{"id":1101,"date":"2024-06-22T14:02:22","date_gmt":"2024-06-22T12:02:22","guid":{"rendered":"https:\/\/www.jussimetso.com\/?p=1101"},"modified":"2025-05-25T16:58:17","modified_gmt":"2025-05-25T13:58:17","slug":"defender-for-cloud-part-3-security-posture","status":"publish","type":"post","link":"https:\/\/www.jussimetso.com\/index.php\/2024\/06\/22\/defender-for-cloud-part-3-security-posture\/","title":{"rendered":"Defender for Cloud \u2013 Part 3: Security Posture"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1101\" class=\"elementor elementor-1101\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-04beb4f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"04beb4f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a41dcbd\" data-id=\"a41dcbd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69b20e3 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"69b20e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__69b20e3\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__69b20e3\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__69b20e3\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7301be elementor-widget elementor-widget-heading\" data-id=\"f7301be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Overview of Security posture<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3371b elementor-widget elementor-widget-text-editor\" data-id=\"2f3371b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Security posture<\/strong> and it&#8217;s proper management in public clouds is a hot potato (in finnish kuuma peruna).<\/p><p>It&#8217;s very rare that it is properly managed at least I\u00a0 haven&#8217;t seen environments where I could say at first glance that asset security posture is in good state.<\/p><p>I think the biggest reason is that customer IT have too much on their table and they have not:<\/p><ul><li>figured out what kind of resources they have in their cloud platforms if for example third-parties have not &#8220;opened&#8221; the solutions or<\/li><li>it&#8217;s possible that they don&#8217;t even know that they have cloud resources in use<\/li><li>even if they know they don&#8217;t understand the idea that there might be assets which needs security<\/li><li>they don&#8217;t know the product called Defender for Cloud.<\/li><li>Defender for Cloud is messed up with tens of other &#8220;Defender&#8221; products<\/li><li>And if they know MDC aka Defender for Cloud it might costs too much.<\/li><\/ul><p>Well the security ain&#8217;t cheap\u00a0 but it&#8217;s <strong>A lot of cheaper<\/strong> when it&#8217;s in good shape and safe than your assets have compromised and there&#8217;s a cloud attack in progress. But that&#8217;s a different story.<\/p><p><strong>My idea with this post is to <span style=\"text-decoration: underline;\">educate and introduce<\/span> the Defender for Cloud Security Posture.<\/strong><\/p><p><strong>Microsoft Defender for Cloud = later MDC.<br \/><\/strong><\/p><p><strong>And you can click some of images below to see them better.\u00a0 Let&#8217;s start.<br \/><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-769cbbf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"769cbbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76b5d8c elementor-widget elementor-widget-text-editor\" data-id=\"76b5d8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When you open Defender for Cloud you can find Security posture section like this:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac8be3b elementor-widget elementor-widget-image\" data-id=\"ac8be3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"626\" height=\"242\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_choie.png?fit=626%2C242&amp;ssl=1\" class=\"attachment-large size-large wp-image-1139\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_choie.png?w=626&amp;ssl=1 626w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_choie.png?resize=300%2C116&amp;ssl=1 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ded4d1f elementor-widget elementor-widget-text-editor\" data-id=\"ded4d1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>And when clicking the section name MDC opens the overwiew page of Security posture:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-948a2cb elementor-widget elementor-widget-image\" data-id=\"948a2cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"501\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_overview.png?fit=640%2C501&amp;ssl=1\" class=\"attachment-large size-large wp-image-1143\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_overview.png?w=1311&amp;ssl=1 1311w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_overview.png?resize=300%2C235&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_overview.png?resize=1024%2C801&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_overview.png?resize=768%2C601&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_security_posture_overview.png?resize=850%2C665&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-948c8ce elementor-widget elementor-widget-text-editor\" data-id=\"948c8ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It&#8217;s also possible to group environments (checkbox in upper right corner):<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f230ec3 elementor-widget elementor-widget-image\" data-id=\"f230ec3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_environments_group_by\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTIzNSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19lbnZpcm9ubWVudHNfZ3JvdXBfYnkucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"144\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?fit=640%2C144&amp;ssl=1\" class=\"attachment-large size-large wp-image-1235\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?w=2530&amp;ssl=1 2530w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?resize=300%2C68&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?resize=1024%2C231&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?resize=768%2C173&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?resize=1536%2C347&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?resize=2048%2C462&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?resize=850%2C192&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_environments_group_by.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Click image to enlarge it.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e1b9f95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e1b9f95\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2526db9\" data-id=\"2526db9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-490217d elementor-widget elementor-widget-text-editor\" data-id=\"490217d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Section 1<\/strong> shows you couple of workbooks: Secure Score over time where you can see the history data how your asset security has evolved and the Governance report if you have assigned assets to different owners how they have remediated the asset security. There are also links to guides and other useful blogs to read about the Security Posture.<\/p><p><strong>Section 2<\/strong> shows the environments which are connected to MDC.<\/p><p><strong>Section 3\u00a0<\/strong>shows you the Total AVG secure score of your chosen environments. In my case there are three Azure subscriptions and the formula = <strong>SUM(subscriptions)\/subscription count<\/strong>.<\/p><p>And because I don&#8217;t have resources in other clouds (AWS\/GCP) or connectors this shows only Azure secure score. (Well there is AWS connector but there are no resources in that account so that&#8217;s why the AWS account is shown but it&#8217;s secure score is N\/A and it&#8217;s not included in the formula.)<\/p><p><strong>Section 4\u00a0<\/strong>shows the Environment risk where number of Critical recommendations and Attack Paths are lifted to the top and all recommendations are\u00a0 colored\u00a0 by the risk criticality.\u00a0<\/p><p><strong>Section 5<\/strong> shows the governance status of defined rules that has assigned owner and a due date for addressing recommendations for specific resources. I&#8217;ll cover this later.\u00a0<\/p><p><strong>Section 6\u00a0<\/strong>shows selected environments and their Name, Secure Score, Unhealthty resources, number of Attack Paths and link to recommendations.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94b3283 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"94b3283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a1a844a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1a844a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-75a7931\" data-id=\"75a7931\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-297376a elementor-widget elementor-widget-heading\" data-id=\"297376a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What's included in MDC Security posture<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ac207b elementor-widget elementor-widget-text-editor\" data-id=\"5ac207b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are &#8220;functions&#8221; to enhance the Security posture within MDC:<\/p><ul><li>Cloud Security Posture Management (CSPM)<\/li><li>Security policies<\/li><li>Risk prioritization<\/li><li>Governance rules<\/li><li>Secure score<\/li><li>Regulatory compliance standards<\/li><li>Microsoft Cloud Security Benchmark (MCSB)<\/li><li>Investigating risks with security explorer\/attack paths<\/li><li>External attack surface management in Defender for Cloud<\/li><li>Critical assets protection<\/li><li>Permissions management (CIEM)<\/li><li>Agentless machine scanning<\/li><li>Secrets protection<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d468385 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d468385\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8699cad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8699cad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a55aa85\" data-id=\"a55aa85\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e6b3cc elementor-widget elementor-widget-heading\" data-id=\"5e6b3cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cloud Security Posture Management  (CSPM)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-455b9c3 elementor-widget elementor-widget-text-editor\" data-id=\"455b9c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of MDC&#8217;s main pillars is cloud security posture management (CSPM). CSPM provides detailed visibility into the security state of your assets and workloads, and provides hardening guidance to help you efficiently and effectively improve your security posture.