results sent to Defender for Cloud." lightbox="../media/agentless-scanning-process.png":::
45
-
46
-
**Coverage scope**: Enable at the subscription level for simplest management. Plan 1 can enable at the resource level; Plan 2 requires subscription-level enablement. For multicloud and on-premises servers, deploy Azure Arc for full functionality.
44
+
**Coverage scope**: Enable at the subscription level to automatically protect all servers in that subscription. This is the simplest approach. Plan 1 allows you to selectively enable protection on individual VMs/servers rather than the whole subscription—useful when you only want to protect specific machines. Plan 2 can only be enabled at the subscription level—you can't pick and choose individual resources. For servers outside Azure (on-premises, AWS, GCP), you need to onboard them via Azure Arc first so Defender for Cloud can manage and protect them.
**Defender for Resource Manager** monitors control plane operations for suspicious activity like persistence techniques or lateral movement. Both Key Vault and Resource Manager protection operate at subscription level with no additional configuration.
79
77
80
-
**Defender for AI Services** protects Azure OpenAI and other AI resources, detecting prompt injection attacks and unusual usage patterns. Enable for subscriptions with AI deployments processing sensitive data.
78
+
**Defender for AI Services** protects AI workloads, including Azure OpenAI Service and Microsoft Foundry, detecting prompt injection attacks and unusual usage patterns. Enable for subscriptions with AI deployments processing sensitive data.
81
79
82
80
**Design consideration**: Key Vault and Resource Manager protection are foundational controls with minimal overhead - consider enabling these broadly across all production subscriptions. App Service, APIs, and AI Services protection should align with where those workloads exist.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/9-posture-management-using-exposure-management-attack-paths.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,40 +92,40 @@ Initiatives provide structure for managing exposure across specific security are
92
92
93
93
Design your posture management process with these requirements:
94
94
95
-
**Critical asset identification**: Before Exposure Management provides maximum value, identify and classify critical assets. Without proper classification, attack paths may not reflect your true business risk.
95
+
-**Critical asset identification**: Before Exposure Management provides maximum value, identify and classify critical assets. Without proper classification, attack paths may not reflect your true business risk.
96
96
97
-
**Licensing and integration**: Ensure all relevant Defender workloads are licensed and contributing data. Attack paths are only as complete as the data sources feeding them.
97
+
-**Licensing and integration**: Ensure all relevant Defender workloads are licensed and contributing data. Attack paths are only as complete as the data sources feeding them.
98
98
99
-
**Scope management**: For large organizations, use device group scoping to filter data by business unit, geography, or environment. Initiative scores calculate based on the selected scope.
99
+
-**Scope management**: For large organizations, use device group scoping to filter data by business unit, geography, or environment. Initiative scores calculate based on the selected scope.
100
100
101
-
**Remediation workflows**: Design processes for:
102
-
- Reviewing new attack paths (especially high-risk paths to critical assets)
Structure your remediation priorities using Exposure Management data:
110
110
111
-
**Priority 1 - Choke points on paths to critical assets**: These represent the highest-impact remediation opportunities. Fixing one choke point can eliminate multiple attack paths.
111
+
-**Priority 1 - Choke points on paths to critical assets**: These represent the highest-impact remediation opportunities. Fixing one choke point can eliminate multiple attack paths.
112
112
113
-
**Priority 2 - High-risk attack paths**: Paths exploiting known vulnerabilities with available exploits, especially those with external entry points.
113
+
-**Priority 2 - High-risk attack paths**: Paths exploiting known vulnerabilities with available exploits, especially those with external entry points.
114
114
115
-
**Priority 3 - Initiative score improvements**: Focus on initiatives with the largest gap between current and target scores, particularly those aligned with compliance requirements or business objectives.
115
+
-**Priority 3 - Initiative score improvements**: Focus on initiatives with the largest gap between current and target scores, particularly those aligned with compliance requirements or business objectives.
116
116
117
-
**Priority 4 - Metric-specific remediation**: Address metrics showing significant exposure (low progress scores) within your priority initiatives.
117
+
-**Priority 4 - Metric-specific remediation**: Address metrics showing significant exposure (low progress scores) within your priority initiatives.
118
118
119
119
## Integrating with security operations
120
120
121
121
Design how Exposure Management integrates with your broader security operations:
122
122
123
-
**Incident context**: During incident investigation, use blast radius analysis to understand potential impact and prioritize containment.
123
+
-**Incident context**: During incident investigation, use blast radius analysis to understand potential impact and prioritize containment.
124
124
125
-
**Proactive hunting**: Use the enterprise exposure graph to query for specific risk conditions before they become incidents.
125
+
-**Proactive hunting**: Use the enterprise exposure graph to query for specific risk conditions before they become incidents.
126
126
127
-
**Continuous improvement**: Track initiative scores over time to demonstrate security posture improvements. Use the 14-day trend graphs to identify positive or negative trajectories.
127
+
-**Continuous improvement**: Track initiative scores over time to demonstrate security posture improvements. Use the 14-day trend graphs to identify positive or negative trajectories.
128
128
129
-
**Collaboration**: Share initiative progress with stakeholders to demonstrate security investments' effectiveness and justify additional resources for remaining gaps.
129
+
-**Collaboration**: Share initiative progress with stakeholders to demonstrate security investments' effectiveness and justify additional resources for remaining gaps.
130
130
131
131
Your posture management design should create a continuous cycle: discover assets and attack paths, prioritize based on critical asset risk, remediate through initiative-aligned actions, and validate improvements through score tracking.
0 commit comments