You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/includes/2-specify-server-security-requirements.md
+34-24Lines changed: 34 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,13 +18,15 @@ For each category, specify requirements that are measurable and auditable. For e
18
18
19
19
### MCSB Endpoint Security controls
20
20
21
-
The Microsoft Cloud Security Benchmark (MCSB) provides a structured framework for endpoint security requirements. In MCSB v2, the Endpoint Security (ES) domain is organized into two pillars:
21
+
The [Microsoft Cloud Security Benchmark (MCSB) v2 (preview)](/security/benchmark/azure/overview)provides a structured framework for endpoint security requirements. It supersedes MCSB v1, expanding security domains to 12 (including Artificial Intelligence Security), adding risk and threat-based guidance with MITRE ATT&CK mappings, and updating compliance framework mappings to NIST SP 800-53 Rev.5, PCI-DSS v4, CIS Controls v8.1, NIST CSF v2.0, ISO 27001:2022, and SOC 2.
22
22
23
-
**Cloud endpoint threat protection** — Deploy comprehensive threat detection and response capabilities for servers, including anti-malware and behavioral analysis:
23
+
The Endpoint Security (ES) domain is organized into two pillars:
24
+
25
+
**Cloud endpoint threat protection** — Deploy comprehensive threat detection and response capabilities for servers, including behavioral analysis and extended detection and response (XDR) integration:
24
26
25
27
| Control | Requirement | Implementation guidance |
26
28
| --- | --- | --- |
27
-
| ES-1 | Use Endpoint Detection and Response (EDR) | Deploy EDR solutions like Microsoft Defender for Endpoint to detect, investigate, and respond to advanced threats on servers |
29
+
| ES-1 | Use Endpoint Detection and Response (EDR) | Deploy EDR solutions like Microsoft Defender for Endpoint to detect, investigate, and respond to advanced threats on servers. Includes subcontrols for EDR deployment (ES-1.1), XDR integration (ES-1.2), and EDR automation (ES-1.3).|
28
30
| ES-2 | Use modern anti-malware software | Require anti-malware solutions that provide real-time protection, behavior monitoring, and integration with cloud-based threat intelligence |
29
31
30
32
**Cloud endpoint security configuration** — Enforce security baselines and hardening standards across all servers:
@@ -33,7 +35,7 @@ The Microsoft Cloud Security Benchmark (MCSB) provides a structured framework fo
33
35
| --- | --- | --- |
34
36
| ES-3 | Ensure anti-malware software and signatures are updated | Configure automatic updates for anti-malware definitions and engines; specify maximum acceptable age for signatures |
35
37
36
-
These controls apply across Windows and Linux servers in Azure, AWS, GCP, and on-premises environments. Microsoft Defender for Servers implements ES-1 and ES-2 through its integration with Defender for Endpoint. For detailed implementation guidance, see [Endpoint security controls in MCSB](/security/benchmark/azure/mcsb-endpoint-security).
38
+
These controls apply across Windows and Linux servers in Azure, AWS, GCP, and on-premises environments. Microsoft Defender for Servers implements ES-1 and ES-2 through its integration with Defender for Endpoint. For detailed implementation guidance, see [Endpoint security controls in MCSB v2](/security/benchmark/azure/mcsb-v2-endpoint-security).