<\/p><p>CSPM has two plans:<\/p><ul><li><p><strong>Foundational CSPM<\/strong> &#8211; MDC offers foundational multicloud CSPM capabilities for free. These capabilities are automatically enabled by default for subscriptions and accounts that onboard to MDC.<\/p><\/li><li><p><strong>Defender Cloud Security Posture Management (CSPM) plan<\/strong> &#8211; The optional, but recommended paid plan.<\/p><\/li><\/ul><p>In the table below the feature name is actually a link which opens to new windows.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a1dab1f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1dab1f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0876aef\" data-id=\"0876aef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34cc391 elementor-widget elementor-widget-heading\" data-id=\"34cc391\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CSPM Plan availability<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df8f210 elementor-widget elementor-widget-shortcode\" data-id=\"df8f210\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"wptb-container-legacy\" data-table-id=\"1239\">\n    <table class=\"wptb-preview-table wptb-element-main-table_setting-1239 edit-active\" style=\"border: 1px solid rgb(209, 209, 209);\" data-reconstraction=\"1\" data-wptb-table-tds-sum-max-width=\"592\" data-wptb-cells-width-auto-count=\"4\" data-wptb-horizontal-scroll-status=\"false\" data-wptb-extra-styles=\"LyogRW50ZXIgeW91ciBjdXN0b20gQ1NTIHJ1bGVzIGhlcmUgKi8=\" role=\"table\" data-table-columns=\"4\" data-wptb-apply-table-container-max-width=\"1\" data-wptb-table-container-max-width=\"700\" data-wptb-td-width-auto=\"127\"><tbody><tr class=\"wptb-row\"><td class=\"wptb-cell\" data-y-index=\"0\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\" data-sorted-vertical=\"ask-disabled\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-705\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><strong>Feature<\/strong><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"0\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\" data-sorted-vertical=\"ask-disabled\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-707\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\"><strong>Foundational CSPM<br><\/strong><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"0\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\" data-sorted-vertical=\"ask-disabled\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-710\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\"><strong>MDC CSPM<br><\/strong><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"0\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\" data-sorted-vertical=\"ask-disabled\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-711\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><strong>Cloud Availability<\/strong><\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"1\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-601\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p class=\"\"><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/review-security-recommendations\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/review-security-recommendations\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Security recommendations<\/a><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"1\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-709\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"1\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-603\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"1\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-604\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP, on-premises<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"2\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-605\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/asset-inventory\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/asset-inventory\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Asset inventory<\/a><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"2\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-606\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"2\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-607\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"2\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-608\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP, on-premises<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"3\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-609\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/secure-score-security-controls\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/secure-score-security-controls\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Secure score<\/a><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"3\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-610\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"3\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-611\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"3\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-612\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP, on-premises<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"4\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-613\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Data visualization and reporting with Azure Workbooks<\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"4\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-614\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"4\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-615\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"4\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-616\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP, on-premises<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"5\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-617\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"Workflow%20automation\" href=\"Workflow%20automation\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Data exporting<\/a><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"5\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-618\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"5\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-619\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"5\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-620\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP, on-premises<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"6\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-621\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p class=\"\"><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/workflow-automation\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/workflow-automation\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Workflow automation<\/a><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"6\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-622\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"6\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-623\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"6\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-624\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP, on-premises<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"7\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-625\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Tools for remediation<\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"7\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-626\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"7\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-627\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"7\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-628\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP, on-premises<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"8\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-629\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-regulatory-compliance\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-regulatory-compliance\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Microsoft Cloud Security Benchmark<\/a><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"8\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-630\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"8\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-631\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"8\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-632\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"9\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-633\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p class=\"\"><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/ai-security-posture\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/ai-security-posture\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">AI security posture management<\/a><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"9\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-634\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\"><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"9\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-635\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"9\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-636\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"10\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-637\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p class=\"\"><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/enable-agentless-scanning-vms\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/enable-agentless-scanning-vms\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Agentless VM vulnerability scanning<\/a><br><\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"10\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-638\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"10\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-639\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"10\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-640\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"11\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-641\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/secrets-scanning-servers\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/secrets-scanning-servers\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Agentless