{"id":2049,"date":"2025-03-13T22:23:46","date_gmt":"2025-03-13T20:23:46","guid":{"rendered":"https:\/\/www.jussimetso.com\/?p=2049"},"modified":"2025-05-25T17:25:22","modified_gmt":"2025-05-25T14:25:22","slug":"defender-for-cloud-part-regulatory-compliance","status":"publish","type":"post","link":"https:\/\/www.jussimetso.com\/index.php\/2025\/03\/13\/defender-for-cloud-part-regulatory-compliance\/","title":{"rendered":"Defender for Cloud &#8211; Part 9: Regulatory compliance"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2049\" class=\"elementor elementor-2049\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4362e5b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4362e5b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d44dc6\" data-id=\"3d44dc6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4980d5 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"a4980d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__a4980d5\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__a4980d5\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__a4980d5\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2b8577 elementor-widget elementor-widget-heading\" data-id=\"c2b8577\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Overview<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-293d9d5 elementor-widget elementor-widget-image\" data-id=\"293d9d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/regulatory-compliance-with-auditors-holding-pens-e1741897302742.jpg?fit=512%2C512&amp;ssl=1\" class=\"attachment-large size-large wp-image-2081\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">An AI made image. See the typing problems.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e442117 elementor-widget elementor-widget-text-editor\" data-id=\"e442117\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Cloud provides <strong data-start=\"106\" data-end=\"131\">Regulatory Compliance<\/strong> capabilities to help organizations assess and maintain compliance with industry standards, frameworks, and regulatory requirements. It continuously monitors cloud resources and provides insights into security posture, ensuring alignment with compliance benchmarks.<\/p><p>So if you need to see how your Azure \/ AWS \/ GCP environment&#8217;s resources comply against wanted compliance benchmark for example <span style=\"text-decoration: underline;\">in case of certain auditing<\/span> it is very easy. Just enable wanted standard and wait for the results. It takes usually 24 hours to results come.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74b652a elementor-widget elementor-widget-text-editor\" data-id=\"74b652a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You can find Regulatory compliance &#8220;Dashboard&#8221; from Defender for Cloud under<strong> Cloud Security<\/strong> section:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-134a356 elementor-widget elementor-widget-image\" data-id=\"134a356\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_regu_main\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjA1MywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDNcL21kY19yZWd1X21haW4ucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"196\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?fit=640%2C196&amp;ssl=1\" class=\"attachment-large size-large wp-image-2053\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?w=2038&amp;ssl=1 2038w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?resize=300%2C92&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?resize=1024%2C313&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?resize=768%2C234&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?resize=1536%2C469&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?resize=850%2C259&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_main.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Main view in Regulatory compliance. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-291f87f elementor-widget elementor-widget-text-editor\" data-id=\"291f87f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the dashboard you can:<\/p><ul><li>Get a summary of standards controls that have been passed.<\/li><li>Get of summary of standards that have the lowest pass rate for resources.<\/li><li>Review standards that are applied within the selected scope.<\/li><li>Review assessments for compliance controls within each applied standard.<\/li><li>Get a summary report for a specific standard.<\/li><li>Manage compliance policies to see the standards assigned to a specific scope.