37
39
38
40
## Platform-specific considerations
39
41
@@ -53,6 +55,7 @@ Windows Server environments require specific attention to:
53
55
54
56
Linux security requirements vary by distribution but should address:
55
57
58
+
-**Microsoft Defender for Endpoint on Linux**: Require Defender for Endpoint for real-time antimalware protection, EDR capabilities, and vulnerability assessment on supported Linux distributions
56
59
-**SSH hardening**: Require key-based authentication, disable root sign-in, and limit SSH access to specific users or groups
57
60
-**SELinux or AppArmor**: Specify mandatory access control requirements based on your distribution (SELinux for RHEL-based distributions, AppArmor for Ubuntu/SUSE)
58
61
-**Firewall configuration**: Require firewall or iptables rules that implement least-privilege network access
@@ -67,17 +70,19 @@ Server security requirements vary based on where servers are deployed. Your spec
67
70
68
71
For Azure-hosted servers, use platform capabilities in your requirements:
69
72
70
-
-**Microsoft Defender for Servers**: Require either Plan 1 or Plan 2 based on protection needs. Plan 1 provides Defender for Endpoint integration for EDR capabilities. Plan 2 adds agentless scanning (vulnerabilities, secrets, and malware), file integrity monitoring, just-in-time VM access, compliance assessment, and a free data ingestion benefit. Defender for Servers no longer relies on the Log Analytics agent or Azure Monitor Agent — all security features are delivered through the Defender for Endpoint integration and agentless machine scanning.
73
+
-**Microsoft Defender for Servers**: Require Defender for Servers on all Azure VMs, selecting Plan 1 or Plan 2 based on workload criticality. See [Defender for Servers plan selection](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) for guidance on matching plan capabilities to your security requirements.
74
+
-**Trusted launch**: Require trusted launch with Secure Boot and vTPM enabled for Azure VMs to protect against boot-level attacks such as bootkits and rootkits
71
75
-**Network security groups**: Require NSGs on all subnets with rules that follow least-privilege principles
72
76
-**Azure Bastion**: Require Azure Bastion for administrative access instead of exposing RDP/SSH ports
73
77
-**Managed identities**: Require managed identities for Azure resource access instead of stored credentials
74
-
-**Disk encryption**: Require Azure Disk Encryption or server-side encryption with customer-managed keys
78
+
-**Disk encryption**: Require Azure Disk Encryption, server-side encryption with customer-managed keys, or encryption at host based on workload requirements
79
+
-**Confidential VMs**: For workloads processing highly sensitive data, consider Azure Confidential VMs that provide hardware-based memory encryption
75
80
76
81
### Multicloud environments (AWS and GCP)
77
82
78
83
For servers in AWS or GCP, specify how to integrate with your security management:
79
84
80
-
-**Azure Arc onboarding**: Require all non-Azure servers to connect through Azure Arc for centralized management. The multicloud connector enabled by Azure Arc can auto-discover EC2 instances and GCP VMs and install the Connected Machine agent at scale.
85
+
-**Azure Arc onboarding**: Require all non-Azure servers to connect through Azure Arc for centralized management. The Defender for Cloud multicloud connectors for AWS and GCP can auto-discover EC2 instances and GCP VMs and install the Azure Connected Machine agent at scale.
81
86
-**Connector configuration**: Specify whether to connect at the organization/account level or individual project/account level
82
87
-**Defender for Servers coverage**: Extend Microsoft Defender for Servers protection to EC2 instances and Compute Engine VMs
83
88
-**Compliance standards**: Apply consistent standards across clouds—AWS Foundational Security Best Practices, GCP CIS benchmarks, and MCSB all map to common controls
@@ -87,7 +92,7 @@ For servers in AWS or GCP, specify how to integrate with your security managemen
-**Azure Arc deployment**: Require the Azure Connected Machine agent on all servers to enable cloud-based management and full Plan 2 functionality
90
-
-**Direct Defender for Endpoint onboarding**: For servers where Azure Arc isn't feasible, installing the Defender for Endpoint agent directly provides Plan 1 functionality only (EDR and premium Defender Vulnerability Management features, but no agentless scanning, FIM, or JIT access)
95
+
-**Direct Defender for Endpoint onboarding**: For servers where Azure Arc isn't feasible, you can onboard directly with the Defender for Endpoint agent. With Plan 1, direct onboarding provides all Plan 1 features. With Plan 2, directly onboarded servers get Plan 1 features plus premium Defender Vulnerability Management capabilities, but don't get agentless scanning, file integrity monitoring, JIT VM access, or OS configuration assessment — those capabilities require Azure Arc
91
96
-**Network connectivity**: Specify required endpoints for Azure Arc, Defender for Cloud, and any extensions
92
97
-**Proxy configuration**: Define proxy requirements for servers without direct internet access
93
98
-**Update management**: Integrate with Azure Update Manager for centralized patching across hybrid environments
@@ -110,7 +115,7 @@ Specify scanning frequency and remediation timelines:
110
115
111
116
**File integrity monitoring**
112
117
113
-
For servers processing sensitive data, require monitoring of critical system files and configuration files with alerts on unauthorized changes. File integrity monitoring is now delivered through the Defender for Endpoint integration in Defender for Servers Plan 2, replacing the previous Log Analytics agent-based approach.