VM secrets scanning<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"11\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-642\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"11\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-643\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"11\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-644\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"12\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-645\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/how-to-manage-attack-path\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/how-to-manage-attack-path\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Attack path analysis<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"12\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-646\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"12\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-647\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"12\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-648\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"13\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-649\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p class=\"\"><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/risk-prioritization\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/risk-prioritization\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Risk prioritization<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"13\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-650\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"13\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-651\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"13\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-652\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"14\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-653\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/how-to-manage-cloud-security-explorer\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/how-to-manage-cloud-security-explorer\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Risk hunting with security explorer<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"14\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-654\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"14\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-655\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"14\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-656\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"15\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-657\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/container-image-mapping\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/container-image-mapping\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Code-to-cloud mapping for containers<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"15\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-658\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"15\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-659\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"15\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-660\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>GitHub, Azure DevOps<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"16\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-661\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/iac-template-mapping\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/iac-template-mapping\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Code-to-cloud mapping for IaC<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"16\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-662\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"16\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-663\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"16\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-664\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure DevOps<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"17\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-665\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/review-pull-request-annotations\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/review-pull-request-annotations\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">PR annotations<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"17\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-666\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"17\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-667\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"17\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-668\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>GitHub, Azure DevOps<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"18\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-669\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Internet exposure analysis<\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"18\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-670\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"18\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-671\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"18\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-672\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"19\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-673\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-easm\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-easm\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">External attack surface management (EASM)<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"19\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-674\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"19\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-675\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"19\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-676\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"20\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-677\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/permissions-management\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/permissions-management\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Permissions Management (CIEM)<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"20\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-678\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"20\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-679\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"20\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-680\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"21\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-681\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-regulatory-compliance-standards\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-regulatory-compliance-standards\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Regulatory compliance assessments<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"21\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-682\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"21\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-683\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"21\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-684\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"22\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-685\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/integration-servicenow\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/integration-servicenow\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">ServiceNow Integration<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"22\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-686\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"22\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-687\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"22\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-688\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"23\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-689\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/critical-assets-protection\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/critical-assets-protection\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Critical assets protection<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"23\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-690\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"23\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-691\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"23\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-692\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-x-index=\"0\" data-y-index=\"24\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-712\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/governance-rules\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/governance-rules\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Governance to drive remediation at-scale<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-x-index=\"1\" data-y-index=\"24\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-716\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-x-index=\"2\" data-y-index=\"24\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-714\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><\/div><\/div><\/td><td class=\"wptb-cell\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-x-index=\"3\" data-y-index=\"24\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-715\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"25\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-693\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-data-security-posture\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-data-security-posture\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Data security posture management (DSPM), Sensitive data