home.social

#defenderforcloud โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #defenderforcloud, aggregated by home.social.

  1. ๐ˆ๐ง๐ญ๐ซ๐จ๐๐ฎ๐œ๐ข๐ง๐  ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐ ๐‹๐š๐›๐ฌ

    Our labs project help you get ramped up with Microsoft Defender for Cloud and provide hands-on practical experience for product features, capabilities, and scenarios. The labs are divided into 3 main tracks, a beginner (level 100/200) and an advanced (level 300+) track. The labs contain several modules cover different pillars such as Cloud Security Posture Management (CSPM) to Cloud Workload Protection (CWP). To start using our labs, you will need to create Azure Trial Subscription which provides you all capabilities for 30 days โ€“ so you have to finish this lab at this point to take advantage of the free trial.

    github.com/Azure/Microsoft-Def

    #defender #defenderforcloud #cnapp #cspm #cwp #cwpp #cloudsecurity #multicloud #azure #aws #gcp #microsoft #microsoftsecurity #soc #server #container #storage #dns #api #devops #database #api #github #arc #agentless #storageaccount #mde #vulnerability #mdvm #siem

  2. ๐๐ž๐ฐ ๐ฎ๐ฌ๐ž ๐œ๐š๐ฌ๐ž๐ฌ ๐Ÿ๐จ๐ซ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐จ๐ฉ๐ข๐ฅ๐จ๐ญ

    ๐Ÿ“ฃ The new use cases for Security Copilot now extend beyond investigations in your security operations center to support various security necessities for organizations seeking to strengthen their security against cyberthreats.

    โžกDevice management

    โžกIdentity management

    โžกData security

    โžกCloud security

    โžกExternal attack surface management

    ๐Ÿ“ฃSecurity Copilot is expanding into embedded experiences across various Microsoft Security solutions!

    microsoft.com/en-us/security/b

    #copilot #security #securitycopilot #llm #ai #genai #openai #microsoft #microsoftsecurity #cybersecurity #intune #purview #entraid #soc #xdr #siem #soar #cloud #cloudnative #cloudsecurity #sentinel #microsoftsentinel #cnapp #defenderforcloud #defender #easm #threatintelligence

  3. ๐๐ž๐ฐ ๐ฎ๐ฌ๐ž ๐œ๐š๐ฌ๐ž๐ฌ ๐Ÿ๐จ๐ซ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐จ๐ฉ๐ข๐ฅ๐จ๐ญ

    ๐Ÿ“ฃ The new use cases for Security Copilot now extend beyond investigations in your security operations center to support various security necessities for organizations seeking to strengthen their security against cyberthreats.

    โžกDevice management

    โžกIdentity management

    โžกData security

    โžกCloud security

    โžกExternal attack surface management

    ๐Ÿ“ฃSecurity Copilot is expanding into embedded experiences across various Microsoft Security solutions!

    microsoft.com/en-us/security/b

    #copilot #security #securitycopilot #llm #ai #genai #openai #microsoft #microsoftsecurity #cybersecurity #intune #purview #entraid #soc #xdr #siem #soar #cloud #cloudnative #cloudsecurity #sentinel #microsoftsentinel #cnapp #defenderforcloud #defender #easm #threatintelligence

  4. ๐—”๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐—–๐—ก๐—”๐—ฃ๐—ฃ ๐—ฐ๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ ๐—ถ๐—ป ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—–๐—น๐—ผ๐˜‚๐—ฑ

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    โžก Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    โžกEnhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    โžกAccelerated critical risk remediation with Microsoft Security Copilot integration

    โžกIntegrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    โžกImproved API Security Posture

    โžกGo beyond workload protection โ€“ detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  5. ๐—”๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐—–๐—ก๐—”๐—ฃ๐—ฃ ๐—ฐ๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ ๐—ถ๐—ป ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—–๐—น๐—ผ๐˜‚๐—ฑ

