You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Design integrated posture management solutions with Microsoft Defender for Cloud in hybrid and multicloud environments
3
+
title: Design integrated posture management solutions that include Microsoft Defender for Cloud in hybrid and multicloud environments
4
4
metadata:
5
-
title: Design integrated posture management solutions with Microsoft Defender for Cloud in hybrid and multicloud environments
6
-
description: "SC-100 preparatory unit on the topic: design integrated posture management solutions with Microsoft Defender for Cloud in hybrid and multicloud environments."
5
+
title: Design integrated posture management solutions that include Microsoft Defender for Cloud in hybrid and multicloud environments
6
+
description: "SC-100 preparatory unit on the topic: design integrated posture management solutions that include Microsoft Defender for Cloud in hybrid and multicloud environments."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/3-design-integrated-posture-management-workload-protection.md
+25-7Lines changed: 25 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
-
Designing an integrated security posture management solution for hybrid and multicloud environments requires architectural decisions that balance coverage, capability, and operational complexity. Microsoft Defender for Cloud serves as the foundation for this design, providing a cloud-native application protection platform (CNAPP) that extends across Azure, AWS, GCP, and on-premises resources.
1
+
Designing an integrated security posture management solution for hybrid and multicloud environments requires architectural decisions that balance coverage, capability, and operational complexity. An effective design combines multiple components: security frameworks like MCSB for baseline standards, tooling for continuous assessment and protection, and operational processes for governance and remediation. Microsoft Defender for Cloud serves as a central component in this integrated design, providing a cloud-native application protection platform (CNAPP) that extends across Azure, AWS, GCP, and on-premises resources.
2
2
3
-
## Understanding the platform architecture
3
+
## Understanding the Defender for Cloud architecture
4
4
5
-
Before making design decisions, understand what Defender for Cloud provides. The platform combines three capabilities: development security operations (DevSecOps) for code-level security, cloud security posture management (CSPM) for configuration assessment, and cloud workload protection (CWPP) for threat detection and response.
5
+
When including Defender for Cloud in your posture management solution, understand what capabilities the platform provides. The platform combines three capabilities: development security operations (DevSecOps) for code-level security, cloud security posture management (CSPM) for configuration assessment, and cloud workload protection (CWPP) for threat detection and response.
6
6
7
7

8
8
@@ -12,9 +12,9 @@ For posture management specifically, you choose between two tiers. Foundational
12
12
13
13
## Designing for multicloud coverage
14
14
15
-
Your first design decision involves defining the scope of coverage. Most organizations operate across multiple environments, and your architecture must account for each.
15
+
A key design decision involves defining the scope of coverage for Defender for Cloud within your integrated solution. Most organizations operate across multiple environments, and your architecture must account for each.
16
16
17
-
**For Azure resources**, Defender for Cloud provides native integration with no additional configuration. All Azure subscriptions can enable Foundational CSPM at no cost, giving you immediate visibility into security posture.
17
+
**For Azure resources**, Defender for Cloud provides native integration with no extra configuration. All Azure subscriptions can enable Foundational CSPM at no cost, giving you immediate visibility into security posture.
18
18
19
19
**For AWS and GCP**, you deploy cloud connectors that use native APIs to assess resources. Design your connector strategy to match your cloud account structure. In AWS, you can connect at the organization level to cover all accounts, or connect individual accounts for more granular control. GCP supports similar project-level or organization-level connectivity.
20
20
@@ -29,7 +29,7 @@ The decision between Foundational and Defender CSPM depends on your security req
29
29
|**Best for**| Organizations starting their cloud security journey, or those with mature processes who need basic assessment | Organizations requiring proactive risk identification and compliance beyond MCSB |
30
30
|**Attack path analysis**| Not available | Identifies exploitable paths to critical assets across your environment |
31
31
|**Governance workflows**| Manual tracking of remediation | Assign recommendations to owners with due dates and track progress |
32
-
|**Regulatory compliance**| MCSB only |Additional standards including PCI-DSS, ISO 27001, SOC 2, and custom frameworks |
32
+
|**Regulatory compliance**| MCSB only |More standards including PCI-DSS, ISO 27001, SOC 2, and custom frameworks |
33
33
|**Agentless scanning**| Not available | Discovers vulnerabilities without deploying agents to machines |
34
34
35
35
For most enterprise environments, start with Foundational CSPM to establish baseline visibility, then enable Defender CSPM on subscriptions containing critical workloads or sensitive data. This tiered approach optimizes cost while ensuring advanced protection where it matters most.
@@ -44,6 +44,24 @@ Your architecture must address how you collect security data from compute resour
44
44
45
45
Design your approach based on workload requirements. Use agentless scanning for broad coverage across development and test environments where operational simplicity matters. Deploy agents to production workloads and systems processing sensitive data where deeper visibility justifies the management overhead.
46
46
47
+
## Integrating Azure Policy with Defender for Cloud
48
+
49
+
Azure Policy serves as the enforcement engine that underpins Defender for Cloud's posture assessments. Understanding this relationship helps you design a cohesive solution that uses both tools effectively.
50
+
51
+
**How the integration works**: When Defender for Cloud evaluates your resources against security standards like MCSB, it uses Azure Policy definitions to perform those assessments. Each security recommendation in Defender for Cloud maps to one or more policy definitions. The MCSB initiative alone contains hundreds of policies covering network security, identity management, data protection, and other security domains.
52
+
53
+
**Design decisions for policy integration**:
54
+
55
+
-**Assessment vs. enforcement**: Azure Policy supports both *audit* and *deny* effects. Defender for Cloud uses audit mode by default—it reports noncompliant resources but doesn't block deployment. For critical security controls, consider enabling deny mode through Azure Policy to prevent noncompliant resources from being created in the first place.
56
+
57
+
-**Custom policies**: When your security requirements extend beyond built-in standards, create custom Azure Policy definitions. Once deployed, custom policies appear in Defender for Cloud alongside built-in recommendations, providing a unified view of compliance.
58
+
59
+
-**Initiative assignment scope**: Assign policy initiatives at the management group level to ensure consistent coverage across subscriptions. This approach aligns with Defender for Cloud's hierarchical view of your environment.
60
+
61
+
-**Exemptions**: Both Azure Policy and Defender for Cloud support exemptions for resources that intentionally don't meet a control. Manage exemptions through Azure Policy to maintain a single source of truth, and they'll reflect automatically in Defender for Cloud assessments.
62
+
63
+
**Complementary enforcement**: Use Azure Policy for preventive controls (blocking noncompliant deployments) and Defender for Cloud for detective controls (identifying existing misconfigurations). This layered approach ensures new resources deploy securely while giving you visibility into resources that predate your policies.
64
+
47
65
## Establishing governance and accountability
48
66
49
67
Beyond technical configuration, your design must address how your organization operationalizes posture management. Consider these architectural elements:
@@ -54,4 +72,4 @@ Beyond technical configuration, your design must address how your organization o
54
72
55
73
-**Integration with workflows**: Determine how security recommendations flow into your existing remediation processes. Defender for Cloud integrates with Azure DevOps, ServiceNow, and other ticketing systems to create work items automatically.
56
74
57
-
The following unit explores how to use Defender for Cloud's evaluation features to measure and improve your security posture across this integrated architecture.
75
+
Your integrated posture management solution may also include complementary tools such as Defender External Attack Surface Management for internet-facing asset discovery, Security Exposure Management for cross-domain attack path analysis, and specialized solutions for specific workload types, which are covered in subsequent units. The following unit explores how to use Defender for Cloud's evaluation features, such as Secure Score to measure and improve your security posture across this integrated architecture.
0 commit comments