scanning<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"25\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-694\"><div><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"25\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-695\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"25\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-696\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP(1)<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"26\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-697\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-agentless-containers\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-agentless-containers\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Agentless discovery for Kubernetes<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"26\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-698\"><div><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"26\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-699\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"26\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-700\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><tr class=\"wptb-row\" style=\"--hover-bg-color: undefined;\"><td class=\"wptb-cell\" data-y-index=\"27\" data-x-index=\"0\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-701\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p><a data-mce-href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/agentless-vulnerability-assessment-azure\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/agentless-vulnerability-assessment-azure\" target=\"_blank\" rel=\"noopener\" data-mce-selected=\"inline-boundary\">Agentless code-to-cloud containers vulnerability assessment<\/a><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"27\" data-x-index=\"1\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-702\"><div><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"27\" data-x-index=\"2\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-703\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p style=\"text-align: center;\">X<\/p><p><\/p><\/div><\/div><\/td><td class=\"wptb-cell\" data-y-index=\"27\" data-x-index=\"3\" style=\"border: 1px solid rgb(209, 209, 209); padding: 10px;\" data-wptb-css-td-auto-width=\"true\"><div class=\"wptb-text-container wptb-ph-element wptb-element-text-704\" style=\"color: rgb(0, 0, 0); font-size: 15px;\"><div class=\"\" style=\"position: relative;\"><p>Azure, AWS, GCP<\/p><\/div><\/div><\/td><\/tr><\/tbody><\/table>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c2fa4c elementor-widget elementor-widget-text-editor\" data-id=\"5c2fa4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>(1): GCP sensitive data discovery supports only <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-data-security-posture-prepare#whats-supported\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Cloud Storage.<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fafa833 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fafa833\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-660eeca\" data-id=\"660eeca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-525b7b4 elementor-widget elementor-widget-heading\" data-id=\"525b7b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security policies<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c41179f elementor-widget elementor-widget-text-editor\" data-id=\"c41179f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security policies in MDC consist of security standards and recommendations that help to improve your cloud security posture.<\/p><p>Security standards define rules, compliance conditions for those rules, and actions (effects) to be taken if conditions aren&#8217;t met. Defender for Cloud assesses resources and workloads against the security standards enabled in your Azure subscriptions, Amazon Web Services (AWS) accounts, and Google Cloud Platform (GCP) projects. Based on those assessments, security recommendations provide practical steps to help you remediate security issues.<\/p><p>I&#8217;ll write more of security policies in the future coming post.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc9001d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc9001d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ca045a5\" data-id=\"ca045a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5eb0b8b elementor-widget elementor-widget-heading\" data-id=\"5eb0b8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Risk priorization<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4d0c7a elementor-widget elementor-widget-text-editor\" data-id=\"f4d0c7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MDC performs a risk assessment of your security issues, the engine identifies the most significant security risks while distinguishing them from less risky issues. The recommendations are then sorted based on their risk level.<\/p><p>MDC analyzes which security issues are part of potential attack paths that attackers could use to breach your environment. It also highlights the security recommendations that need to be resolved to mitigate these risks. This approach helps you focus on urgent security concerns and makes remediation efforts more efficient and effective. Although <u>risk prioritization doesn&#8217;t affect the secure score<\/u>, it helps you to address the most critical security issues in your environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48874a2 elementor-widget elementor-widget-image\" data-id=\"48874a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_recommendations_by_risk\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTIxOCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19yZWNvbW1lbmRhdGlvbnNfYnlfcmlzay5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2542\" height=\"1097\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?fit=2542%2C1097&amp;ssl=1\" class=\"attachment-full size-full wp-image-1218\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?w=2542&amp;ssl=1 2542w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?resize=300%2C129&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?resize=1024%2C442&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?resize=768%2C331&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?resize=1536%2C663&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?resize=2048%2C884&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?resize=850%2C367&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">This is new (preview) Recommendations view <\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12b54d8 elementor-widget elementor-widget-text-editor\" data-id=\"12b54d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>And if you switch the &#8220;Group by title&#8221; the screen looks like this:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a31aecb elementor-widget elementor-widget-image\" data-id=\"a31aecb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_recommendations_by_risk_group_by_title\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTIxOSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19yZWNvbW1lbmRhdGlvbnNfYnlfcmlza19ncm91cF9ieV90aXRsZS5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2536\" height=\"561\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?fit=2536%2C561&amp;ssl=1\" class=\"attachment-full size-full wp-image-1219\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?w=2536&amp;ssl=1 2536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?resize=300%2C66&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?resize=1024%2C227&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?resize=768%2C170&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?resize=1536%2C340&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?resize=2048%2C453&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?resize=850%2C188&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_recommendations_by_risk_group_by_title.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae0f3c elementor-widget elementor-widget-text-editor\" data-id=\"1ae0f3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>NOTE. Risk prioritization and governance are supported only with the <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-cloud-security-posture-management#plan-availability\" target=\"_blank\" rel=\"noopener\" data-linktype=\"relative-path\"><span style=\"text-decoration: underline;\">Defender CSPM plan<\/span><\/a>.<\/strong><\/p><p><strong>And if your environment is<span style=\"text-decoration: underline;\"> not protected<\/span> by the Defender CSPM plan the columns with the risk prioritization features will <span style=\"text-decoration: underline;\">appear blurred out<\/span>.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6e203c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b6e203c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7914435 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7914435\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8688422\" data-id=\"8688422\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0256db elementor-widget elementor-widget-heading\" data-id=\"d0256db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Secure score<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3bbf1e elementor-widget elementor-widget-text-editor\" data-id=\"a3bbf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The secure score in MDC can help you to improve your cloud security posture. The secure score aggregates security findings into a single score so that you can assess, at a glance, your current security situation. The higher the score, the lower the identified risk level is. More info <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/secure-score-security-controls#exploring-your-security-posture\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">here<\/span><\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6850be5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6850be5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0067ad3\" data-id=\"0067ad3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15444ef elementor-widget elementor-widget-heading\" data-id=\"15444ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Governance rules<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e219ab elementor-widget elementor-widget-text-editor\" data-id=\"4e219ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MDC continuously assesses your hybrid and multi-cloud workloads and provides you with recommendations to harden your assets and enhance your security posture. Central security teams often experience challenges when driving the personnel within their organizations to implement recommendations. The organizations&#8217; security posture can suffer as a result.