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    โžก Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    โžกEnhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    โžกAccelerated critical risk remediation with Microsoft Security Copilot integration

    โžกIntegrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    โžกImproved API Security Posture

    โžกGo beyond workload protection โ€“ detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  6. ๐—”๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐—–๐—ก๐—”๐—ฃ๐—ฃ ๐—ฐ๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ ๐—ถ๐—ป ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—–๐—น๐—ผ๐˜‚๐—ฑ

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    โžก Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    โžกEnhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    โžกAccelerated critical risk remediation with Microsoft Security Copilot integration

    โžกIntegrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    โžกImproved API Security Posture

    โžกGo beyond workload protection โ€“ detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  7. ๐—”๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐—–๐—ก๐—”๐—ฃ๐—ฃ ๐—ฐ๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ ๐—ถ๐—ป ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—–๐—น๐—ผ๐˜‚๐—ฑ

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    โžก Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    โžกEnhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    โžกAccelerated critical risk remediation with Microsoft Security Copilot integration

    โžกIntegrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    โžกImproved API Security Posture

    โžกGo beyond workload protection โ€“ detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  8. ๐—”๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐—–๐—ก๐—”๐—ฃ๐—ฃ ๐—ฐ๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ ๐—ถ๐—ป ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—–๐—น๐—ผ๐˜‚๐—ฑ

    At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

    โžก Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

    โžกEnhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

    โžกAccelerated critical risk remediation with Microsoft Security Copilot integration

    โžกIntegrated security across multiple DevOps platforms

    Extended protection for cloud workloads

    โžกImproved API Security Posture

    โžกGo beyond workload protection โ€“ detect and respond to threats across the enterprise in a unified platform

    More details:

    techcommunity.microsoft.com/t5

    #cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

  9. ๐—ฃ๐—ฟ๐—ฒ๐—ฑ๐—ถ๐—ฐ๐˜ ๐—ณ๐˜‚๐˜๐˜‚๐—ฟ๐—ฒ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€! ๐—–๐—น๐—ผ๐˜‚๐—ฑ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ผ๐˜€๐˜๐˜‚๐—ฟ๐—ฒ ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐˜„๐—ถ๐˜๐—ต ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ

    Advanced cloud security protection goes beyond general security recommendations and provides predictive and future-facing defense, so users can prioritize security based on connected risks, visualize potential attack paths, and identify vulnerabilities and misconfigurations that attackers might exploit. Recommendations are ranked based on severity and potential impact, so users can focus on the most critical issues first.

    techcommunity.microsoft.com/t5

    #defendercspm #cspm #posturemanagement #defenderforcloud #cnapp #defender #microsoft #azure #cloud #multicloud #soc #cybersecurity #xdr

  10. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  11. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  12. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  13. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  14. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  15. ๐๐ž๐ฐ ๐ž๐ฑ๐ฉ๐š๐ง๐๐ž๐ ๐ฏ๐ข๐ฌ๐ข๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐ข๐ง๐ญ๐จ ๐ฆ๐ฎ๐ฅ๐ญ๐ข๐œ๐ฅ๐จ๐ฎ๐ ๐๐š๐ญ๐š ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐

    The data security dashboard provides a centralized, complete and current view of the state of your cloud data estate.

    The data security dashboard helps you to:

    โžก Discover your complete multicloud data estate across managed and hosted data resources

    โžกUnderstand your Defender for Cloud protection coverage and gaps across data resources

    โžกGain insight on which protected data resources contain sensitive data and the types of sensitive information they contain

    โžกUse built-in data query templates to speed up cloud security explorer results

    โžกFocus on sensitive data resources that require attention as a result of active threats or potential risks to your sensitive data

    โžกView changing trends of resources with sensitive data that require attention to analyze improvement of data security posture over time

    techcommunity.microsoft.com/t5

    #microft #azure #defender #defenderforcloud #cnapp #aws #gcp #data #datasecurity #cloud #cloudsecurity #soc #cspm #posturemanagement

