Skip to content

Commit 4097f13

Browse files
committed
fix table and lists
1 parent f2f01ce commit 4097f13

4 files changed

Lines changed: 27 additions & 30 deletions

File tree

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/2-evaluate-security-posture-microsoft-cloud-security-benchmark.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ Microsoft Defender for Cloud serves as the primary tool for evaluating security
22

33
## Understanding the Microsoft Cloud Security Benchmark
44

5-
MCSB is a comprehensive set of security best practices organized into security domains. Each domain groups related security recommendations that address a specific area of concern:
5+
MCSB is a comprehensive set of security best practices organized into security domains. Each domain groups related security recommendations that address a specific area of concern. The following table shows the 12 security domains defined in MCSB v2:
66

77
| Security domain | Focus area |
88
|---|---|
@@ -17,7 +17,6 @@ MCSB is a comprehensive set of security best practices organized into security d
1717
| Endpoint security (ES) | Endpoint detection and response, anti-malware |
1818
| Backup and recovery (BR) | Backup configuration, protection, validation |
1919
| DevOps security (DS) | Code security, pipeline integrity, supply chain security |
20-
| Governance and strategy (GS) | Security roles, strategy, architecture, policies |
2120
| Artificial intelligence security (AI) | AI platform security, AI application security, AI security monitoring |
2221

2322
Each security domain contains security controls and security subcontrols that provide granular, actionable implementation guidance. Controls include a control ID, description, and platform-specific guidance for Azure, AWS, and GCP. MCSB also maps each control to industry frameworks including NIST SP 800-53, CIS Controls, and PCI-DSS, making it suitable as a unified standard for organizations operating across multiple cloud providers.
@@ -57,13 +56,13 @@ When designing your posture management solution, use security baselines to defin
5756

5857
Use the following approach to evaluate your security posture against MCSB:
5958

60-
**Assess control coverage**: Review each MCSB control domain and determine which controls apply to your environment. Not every control applies to every organization—document which controls are applicable based on your workload types and cloud platforms.
59+
- **Assess control coverage**: Review each MCSB control domain and determine which controls apply to your environment. Not every control applies to every organization—document which controls are applicable based on your workload types and cloud platforms.
6160

62-
**Review recommendations by domain**: In Defender for Cloud, filter security recommendations by MCSB control domain to identify where your resources meet the benchmark and where gaps exist. Focus attention on controls in domains most relevant to your risk profile, such as data protection for environments handling sensitive information, or network security for internet-facing workloads.
61+
- **Review recommendations by domain**: In Defender for Cloud, filter security recommendations by MCSB control domain to identify where your resources meet the benchmark and where gaps exist. Focus attention on controls in domains most relevant to your risk profile, such as data protection for environments handling sensitive information, or network security for internet-facing workloads.
6362

64-
**Map regulatory requirements**: If your organization must comply with standards like NIST SP 800-53, PCI-DSS, or ISO 27001, use MCSB's framework mapping to identify which controls satisfy your regulatory requirements and where extra controls are needed.
63+
- **Map regulatory requirements**: If your organization must comply with standards like NIST SP 800-53, PCI-DSS, or ISO 27001, use MCSB's framework mapping to identify which controls satisfy your regulatory requirements and where extra controls are needed.
6564

66-
**Design an exception process**: For controls that don't apply to specific workloads, create documented exceptions that include the specific control and reasoning, any compensating controls in place, a review cadence for reevaluation, and approval from the appropriate stakeholder.
65+
- **Design an exception process**: For controls that don't apply to specific workloads, create documented exceptions that include the specific control and reasoning, any compensating controls in place, a review cadence for reevaluation, and approval from the appropriate stakeholder.
6766

6867
## Extending beyond MCSB
6968

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/4-evaluate-security-posture-microsoft-defender-cloud.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,11 +48,11 @@ Key security controls include:
4848

4949
Secure score appears in multiple locations, each serving a different evaluation purpose:
5050

51-
**Overview dashboard**: The Defender for Cloud overview shows your current score alongside other key security metrics including active recommendations, security alerts, and resource health.
51+
- **Overview dashboard**: The Defender for Cloud overview shows your current score alongside other key security metrics including active recommendations, security alerts, and resource health.
5252