<\/p><p>You can define rules that assign an owner and a due date for addressing recommendations for specific resources. This provides resource owners with a clear set of tasks and deadlines for remediating recommendations.<\/p><p>For this blog post I <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/governance-rules#define-a-governance-rule\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">made a test rule<\/span><\/a> (link to MS Learn):<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3be3107 e-transform elementor-widget elementor-widget-image\" data-id=\"3be3107\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_scaleX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleY_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleY_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleY_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_governance_rule\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTIwMywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19nb3Zlcm5hbmNlX3J1bGUucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"23\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?fit=640%2C23&amp;ssl=1\" class=\"attachment-large size-large wp-image-1203\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?w=2436&amp;ssl=1 2436w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?resize=300%2C11&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?resize=1024%2C37&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?resize=768%2C27&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?resize=1536%2C55&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?resize=2048%2C73&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?resize=850%2C30&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3549e3 elementor-widget elementor-widget-image\" data-id=\"e3549e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_governance_rule2\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTIwNywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19nb3Zlcm5hbmNlX3J1bGUyLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"159\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?fit=1536%2C159&amp;ssl=1\" class=\"attachment-1536x1536 size-1536x1536 wp-image-1207\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?w=1705&amp;ssl=1 1705w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?resize=300%2C31&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?resize=1024%2C106&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?resize=768%2C79&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?resize=1536%2C159&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?resize=850%2C88&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule2.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8b77cc elementor-widget elementor-widget-image\" data-id=\"e8b77cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"249\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule_pie.png?fit=300%2C249&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-1208\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule_pie.png?w=490&amp;ssl=1 490w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_governance_rule_pie.png?resize=300%2C249&amp;ssl=1 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9aca05 elementor-widget elementor-widget-text-editor\" data-id=\"b9aca05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You can watch Microsoft Security video about this<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-def9b4d elementor-widget elementor-widget-video\" data-id=\"def9b4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=U_sct4J2FvQ&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-864eebb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"864eebb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4286bf5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4286bf5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-807942f\" data-id=\"807942f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cfacff0 elementor-widget elementor-widget-heading\" data-id=\"cfacff0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Regulatory compliance standards<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-928fb4b elementor-widget elementor-widget-text-editor\" data-id=\"928fb4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MDC continually assesses the environment-in-scope against any compliance controls that can be automatically assessed. Based on assessments, it shows resources as being compliant or non-compliant with controls.<\/p><p>MCSB aka <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-regulatory-compliance\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Microsoft Cloud Security Benchmark<\/span><\/a> is the default standard in MDC which is always available.<\/p><p>In the Regulatory compliance dashboard, you manage and interact with compliance standards. You can see which compliance standards are assigned, turn standards on and off for Azure, AWS, and GCP, and review the status of assessments against standards.<\/p><p>You can also integrate compliance data from MDC with <span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/compliance\/compliance-manager\" target=\"_blank\" rel=\"noopener\" data-linktype=\"absolute-path\">Microsoft Purview Compliance Manager<\/a><\/span>, allowing you to centrally assess and manage compliance across your organization&#8217;s entire digital estate.<\/p><p>I&#8217;ll write more of regulatory compliance standards in the future coming post.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36d4dd7 elementor-widget elementor-widget-image\" data-id=\"36d4dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_regulatory_overview.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_regulatory_overview\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI0NiwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19yZWd1bGF0b3J5X292ZXJ2aWV3LnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"517\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_regulatory_overview.png?fit=640%2C517&amp;ssl=1\" class=\"attachment-large size-large wp-image-1246\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_regulatory_overview.png?w=1469&amp;ssl=1 1469w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_regulatory_overview.png?resize=300%2C242&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_regulatory_overview.png?resize=1024%2C827&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_regulatory_overview.png?resize=768%2C621&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_regulatory_overview.png?resize=850%2C687&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_regulatory_overview.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e9211bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e9211bb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77efb00\" data-id=\"77efb00\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37240f2 elementor-widget elementor-widget-heading\" data-id=\"37240f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Microsoft Cloud Security Benchmark<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d41abec elementor-widget elementor-widget-text-editor\" data-id=\"d41abec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When you onboard subscriptions and accounts to MDC, the <span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/introduction\" data-linktype=\"absolute-path\">Microsoft cloud security benchmark <\/a><\/span>automatically starts to assess resources in scope.<\/p><p>This benchmark builds on the cloud security principles defined by the Azure Security Benchmark and applies these principles with detailed technical implementation guidance for Azure, for other cloud providers (such as AWS and GCP), and for other Microsoft clouds.<\/p><p>I&#8217;ll write more of MCSB in the future coming post.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a91660f elementor-widget elementor-widget-image\" data-id=\"a91660f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_mcsb_example\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI0NywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19tY3NiX2V4YW1wbGUucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"247\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?fit=640%2C247&amp;ssl=1\" class=\"attachment-large size-large wp-image-1247\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?w=1921&amp;ssl=1 1921w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?resize=300%2C116&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?resize=1024%2C395&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?resize=768%2C296&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?resize=1536%2C592&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?resize=850%2C328&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_mcsb_example.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1c9818e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c9818e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-820fbdb\" data-id=\"820fbdb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f1641cd elementor-widget elementor-widget-heading\" data-id=\"f1641cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Investigating risks with security explorer\/attack paths<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef67ed elementor-widget elementor-widget-heading\" data-id=\"1ef67ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Cloud Security Explorer<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-509a9a4 elementor-widget elementor-widget-text-editor\" data-id=\"509a9a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I wrote a post of Cloud Security Explorer when it came to <a href=\"https:\/\/www.jussimetso.com\/index.php\/2023\/01\/11\/cloud-security-posture-management-cspm-and-some-of-its-features\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">public preview<\/span><\/a> on January 2023. You can read it if you want to. This has developed since then.