  16. ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐€๐๐ˆ๐ฌ ๐๐ž๐ญ๐ญ๐ž๐ซ ๐“๐จ๐ ๐ž๐ญ๐ก๐ž๐ซ ๐ฐ๐ข๐ญ๐ก ๐€๐ณ๐ฎ๐ซ๐ž ๐–๐ž๐› ๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐…๐ข๐ซ๐ž๐ฐ๐š๐ฅ๐ฅ ๐š๐ง๐ ๐€๐ณ๐ฎ๐ซ๐ž ๐€๐๐ˆ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

    The synergy of Microsoft Defender for APIs, Azure WAF, and Azure API Management forms a strong defense against API threats.

    techcommunity.microsoft.com/t5

    โœ”๏ธThe WAF on Application Gateway checks the request against WAF rules. If the request is valid, then it will proceed.

    โœ”๏ธApplication Gateway directs the request to APIM.

    โœ”๏ธAPIM accepts and properly maps the requests.

    โœ”๏ธDefender for APIs inspects API endpoints and gives insight on whether the API is properly authenticated, inactive, and externally facing.

    โœ”๏ธDefender for APIs monitors the traffic going to and from APIM to classify sensitive data and alert on exploits and anomalies.

    ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐€๐๐ˆ๐ฌ

    Defender for APIs provides visibility into crucial APIs. It facilitates a deep dive into your API security, allowing prioritization of vulnerabilities and quick detection of active threats. Key features include a consolidated view of managed APIs with security insights on external, inactive, or unauthenticated APIs, data classifications of sensitive data in API interactions, and machine learning-driven detection of API threats in alignment with the OWASP API Top 10.

    ๐€๐ณ๐ฎ๐ซ๐ž ๐€๐๐ˆ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

    Azure API Management caters to the entire API lifecycle. APIM includes an API gateway, management platform, and developer portal. The gateway manages requests, ensures authentication, transforms requests and responses, caches responses, enforces usage caps, emits logs, and more.

    ๐€๐ณ๐ฎ๐ซ๐ž ๐–๐ž๐› ๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐…๐ข๐ซ๐ž๐ฐ๐š๐ฅ๐ฅ

    Azure WAF provides a centralized defense against web and API vulnerabilities like SQL injections and cross-site scripting attacks. With its rapid virtual patching, Azure WAF offers quick threat mitigation without needing to individually secure every web application.

    #microsoft #azure #azurewaf #waf #api #defenderapi #sqlinjection #apim #apimanagement #defenderforapi #defenderforcloud #defender #cloud #cloudsecurity #cloudnative #soc #owasp #apithreats #cybersecurity

  17. In the realm of cybersecurity, preventing attackers' entry through misconfigurations is paramount. Cloud misconfigurations, particularly in AWS environments, can open doors to vulnerabilities. Microsoft Defender for Cloud steps in as a proactive guardian, identifying these misconfigurations and enabling swift remediation.

    techcommunity.microsoft.com/t5

    ๐ŸŒ Why Misconfigurations Matter

    Misconfigured cloud resources can expose sensitive data, grant unauthorized access, or leave unnecessary openings for exploitation. To maintain a strong security posture, proactive security management is essential.

    ๐Ÿ›ก๏ธ How Microsoft Defender for Cloud Helps

    In this blog, I'll guide you through various scenarios of misconfigured AWS Cloud resources and showcase how Microsoft Defender for Cloud empowers security teams to identify, prevent, and remediate risks.

    ๐Ÿš€ Getting Started with Proactive Security

    To begin safeguarding your AWS resources, set up the connection between your AWS account and Microsoft Defender for Cloud. The cloud security graph, attack path analysis, and the cloud security explorer are invaluable tools for contextual security assessment.