53-
**Secure score dedicated page**: Breaks down the score by subscription. Use this view to compare posture across subscriptions and identify which environments need the most attention.
53+
- **Secure score dedicated page**: Breaks down the score by subscription. Use this view to compare posture across subscriptions and identify which environments need the most attention.
5454

55-
**Management group view**: Toggle the management group view on the secure score page to see scores organized by your Azure management group hierarchy. This helps evaluate posture across organizational units and identify management groups with the weakest security posture.
55+
- **Management group view**: Toggle the management group view on the secure score page to see scores organized by your Azure management group hierarchy. This helps evaluate posture across organizational units and identify management groups with the weakest security posture.
5656

5757
# [Overview dashboard](#tab/overview)
5858
:::image type="content" source="../media/score-on-main-dashboard.png" alt-text="Screenshot of the Defender for Cloud overview page highlighting the secure score section." lightbox="../media/score-on-main-dashboard.png":::

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/6-design-cloud-workload-protection-microsoft-defender-cloud.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The key design principle: enable protection plans based on workloads present in
2020
| APIs | Defender for APIs | APIs published in Azure API Management |
2121
| Key Vault | Defender for Key Vault | Azure Key Vault secrets, keys, and certificates |
2222
| Resource Manager | Defender for Resource Manager | Azure Resource Manager control plane activity |
23-
| AI workloads | Defender for AI Services | Azure OpenAI and other Azure AI services |
23+
| AI workloads | Defender for AI Services | AI workloads, including Azure OpenAI Service and Microsoft Foundry |
2424

2525
## Designing server protection
2626

@@ -41,9 +41,7 @@ Server protection requires the most architectural decisions. Defender for Server
4141

4242
**Plan selection**: Choose Plan 1 for EDR integration and agent-based vulnerability scanning. Choose Plan 2 for agentless scanning, just-in-time access, file integrity monitoring, or premium vulnerability management features. Consider Plan 2 for production servers and Plan 1 for development environments.
4343

44-
:::image type="content" source="../media/agentless-scanning-process.png" alt-text="Diagram showing the agentless scanning process where a disk snapshot is taken from a virtual machine, analyzed in an isolated scanning environment, and results sent to Defender for Cloud." lightbox="../media/agentless-scanning-process.png":::
45-
46-
**Coverage scope**: Enable at the subscription level for simplest management. Plan 1 can enable at the resource level; Plan 2 requires subscription-level enablement. For multicloud and on-premises servers, deploy Azure Arc for full functionality.
44+
**Coverage scope**: Enable at the subscription level to automatically protect all servers in that subscription. This is the simplest approach. Plan 1 allows you to selectively enable protection on individual VMs/servers rather than the whole subscription—useful when you only want to protect specific machines. Plan 2 can only be enabled at the subscription level—you can't pick and choose individual resources. For servers outside Azure (on-premises, AWS, GCP), you need to onboard them via Azure Arc first so Defender for Cloud can manage and protect them.
4745

4846
## Designing container protection
4947

@@ -77,7 +75,7 @@ Defender for Storage provides activity monitoring (detecting unusual access patt
7775

7876
**Defender for Resource Manager** monitors control plane operations for suspicious activity like persistence techniques or lateral movement. Both Key Vault and Resource Manager protection operate at subscription level with no additional configuration.
7977

80-
**Defender for AI Services** protects Azure OpenAI and other AI resources, detecting prompt injection attacks and unusual usage patterns. Enable for subscriptions with AI deployments processing sensitive data.
78+
**Defender for AI Services** protects AI workloads, including Azure OpenAI Service and Microsoft Foundry, detecting prompt injection attacks and unusual usage patterns. Enable for subscriptions with AI deployments processing sensitive data.
8179

8280
**Design consideration**: Key Vault and Resource Manager protection are foundational controls with minimal overhead - consider enabling these broadly across all production subscriptions. App Service, APIs, and AI Services protection should align with where those workloads exist.
8381

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/9-posture-management-using-exposure-management-attack-paths.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -92,40 +92,40 @@ Initiatives provide structure for managing exposure across specific security are
9292