<\/p><p>The cloud security graph is a graph-based context engine that exists within MDC. The cloud security graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected is then used to build a graph representing your multicloud environment.<\/p><p>MDC then uses the generated graph to perform an attack path analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the cloud security explorer.<\/p><p>You can create a query what you like to search or you can use templates.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf78fd8 elementor-widget elementor-widget-image\" data-id=\"cf78fd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_cloud_security_query_example\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI0OCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19jbG91ZF9zZWN1cml0eV9xdWVyeV9leGFtcGxlLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"228\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?fit=640%2C228&amp;ssl=1\" class=\"attachment-large size-large wp-image-1248\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?w=2179&amp;ssl=1 2179w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?resize=300%2C107&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?resize=1024%2C365&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?resize=768%2C274&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?resize=1536%2C547&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?resize=2048%2C729&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?resize=850%2C303&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_example.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Self-made query<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eff0b10 elementor-widget elementor-widget-image\" data-id=\"eff0b10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_cloud_security_query_templates_example\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI0OSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19jbG91ZF9zZWN1cml0eV9xdWVyeV90ZW1wbGF0ZXNfZXhhbXBsZS5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"346\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?fit=640%2C346&amp;ssl=1\" class=\"attachment-large size-large wp-image-1249\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?w=2095&amp;ssl=1 2095w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?resize=300%2C162&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?resize=1024%2C553&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?resize=768%2C415&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?resize=1536%2C829&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?resize=2048%2C1106&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?resize=850%2C459&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_cloud_security_query_templates_example.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Example of query templates<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4b5908 elementor-widget elementor-widget-text-editor\" data-id=\"d4b5908\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I&#8217;ll write more of Cloud Security Explorer in the future coming post.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb94875 elementor-widget elementor-widget-heading\" data-id=\"eb94875\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Attack path analysis<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fa70ee elementor-widget elementor-widget-text-editor\" data-id=\"8fa70ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers might use to breach your environment to reach your high-impact assets. Attack path analysis exposes attack paths and suggests recommendations as to how best remediate issues that will break the attack path and prevent successful breach.<\/p><p>When you take your environment&#8217;s contextual information into account, attack path analysis identifies issues that might lead to a breach on your environment, and helps you to remediate the highest risk ones first. For example its exposure to the internet, permissions, lateral movement, and more.<\/p><p>I&#8217;ll write more of Attack path analysis in the future coming post.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f4d815 elementor-widget elementor-widget-image\" data-id=\"9f4d815\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_attack_path_overview\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI1MywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19hdHRhY2tfcGF0aF9vdmVydmlldy5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"127\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?fit=640%2C127&amp;ssl=1\" class=\"attachment-large size-large wp-image-1253\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?w=2197&amp;ssl=1 2197w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?resize=300%2C59&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?resize=1024%2C203&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?resize=768%2C152&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?resize=1536%2C304&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?resize=2048%2C405&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?resize=850%2C168&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_attack_path_overview.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cd48b2c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cd48b2c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-52ef43a\" data-id=\"52ef43a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c8d46f4 elementor-widget elementor-widget-heading\" data-id=\"c8d46f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">External attack surface management in Defender for Cloud<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb58a1d elementor-widget elementor-widget-text-editor\" data-id=\"fb58a1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MDC has the capability to perform external attack surface management (EASM), (outside-in) scans on multicloud environments. MDC accomplishes this through its integration with Microsoft Defender EASM. <strong>NOTE: You need to have EASM implemented to make this work.<\/strong><\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/external-attack-surface-management\/overview\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Defender EASM<\/span><\/a> applies Microsoft\u2019s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:<\/p><ul><li>Discover digital assets, always-on inventory.<\/li><li>Analyze and prioritize risks and threats.<\/li><li>Pinpoint attacker-exposed weaknesses, anywhere and on-demand.<\/li><li>Gain visibility into third-party attack surfaces.<\/li><\/ul><p>Defender EASM integration to provide the following capabilities within the MDC portal:<\/p><ul><li>Discover of all the internet facing cloud resources through the use of an outside-in scan.<\/li><li>Attack path analysis which finds all exploitable paths starting from internet exposed IPs.<\/li><li>Custom queries that correlate all internet exposed IPs with the rest of MDC data in the cloud security explorer.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed1c89d elementor-widget elementor-widget-image\" data-id=\"ed1c89d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"485\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/create_easm_instance.png?fit=640%2C485&amp;ssl=1\" class=\"attachment-large size-large wp-image-1254\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/create_easm_instance.png?w=944&amp;ssl=1 944w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/create_easm_instance.png?resize=300%2C228&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/create_easm_instance.png?resize=768%2C583&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/create_easm_instance.png?resize=850%2C645&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">To leverage EASM integration in MDC you need to first create EASM.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e036ba9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e036ba9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f6928d\" data-id=\"6f6928d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-752c8a3 elementor-widget elementor-widget-heading\" data-id=\"752c8a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Critical assets protection\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b270f9 elementor-widget elementor-widget-text-editor\" data-id=\"2b270f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MDC now has business criticality concept added to its security posture management capabilities. This feature helps you to identify and protect your most important assets. It uses the critical assets engine created by <a href=\"https:\/\/learn.microsoft.com\/en-us\/security-exposure-management\/microsoft-security-exposure-management\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Microsoft Security Exposure Management (MSEM)<\/span><\/a>. You can define critical asset rules in MSEM, and MDC can then them in scenarios such as risk prioritization, attack path analysis, and cloud security explorer. MSEM is found in Microsoft Defender portal (<a href=\"https:\/\/security.microsoft.com\" target=\"_blank\" rel=\"noopener\" data-wplink-edit=\"true\"><span style=\"text-decoration: underline;\">security.microsoft.com<\/span><\/a>)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f427c54 elementor-widget elementor-widget-image\" data-id=\"f427c54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"346\" height=\"484\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/msem_menu.png?fit=346%2C484&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-1255\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/msem_menu.png?w=346&amp;ssl=1 346w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/msem_menu.png?resize=214%2C300&amp;ssl=1 214w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/msem_menu.png?resize=300%2C420&amp;ssl=1 300w\" sizes=\"(max-width: 346px) 100vw, 346px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf2837f elementor-widget elementor-widget-text-editor\" data-id=\"bf2837f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The setup is done in <a href=\"https:\/\/security.microsoft.com\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Defender portal<\/span><\/a> and but you can access it also through MCD via Environment Settings:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f29e48 elementor-widget elementor-widget-image\" data-id=\"2f29e48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_setup_critical_assets\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI1NiwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19zZXR1cF9jcml0aWNhbF9hc3NldHMucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"60\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?fit=640%2C60&amp;ssl=1\" class=\"attachment-large size-large wp-image-1256\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?w=1990&amp;ssl=1 1990w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?resize=300%2C28&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?resize=1024%2C96&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?resize=768%2C72&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?resize=1536%2C144&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?resize=850%2C79&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_setup_critical_assets.