    ๐Ÿ” Scenario 1: Sensitive Data Exposure

    Imagine Contoso Bank, using Amazon S3 to store sensitive information. Mistakenly replicating data to a public S3 bucket opens avenues for data exposure. Microsoft Defender CSPM's attack path analysis uncovers this misconfiguration, providing insights and remediation steps.

    ๐Ÿ” Scenario 2: Over-Permissioning via IAM Roles

    Datum Corporation's IT Admins manage AWS EC2 instances and want automated backups. Misconfigured IAM roles can lead to over-permissioning, exposing the instance to more access than necessary. Defender CSPM's attack path capability highlights vulnerabilities, effective permissions, and potential risks.

    ๐Ÿ” Scenario 3: Compromising KMS Keys

    Fabrikam Inc secures sensitive data on Amazon EC2 instances through a KMS key. However, a high-severity vulnerability on the instance poses a risk of unauthorized access to the KMS. Defender CSPM's attack path analysis identifies potential credential theft and suggests remediation steps.

    ๐Ÿ“š Continuous Monitoring and Stay Ahead

    The battle against misconfigurations isn't a one-time effort. Incorporating attack path analysis into your security strategy empowers teams to monitor and address new misconfigurations introduced during environment changes.

    Enhance your AWS security with Microsoft Defender for Cloud. Stay ahead of potential misconfigurations, safeguard sensitive data, and bolster your cloud security strategy.

    #CloudSecurity #AWSProtection #MicrosoftDefender #ProactiveSecurity #CyberDefense #microsoft #cnapp #defenderforcloud #aws #azure #multicloud #cspm #bucket #cloud #cloudsecurity #cloudnative #soc #xdr

  18. ๐Ÿ”’ ๐„๐ฆ๐›๐ซ๐š๐œ๐ข๐ง๐  ๐Œ๐ฎ๐ฅ๐ญ๐ข๐œ๐ฅ๐จ๐ฎ๐ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐'๐ฌ ๐๐ž๐ฐ ๐ˆ๐ง๐ง๐จ๐ฏ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

    Find out recent news about Microsoft CNAPP platform.

    ๐Ÿ›ก๏ธ Enhanced Multicloud Posture Management for GCP ๐Ÿ›ก๏ธ

    Microsoft Defender for Cloud has unveiled advanced posture management capabilities for Google Cloud Platform (GCP). Cloud Security Graph and Attack Path Analysis now support GCP resources. This empowers organizations to identify, prioritize, and address critical risks within their multicloud environment. Key features include attack path analysis, cloud security exploration, agentless scanning, and data-aware security posture.

    ๐ŸŒ Microsoft Cloud Security Benchmark Expands to GCP ๐ŸŒ

    Microsoft Cloud Security Benchmark (MCSB) now includes Google Cloud Platform in its support, aligning with Azure and AWS. With over 120 built-in GCP-specific assessments, MCSB provides industry-best practices for GCP resource monitoring, enabling optimized cloud security across major providers.

    ๐Ÿฆ  Malware Scanning and Container Vulnerability Management ๐Ÿ“ฆ

    Defender for Cloud takes runtime cloud data security to the next level. Malware Scanning in Defender for Storage will soon provide real-time protection against malware entry and distribution in Azure Blob storage accounts. Meanwhile, Defender for Cloud integrates with Microsoft Defender Vulnerability Management to offer agentless vulnerability assessments for containers, fostering secure software supply chains with real-time scans and exploitability insights.

    ๐Ÿš€ Elevate Your Cloud Security with Microsoft Defender for Cloud ๐Ÿš€

    From code to cloud, Microsoft Defender for Cloud empowers you to embrace a proactive and advanced approach to multicloud security. With features like enhanced posture management, expanded benchmark coverage, malware scanning, and container vulnerability assessments, staying secure in multicloud environments has never been easier.

