Skip to content

Commit baeb1d7

Browse files
authored
Enhance image syntax for coverage diagrams
Updated image syntax to include lightbox attribute for better presentation.
1 parent cdce15c commit baeb1d7

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/includes/2-explore-multicloud-connectivity-model.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The Security Posture Management plan that enables CSPM can't be turned off in a
1212

1313
Once a machine is Arc-enabled, it appears in Defender for Cloud's inventory alongside native Azure VMs. Any Defender plan enabled on the Azure subscription extends coverage to that machine. This two-step model—connector for posture, Arc for protection—is the foundation of how Defender for Cloud treats non-Azure workloads.
1414

15-
:::image type="content" source="../media/coverage-layers.png" alt-text="Diagram showing two coverage paths from Defender for Cloud: an agentless CSPM path via cloud APIs, and a CWPP path requiring the Azure Arc Connected Machine agent on virtual machines.":::
15+
:::image type="content" source="../media/coverage-layers.png" alt-text="Diagram showing two coverage paths from Defender for Cloud: an agentless CSPM path via cloud APIs, and a CWPP path requiring the Azure Arc Connected Machine agent on virtual machines." lightbox="../media/coverage-layers.png":::
1616

1717
## Review capabilities available after connecting
1818

@@ -38,7 +38,7 @@ The authentication flow works as follows. Defender for Cloud requests a token fr
3838

3939
AWS performs audience, signature, thumbprint, and role-level checks before issuing credentials, ensuring only the specific Microsoft-managed application can assume the connector role.
4040

41-
:::image type="content" source="../media/amazon-authentication-sequence.png" alt-text="Sequence diagram of the AWS federated auth flow: Defender for Cloud exchanges a Microsoft Entra token with AWS STS for temporary credentials, then calls AWS APIs. No credentials are stored.":::
41+
:::image type="content" source="../media/amazon-authentication-sequence.png" alt-text="Sequence diagram of the AWS federated auth flow: Defender for Cloud exchanges a Microsoft Entra token with AWS STS for temporary credentials, then calls AWS APIs. No credentials are stored." lightbox="../media/amazon-authentication-sequence.png":::
4242

4343
This architecture means that even if an attacker gained access to the Azure environment, there are no stored AWS credentials to exfiltrate. The trust is used by the specific Microsoft-managed application, during a valid authentication transaction.
4444

0 commit comments

Comments
 (0)