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e29bb1 elementor-widget elementor-widget-text-editor\" data-id=\"4e29bb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The actual setup is done in Defender portal:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a7bca9 elementor-widget elementor-widget-image\" data-id=\"3a7bca9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"defender_critical_asset_mgmt\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI1NywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL2RlZmVuZGVyX2NyaXRpY2FsX2Fzc2V0X21nbXQucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"369\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?fit=640%2C369&amp;ssl=1\" class=\"attachment-large size-large wp-image-1257\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?w=2077&amp;ssl=1 2077w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?resize=300%2C173&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?resize=1024%2C590&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?resize=768%2C443&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?resize=1536%2C885&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?resize=2048%2C1180&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?resize=850%2C490&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/defender_critical_asset_mgmt.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0361d27 elementor-widget elementor-widget-text-editor\" data-id=\"0361d27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I&#8217;ll write more of Critical Asset management in the future coming post.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-111ebb4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"111ebb4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7bd11d9\" data-id=\"7bd11d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d75ccc0 elementor-widget elementor-widget-heading\" data-id=\"d75ccc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Permissions management (CIEM)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88bfd42 elementor-widget elementor-widget-text-editor\" data-id=\"88bfd42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MDC&#8217;s integration with <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/permissions-management\/overview\" target=\"_blank\" rel=\"noopener\" data-linktype=\"absolute-path\"><span style=\"text-decoration: underline;\">Microsoft Entra Permissions Management<\/span><\/a> provides a <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/enable-permissions-management\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Cloud Infrastructure Entitlement Management (CIEM<\/span><\/a>) security model that helps organizations manage and control user access and entitlements in their cloud infrastructure. CIEM is a critical component of the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/24\/5-ways-a-cnapp-can-strengthen-your-multicloud-security-environment\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Cloud Native Application Protection Platform (CNAPP)<\/span><\/a> solution that provides visibility into who or what has access to specific resources. CIEM ensures that access rights adhere to the principle of least privilege (PoLP), where users or workload identities, such as apps and services, receive only the minimum levels of access necessary to perform their tasks. CIEM also helps organizations to monitor and manage permissions across multiple cloud environments, including Azure, AWS, and GCP.<\/p><p>Integrating Permissions Management with Defender for Cloud (CNAPP) strengthens cloud security by preventing security breaches caused by excessive permissions or misconfigurations. Permissions Management continuously monitors and manages cloud entitlements, helping to discover attack surfaces, detect threats, right-size access permissions, and maintain compliance. This integration enhances the capabilities of Defender for Cloud in securing cloud-native applications and protecting sensitive data.<\/p><p>The integration feature comes as part of Defender CSPM plan and doesn&#8217;t require a Permissions Management license. To learn more about other capabilities that you can receive from Permissions Management, refer to the feature matrix:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eefa401 elementor-widget elementor-widget-image\" data-id=\"eefa401\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/ciem_feature_matrix.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ciem_feature_matrix\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI1OCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL2NpZW1fZmVhdHVyZV9tYXRyaXgucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"463\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/ciem_feature_matrix.png?fit=640%2C463&amp;ssl=1\" class=\"attachment-large size-large wp-image-1258\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/ciem_feature_matrix.png?w=1180&amp;ssl=1 1180w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/ciem_feature_matrix.png?resize=300%2C217&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/ciem_feature_matrix.png?resize=1024%2C741&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/ciem_feature_matrix.png?resize=768%2C556&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/ciem_feature_matrix.png?resize=850%2C615&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: MS Learn<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fabe2f5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fabe2f5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c48dd8\" data-id=\"1c48dd8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ceebd51 elementor-widget elementor-widget-heading\" data-id=\"ceebd51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Agentless machine scanning\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd0669b elementor-widget elementor-widget-text-editor\" data-id=\"dd0669b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentless scanning for virtual machines (VM) in Azure, AWS and GCP provides:<\/p><ul><li>Broad, frictionless visibility into your software inventory using Microsoft Defender Vulnerability Management.<\/li><li>Deep analysis of operating system configuration and other machine meta data.<\/li><li>Vulnerability assessment using Defender Vulnerability Management.<\/li><li>Secret scanning to locate plain text secrets in your compute environment.<\/li><li>Threat detection with agentless malware scanning, using Microsoft Defender Antivirus.<\/li><\/ul><p>Agentless scanning assists you in the identification process of actionable posture issues without the need for installed agents, network connectivity, or any effect on machine performance. Agentless scanning is available through both the <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-cloud-security-posture-management\" target=\"_blank\" rel=\"noopener\" data-linktype=\"relative-path\"><span style=\"text-decoration: underline;\">Defender Cloud Security Posture Management (CSPM)<\/span><\/a> plan and <span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/plan-defender-for-servers-select-plan#plan-features\" target=\"_blank\" rel=\"noopener\" data-linktype=\"relative-path\">Defender for Servers P2<\/a><\/span> plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7968bc9 elementor-widget elementor-widget-image\" data-id=\"7968bc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_agentless_scanning.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_agentless_scanning\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI1OSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19hZ2VudGxlc3Nfc2Nhbm5pbmcucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"238\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_agentless_scanning.png?fit=640%2C238&amp;ssl=1\" class=\"attachment-large size-large wp-image-1259\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_agentless_scanning.png?w=1176&amp;ssl=1 1176w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_agentless_scanning.png?resize=300%2C111&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_agentless_scanning.png?resize=1024%2C380&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_agentless_scanning.png?resize=768%2C285&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_agentless_scanning.png?resize=850%2C315&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: MS Learn<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b037739 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b037739\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5987ed7\" data-id=\"5987ed7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-92d7559 elementor-widget elementor-widget-heading\" data-id=\"92d7559\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Secrets protection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c967e0 elementor-widget elementor-widget-text-editor\" data-id=\"9c967e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MDC provides secrets scanning for virtual machines, and for cloud deployments, to reduce lateral movement risk.<\/p><ul><li><strong>Virtual machines (VMs)<\/strong>: Agentless secrets scanning on multicloud VMs.<\/li><li><strong>Cloud deployments<\/strong>: Agentless secrets scanning across multicloud infrastructure-as-code deployment resources.<\/li><li><strong>Azure DevOps<\/strong>: <span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/defender-for-devops-introduction\" target=\"_blank\" rel=\"noopener\" data-linktype=\"relative-path\">Scanning to discover exposed secrets in Azure DevOps<\/a><\/span>.<\/li><\/ul><p>MDC discovery of the types of secrets summarized in the table.