    ๐Ÿ’ก Ready to enhance your multicloud security? Learn more about these innovations in Microsoft Defender for Cloud and embark on a journey of fortified cloud protection today. ๐Ÿ’ก

    techcommunity.microsoft.com/t5

    #cnapp #microsoft #defender #defenderforcloud #azure #aws #gcp #multicoud #cloud #cloudnative #cloudsecurity #CloudSecurityBenchmark #MCSB #va #vulnerabilitymanagement #vulnerability #edr #xdr #microsoft #soc

  19. ๐ƒ๐š๐ญ๐š ๐€๐ฐ๐š๐ซ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐จ๐ฌ๐ญ๐ฎ๐ซ๐ž ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐ ๐ข๐ฌ ๐ง๐จ๐ฐ ๐†๐ž๐ง๐ž๐ซ๐š๐ฅ๐ฅ๐ฒ ๐€๐ฏ๐š๐ข๐ฅ๐š๐›๐ฅ๐ž

    learn.microsoft.com/en-us/azur

    For more information, see Data-aware security posture in Microsoft Defender for Cloud: learn.microsoft.com/en-us/azur

    #microsoft #security #data #cloud #azure #cspm #defendercspm #defender #defenderforcloud #cnapp #aws #cgp #cloudnative #cloudsecurity #soc #purview #microsoftpurview #storage #defenderforstorage #cybersecurity

  20. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฎ ๐—™๐˜‚๐—ป๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—”๐—ฝ๐—ฝ?

    ๐š‚ฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐šŽฬฒโ€‚ฬฒ๐š˜ฬฒ๐š™ฬฒ๐šŽฬฒ๐š›ฬฒ๐šŠฬฒ๐šฬฒ๐š’ฬฒ๐š˜ฬฒ๐š—ฬฒ

    โžก๏ธDefender for Cloud for assessment of potential configuration-related security vulnerabilities

    โžก๏ธLog and monitor: diagnostic settings to configure streaming export of platform logs and metrics

    โžก๏ธRequire HTTPS

    โžก๏ธSecuring keys with Azure key Vault

    โžก๏ธEnable App Service Authentication/Authorization

    โžก๏ธUse Azure API Management (APIM) to authenticate requests

    โžก๏ธRun your function app with the lowest possible permissions

    โžก๏ธStore data encrypted

    ๐š‚ฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐šŽฬฒโ€‚ฬฒ๐šฬฒ๐šŽฬฒ๐š™ฬฒ๐š•ฬฒ๐š˜ฬฒ๐šขฬฒ๐š–ฬฒ๐šŽฬฒ๐š—ฬฒ๐šฬฒ

    โžก๏ธDisable FTP

    โžก๏ธSecure the scm endpoint

    ๐™ฝฬฒ๐šŽฬฒ๐šฬฒ๐š ฬฒ๐š˜ฬฒ๐š›ฬฒ๐š”ฬฒโ€‚ฬฒ๐šœฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐š’ฬฒ๐šฬฒ๐šขฬฒ

    โžก๏ธSet access restrictions

    โžก๏ธSecure the storage account

    โžก๏ธPrivate site access with Azure Private Endpoint

    โžก๏ธDeploy your function app in isolation configuring a Web Application Firewall (WAF) for App Service Environment.

    More details: learn.microsoft.com/en-us/azur

    #security #azure #cloud #data #management #streaming #functionapp #serverless #waf #appservice #privateendpoint #networksecurity #securedeployment #apim #ftp #keyvault #key #vulnerability #assessment #misconfiguration #encryption #storage #storageaccount #defender #defenderforcloud #cnapp #cspm #cwpp #microsoft #microsoftsecurity #cloudsecurity #cloudnative #siem #monitoring #soc

  21. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฎ ๐—™๐˜‚๐—ป๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—”๐—ฝ๐—ฝ?