118
+
For servers processing sensitive data, require monitoring of critical system files and configuration files with alerts on unauthorized changes. File integrity monitoring in Defender for Servers Plan 2 uses both the Defender for Endpoint agent (near real-time change detection) and agentless scanning (24-hour cadence), replacing the previous Log Analytics agent-based approach.
114
119
115
120
**Backup and recovery**
116
121
@@ -135,22 +140,27 @@ Map your specific requirements to control frameworks to demonstrate compliance.
135
140
136
141
## Design decision: Defender for Servers plan selection
137
142
138
-
When specifying Defender for Servers requirements, choose the appropriate plan based on workload criticality:
143
+
When specifying Defender for Servers requirements, focus on the security capabilities your workloads require rather than individual product features. Both plans include EDR through Defender for Endpoint, agent-based vulnerability assessment, and compliance assessment against regulatory standards. The decision between plans hinges on whether your requirements include capabilities that only Plan 2 provides.
|**Defender for Endpoint (EDR)**| ✓ Included | ✓ Included |
144
-
|**Vulnerability assessment (agent-based)**| ✓ Included | ✓ Included |
145
-
|**Vulnerability assessment (agentless)**| Not available | ✓ Included |
146
-
|**Agentless malware and secrets scanning**| Not available | ✓ Software inventory, secrets, malware |
147
-
|**Premium Defender Vulnerability Management**| Not available | ✓ Security baselines, block vulnerable apps, certificate and hardware assessment |
148
-
|**Just-in-time VM access**| Not available | ✓ Reduces attack surface |
149
-
|**File integrity monitoring**| Not available | ✓ Via Defender for Endpoint integration |
150
-
|**Compliance assessment**| Not available | ✓ Regulatory standards assessment |
151
-
|**Free data ingestion**| Not available | ✓ 500 MB/day for specific data types |
152
-
153
-
For most organizations, specify Plan 1 as the baseline requirement for all servers, with Plan 2 required for servers that process sensitive data, are internet-facing, or are otherwise deemed critical.
145
+
**Specify Plan 1** as the baseline for all servers when your requirements include:
146
+
147
+
- Endpoint detection and response (EDR)
148
+
- Agent-based vulnerability assessment
149
+
- Compliance assessment against regulatory standards
150
+
151
+
**Specify Plan 2** for servers where your requirements also include:
152
+
153
+
- Agentless scanning for vulnerabilities, secrets, and malware (no agent installation required)
154
+
- File integrity monitoring (via Defender for Endpoint agent and agentless scanning)
155
+
- Just-in-time VM access to reduce attack surface (Azure and AWS only, not available on GCP)
156
+
- OS configuration assessment against MCSB compute security baselines
157
+
- OS system updates assessment integrated with Azure Update Manager
158
+
- Premium Defender Vulnerability Management (security baselines, block vulnerable apps; available only in the Defender portal)
159
+
- 500 MB/day free data ingestion for security data types (requires Azure Monitor Agent)
160
+
161
+
For most organizations, specify Plan 1 as the baseline requirement for all servers, with Plan 2 required for servers that process sensitive data, are internet-facing, or are otherwise classified as critical. This requirements-based approach lets you align plan selection to workload criticality tiers without overprovisioning protection for standard workloads.
162
+
163
+
For a complete comparison of plan features and cloud availability, see [Defender for Servers plan features](/azure/defender-for-cloud/defender-for-servers-overview#plan-protection-features).
0 commit comments