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9d041a elementor-widget elementor-widget-image\" data-id=\"d9d041a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_1.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_secrets_1\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI2MCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19zZWNyZXRzXzEucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"614\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_1.png?fit=640%2C614&amp;ssl=1\" class=\"attachment-large size-large wp-image-1260\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_1.png?w=1220&amp;ssl=1 1220w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_1.png?resize=300%2C288&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_1.png?resize=1024%2C982&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_1.png?resize=768%2C737&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_1.png?resize=850%2C815&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0976fb elementor-widget elementor-widget-image\" data-id=\"b0976fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_2.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_secrets_2\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI2MSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19zZWNyZXRzXzIucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"648\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_2.png?fit=640%2C648&amp;ssl=1\" class=\"attachment-large size-large wp-image-1261\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_2.png?w=1221&amp;ssl=1 1221w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_2.png?resize=296%2C300&amp;ssl=1 296w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_2.png?resize=1012%2C1024&amp;ssl=1 1012w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_2.png?resize=768%2C777&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_2.png?resize=300%2C304&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_2.png?resize=850%2C860&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cf0a19 elementor-widget elementor-widget-image\" data-id=\"6cf0a19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_3.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_secrets_3\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI2MiwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19zZWNyZXRzXzMucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"643\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_3.png?fit=640%2C643&amp;ssl=1\" class=\"attachment-large size-large wp-image-1262\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_3.png?w=1216&amp;ssl=1 1216w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_3.png?resize=300%2C301&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_3.png?resize=1019%2C1024&amp;ssl=1 1019w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_3.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_3.png?resize=768%2C772&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_3.png?resize=850%2C854&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a325a20 elementor-widget elementor-widget-image\" data-id=\"a325a20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_4.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_secrets_4\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI2MywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNFwvMDZcL21kY19zZWNyZXRzXzQucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"92\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_4.png?fit=640%2C92&amp;ssl=1\" class=\"attachment-large size-large wp-image-1263\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_4.png?w=1216&amp;ssl=1 1216w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_4.png?resize=300%2C43&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_4.png?resize=1024%2C147&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_4.png?resize=768%2C110&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_secrets_4.png?resize=850%2C122&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a146689 elementor-widget elementor-widget-text-editor\" data-id=\"a146689\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here&#8217;s Microsoft Defender for Cloud&#8217;s aka MDC&#8217;s Security posture described in short. Let&#8217;s go to the next part soon!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7317f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d7317f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3887c6b\" data-id=\"3887c6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30338447 elementor-widget elementor-widget-heading\" data-id=\"30338447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The parts of the MDC blog series<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63753c84 elementor-widget elementor-widget-text-editor\" data-id=\"63753c84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e84b670 elementor-widget elementor-widget-heading\" data-id=\"e84b670\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\u00a0<\/div><div class=\"elementor-element elementor-element-e246c31 elementor-widget elementor-widget-text-editor\" data-id=\"e246c31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><ul><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/01\/20\/microsoft-defender-for-cloud-the-blog-series-part-0-introduction\/\" target=\"_blank\" rel=\"noopener\">Part 0: Microsoft Defender for Cloud \u2013 The EPIC blog series \u2013 introduction<\/a><\/span><\/li><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/01\/25\/microsoft-defender-for-cloud-the-blog-series-part-1-getting-started\/\" target=\"_blank\" rel=\"noopener\">Part 1: Getting started aka Setup<\/a><\/span>\u00a0<strong><br \/><\/strong><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/06\/22\/defender-for-cloud-part-2-the-asset-inventory\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 2: The Asset Inventory\u00a0<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/06\/22\/defender-for-cloud-part-3-security-posture\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 3: Security posture<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/08\/24\/defender-for-cloud-part-4-security-recommendations\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 4: Security recommendations<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/08\/31\/defender-for-cloud-part-5-security-alerts\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 5: Security alerts<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/02\/12\/defender-for-cloud-part-6-attack-path-analysis\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 6: Attack path analysis<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/02\/22\/defender-for-cloud-part-7-cloud-security-explorer\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 7: Cloud security explorer<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/03\/07\/defender-for-cloud-part-8-workbooks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 8: Workbooks<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/03\/13\/defender-for-cloud-part-regulatory-compliance\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 9: Regulatory compliance<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/04\/24\/defender-for-cloud-part-10-cloud-workload-protection-cwp\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 10: Workload protections<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/05\/10\/defender-for-cloud-part-10-5-cwp-advanced-protection\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">part 10.5: Advanced Workload protection<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/05\/27\/defender-for-cloud-part-11-data-and-ai-security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 11: Data and AI security &#8211; The end of the series<\/span><\/a><\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ee0cdb0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5ee0cdb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4186a42 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4186a42\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9233e54\" data-id=\"9233e54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e045a7e elementor-author-box--avatar-yes elementor-author-box--name-yes elementor-author-box--biography-yes elementor-author-box--link-no elementor-widget elementor-widget-author-box\" data-id=\"e045a7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/secure.gravatar.com\/avatar\/f9b7dd236d1a48254723d8ff5d1d0c187953327c606be0a676e8f0f6432e226a?s=300&#038;r=g\" alt=\"Picture of Jussi Metso\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h6 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tJussi Metso\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\tAuthor is a a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. \r\nMotto: Learning is the key for your future.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Properly managing security posture in public cloud environments is challenging due to lack of awareness and resource constraints. The post introduces Microsoft Defender for Cloud, highlighting its Security Posture feature, which assists with governance, risk assessment, and security management across hybrid and multi-cloud environments, thereby enhancing overall asset security.<\/p>\n","protected":false},"author":2,"featured_media":1233,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":true,"_jetpack_newsletter_access":"everybody","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[9],"tags":[36,40],"class_list":["post-1101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defender-for-cloud","tag-cloudsecurity","tag-mdcseries"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/06\/mdc_series_3-2.png?fit=800%2C400&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pes24X-hL","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/comments?post=1101"}],"version-history":[{"count":13,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1101\/revisions"}],"predecessor-version":[{"id":2435,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1101\/revisions\/2435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media\/1233"}],"wp:attachment":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media?parent=1101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/categories?post=1101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/tags?post=1101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}