    ๐š‚ฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐šŽฬฒโ€‚ฬฒ๐š˜ฬฒ๐š™ฬฒ๐šŽฬฒ๐š›ฬฒ๐šŠฬฒ๐šฬฒ๐š’ฬฒ๐š˜ฬฒ๐š—ฬฒ

    โžก๏ธDefender for Cloud for assessment of potential configuration-related security vulnerabilities

    โžก๏ธLog and monitor: diagnostic settings to configure streaming export of platform logs and metrics

    โžก๏ธRequire HTTPS

    โžก๏ธSecuring keys with Azure key Vault

    โžก๏ธEnable App Service Authentication/Authorization

    โžก๏ธUse Azure API Management (APIM) to authenticate requests

    โžก๏ธRun your function app with the lowest possible permissions

    โžก๏ธStore data encrypted

    ๐š‚ฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐šŽฬฒโ€‚ฬฒ๐šฬฒ๐šŽฬฒ๐š™ฬฒ๐š•ฬฒ๐š˜ฬฒ๐šขฬฒ๐š–ฬฒ๐šŽฬฒ๐š—ฬฒ๐šฬฒ

    โžก๏ธDisable FTP

    โžก๏ธSecure the scm endpoint

    ๐™ฝฬฒ๐šŽฬฒ๐šฬฒ๐š ฬฒ๐š˜ฬฒ๐š›ฬฒ๐š”ฬฒโ€‚ฬฒ๐šœฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐š’ฬฒ๐šฬฒ๐šขฬฒ

    โžก๏ธSet access restrictions

    โžก๏ธSecure the storage account

    โžก๏ธPrivate site access with Azure Private Endpoint

    โžก๏ธDeploy your function app in isolation configuring a Web Application Firewall (WAF) for App Service Environment.

    More details: learn.microsoft.com/en-us/azur

    #security #azure #cloud #data #management #streaming #functionapp #serverless #waf #appservice #privateendpoint #networksecurity #securedeployment #apim #ftp #keyvault #key #vulnerability #assessment #misconfiguration #encryption #storage #storageaccount #defender #defenderforcloud #cnapp #cspm #cwpp #microsoft #microsoftsecurity #cloudsecurity #cloudnative #siem #monitoring #soc

  22. What's new in Microsoft Defender for Cloud?

    Updates in May include:

    โžก๏ธNew alert in Defender for Key Vault

    โžก๏ธAgentless scanning now supports encrypted disks in AWS

    โžก๏ธRevised JIT (Just-In-Time) rule naming conventions in Defender for Cloud

    โžก๏ธOnboard selected AWS regions

    โžก๏ธMultiple changes to identity recommendations

    โžก๏ธDeprecation of legacy standards in compliance dashboard

    โžก๏ธTwo Defender for DevOps recommendations now include Azure DevOps scan findings

    โžก๏ธNew default setting for Defender for Servers vulnerability assessment solution

    More details: learn.microsoft.com/en-us/azur

    #microsoft #azure #devops #cloud #aws #compliance #gcp #defender #defenderforcloud #cnapp #cspm #cwpp #soc #cloudsecurity #multicloud #securityplatform #microsoftsecurity

  23. What's new in Microsoft Defender for Cloud?

    Updates in May include:

    โžก๏ธNew alert in Defender for Key Vault

    โžก๏ธAgentless scanning now supports encrypted disks in AWS

    โžก๏ธRevised JIT (Just-In-Time) rule naming conventions in Defender for Cloud

    โžก๏ธOnboard selected AWS regions

    โžก๏ธMultiple changes to identity recommendations

    โžก๏ธDeprecation of legacy standards in compliance dashboard

    โžก๏ธTwo Defender for DevOps recommendations now include Azure DevOps scan findings

    โžก๏ธNew default setting for Defender for Servers vulnerability assessment solution

    More details: learn.microsoft.com/en-us/azur

    #microsoft #azure #devops #cloud #aws #compliance #gcp #defender #defenderforcloud #cnapp #cspm #cwpp #soc #cloudsecurity #multicloud #securityplatform #microsoftsecurity