9393
Design your posture management process with these requirements:
9494

95-
**Critical asset identification**: Before Exposure Management provides maximum value, identify and classify critical assets. Without proper classification, attack paths may not reflect your true business risk.
95+
- **Critical asset identification**: Before Exposure Management provides maximum value, identify and classify critical assets. Without proper classification, attack paths may not reflect your true business risk.
9696

97-
**Licensing and integration**: Ensure all relevant Defender workloads are licensed and contributing data. Attack paths are only as complete as the data sources feeding them.
97+
- **Licensing and integration**: Ensure all relevant Defender workloads are licensed and contributing data. Attack paths are only as complete as the data sources feeding them.
9898

99-
**Scope management**: For large organizations, use device group scoping to filter data by business unit, geography, or environment. Initiative scores calculate based on the selected scope.
99+
- **Scope management**: For large organizations, use device group scoping to filter data by business unit, geography, or environment. Initiative scores calculate based on the selected scope.
100100

101-
**Remediation workflows**: Design processes for:
102-
- Reviewing new attack paths (especially high-risk paths to critical assets)
103-
- Addressing choke points for maximum impact
104-
- Responding to security events when scores drop
105-
- Tracking initiative progress toward target scores
101+
- **Remediation workflows**: Design processes for:
102+
- Reviewing new attack paths (especially high-risk paths to critical assets)
103+
- Addressing choke points for maximum impact
104+
- Responding to security events when scores drop
105+
- Tracking initiative progress toward target scores
106106

107107
## Setting priorities for remediation
108108

109109
Structure your remediation priorities using Exposure Management data:
110110

111-
**Priority 1 - Choke points on paths to critical assets**: These represent the highest-impact remediation opportunities. Fixing one choke point can eliminate multiple attack paths.
111+
- **Priority 1 - Choke points on paths to critical assets**: These represent the highest-impact remediation opportunities. Fixing one choke point can eliminate multiple attack paths.
112112

113-
**Priority 2 - High-risk attack paths**: Paths exploiting known vulnerabilities with available exploits, especially those with external entry points.
113+
- **Priority 2 - High-risk attack paths**: Paths exploiting known vulnerabilities with available exploits, especially those with external entry points.
114114

115-
**Priority 3 - Initiative score improvements**: Focus on initiatives with the largest gap between current and target scores, particularly those aligned with compliance requirements or business objectives.
115+
- **Priority 3 - Initiative score improvements**: Focus on initiatives with the largest gap between current and target scores, particularly those aligned with compliance requirements or business objectives.
116116

117-
**Priority 4 - Metric-specific remediation**: Address metrics showing significant exposure (low progress scores) within your priority initiatives.
117+
- **Priority 4 - Metric-specific remediation**: Address metrics showing significant exposure (low progress scores) within your priority initiatives.
118118

119119
## Integrating with security operations
120120

121121
Design how Exposure Management integrates with your broader security operations:
122122

123-
**Incident context**: During incident investigation, use blast radius analysis to understand potential impact and prioritize containment.
123+
- **Incident context**: During incident investigation, use blast radius analysis to understand potential impact and prioritize containment.
124124

125-
**Proactive hunting**: Use the enterprise exposure graph to query for specific risk conditions before they become incidents.
125+
- **Proactive hunting**: Use the enterprise exposure graph to query for specific risk conditions before they become incidents.
126126

127-
**Continuous improvement**: Track initiative scores over time to demonstrate security posture improvements. Use the 14-day trend graphs to identify positive or negative trajectories.
127+
- **Continuous improvement**: Track initiative scores over time to demonstrate security posture improvements. Use the 14-day trend graphs to identify positive or negative trajectories.
128128

129-
**Collaboration**: Share initiative progress with stakeholders to demonstrate security investments' effectiveness and justify additional resources for remaining gaps.
129+
- **Collaboration**: Share initiative progress with stakeholders to demonstrate security investments' effectiveness and justify additional resources for remaining gaps.
130130

131131
Your posture management design should create a continuous cycle: discover assets and attack paths, prioritize based on critical asset risk, remediate through initiative-aligned actions, and validate improvements through score tracking.

0 commit comments

Comments
 (0)