Defender for Cloud provides a single platform for managing threats and the security posture of dynamic workloads on Azure. It gives you the tools you need to safeguard your resources, monitors your security posture, defends against cyberattacks, and makes security administration easier.
Defender for Cloud provides a single platform for managing threats and the security posture of dynamic workloads on Azure. It gives you the tools you need to safeguard your resources, monitors your security posture, defends against cyber attacks, and makes security administration easier. Defender for Cloud is simple to set up and operate since it is natively integrated, with simple auto-provisioning to secure your resources by default.
Defender for Cloud can continuously monitor hybrid and cloud architectures and assesses risk variables depending on the policies and best practices specified in the subscription requirements.
Microsoft Defender for Cloud comes with a specific regulatory compliance dashboard that displays the status of all assessments in your environments based on your specified standards. Your compliance posture improves when suggestions are implemented and subsequently minimizes risk elements in the environment.
The regulatory compliance dashboard blade displays your chosen compliance standards and their criteria. This helps focus your attention on the gaps in compliance with the selected standards and regulations. Additionally, the full view enables you to track compliance over time in the Azure and hybrid environments such as AWS and GCP.
The Azure Security Benchmark is assigned across every subscription. The guideline contains Microsoft's Azure-specific security and compliance best practices based on standard compliance frameworks. Microsoft Defender for Cloud can compare the configuration of your resources with requirements based on industry standards, regulations, and benchmarks.
To add the standards to the dashboard, Azure subscription must enable Defender for Cloud's enhanced security features. Once the features are enabled the users should have either ‘Owner’ or ‘Policy Contributor’ permissions.
In this article, we will discuss AWS/ Azure Center for Internet Security (CIS) Benchmarks. Before adding the benchmarks, we must connect AWS Account to Azure through Microsoft Defender for Cloud Service, Regulatory Compliance.
The AWS and Azure Connection is already set up as a prerequisite. You can read how to connect your AWS account to Microsoft Defender for Cloud . To configure the (CIS) Benchmarks for both AWS and Azure Environments, click the Environment you want in Microsoft Defender for Cloud | Environment settings and click the Security Policy
Can deploy the same in 'Policy' in the Azure portal search Area.
Then in the "Industry and Regulatory Standards Section" click add more/standards (in this demo Azure/AWSCIS)
Please note that you must continue this on all required environments or subscriptions.
Then select the Scope (Subscription or Resources group) and continue.
For the AWS direct Microsoft Defender for Cloud | Environment settings, select the AWS Account(s) the go-to Standards
Then Add Section Select the AWS CIS
After applying the standards, it may take 6-12hours to show the Compliance Controllers in The Regulatory Compliance blade.
Now you can make visible the compliance controls by their categories. If resource compliance status fails in some controls, you can remediate those with the given instructions.
Regulatory compliance also provides compliance domains and security controls for Azure Arc-enabled Resources. This can help your Azure Arc resources comply with the specific standards.
Based on Defender for Cloud assessments data, you can access the high-level summary of compliance status for the specified standard. These reports are organized by the standard's control and can be sent to key stakeholders and used as evidence by both internal and external auditors.
Defender for Cloud has an export method feature that makes it easier to compare & track your compliance status with other monitoring tools in your environment. Configure continuous export to send selected data to a Log Analytics workspace or an Azure Event Hub. You can also automate your workflow when compliance requirements change.