<\/li><li>Run a query to create a custom compliance report<\/li><li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/custom-dashboards-azure-workbooks\" target=\"_blank\" rel=\"noopener\" data-linktype=\"relative-path\"><span style=\"text-decoration: underline;\">Create a &#8220;compliance over time workbook<\/span>&#8220;<\/a>\u00a0to track compliance status over time.<\/li><li>Download audit reports.<\/li><li>Review compliance offerings for Microsoft and third-party audits.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28a1721 elementor-widget elementor-widget-heading\" data-id=\"28a1721\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some key features of Regulatory compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06c2b7e elementor-widget elementor-widget-text-editor\" data-id=\"06c2b7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>The core are the built-in compliance standards<\/strong><\/p><p data-start=\"522\" data-end=\"601\">Defender for Cloud comes with pre-configured compliance standards, including:<\/p><ul data-start=\"602\" data-end=\"1043\"><li data-start=\"602\" data-end=\"683\"><strong data-start=\"604\" data-end=\"638\">Microsoft Cloud Security Benchmark<\/strong> \u2013 Microsoft&#8217;s best practices for security.<\/li><li data-start=\"684\" data-end=\"748\"><strong data-start=\"686\" data-end=\"703\">CIS Benchmark<\/strong> \u2013 Center for Internet Security guidelines.<\/li><li data-start=\"749\" data-end=\"808\"><strong data-start=\"751\" data-end=\"766\">NIST 800-53<\/strong> \u2013 A standard for U.S. federal agencies.<\/li><li data-start=\"809\" data-end=\"876\"><strong data-start=\"811\" data-end=\"824\">ISO 27001<\/strong> \u2013 An international information security standard.<\/li><li data-start=\"809\" data-end=\"876\"><strong>NIS2\u00a0<\/strong>&#8211; EU&#8217;s updated framework for cybersecurity<br \/><\/li><li data-start=\"877\" data-end=\"978\"><strong data-start=\"879\" data-end=\"890\">PCI DSS<\/strong> \u2013 Payment Card Industry Data Security Standard for handling credit card transactions.<\/li><li data-start=\"979\" data-end=\"1043\"><strong data-start=\"981\" data-end=\"990\">SOC 2<\/strong> \u2013 Security and trust standards for cloud services.<\/li><\/ul><p data-start=\"1045\" data-end=\"1143\">Additionally, you can <strong data-start=\"1067\" data-end=\"1102\">add custom regulatory standards<\/strong> to align with organizational policies. I&#8217;ll show this later.<\/p><p><strong>Compliance Dashboard<\/strong><\/p><ul><li data-start=\"1180\" data-end=\"1295\">Provides a <strong data-start=\"1193\" data-end=\"1223\">real-time compliance score<\/strong> showing how well your cloud resources align with selected frameworks.<\/li><li data-start=\"1296\" data-end=\"1380\">Highlights <strong data-start=\"1309\" data-end=\"1336\">non-compliant resources<\/strong> and provides remediation recommendations.<\/li><\/ul><p><strong>Security Controls &amp; Recommendations<\/strong><\/p><ul><li data-start=\"1432\" data-end=\"1568\">Defender for Cloud evaluates your environment against regulatory requirements and generates actionable <strong data-start=\"1537\" data-end=\"1565\">security recommendations<\/strong>.<\/li><li data-start=\"1569\" data-end=\"1696\">Example: If your virtual machines lack encryption, it suggests enabling <strong data-start=\"1643\" data-end=\"1668\">Azure Disk Encryption<\/strong> to meet compliance needs.<\/li><\/ul><p><strong>Continuous Monitoring &amp; Alerts<\/strong><\/p><ul><li data-start=\"1743\" data-end=\"1850\">Compliance is <strong data-start=\"1759\" data-end=\"1785\">continuously monitored<\/strong>, and security posture updates dynamically as resources change.<\/li><li data-start=\"1851\" data-end=\"1966\">Integration with <strong data-start=\"1870\" data-end=\"1892\">Microsoft Sentinel<\/strong> allows security teams to receive <strong data-start=\"1926\" data-end=\"1963\">alerts on non-compliant resources<\/strong>.<\/li><\/ul><p><strong>Compliance Reports &amp; Audits<\/strong><\/p><ul><li data-start=\"2010\" data-end=\"2096\">Export compliance reports in formats suitable for <strong data-start=\"2062\" data-end=\"2093\">auditors and security teams<\/strong>.<\/li><li data-start=\"2097\" data-end=\"2187\">Provides evidence for regulatory audits with detailed insights into compliance status.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-823d065 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"823d065\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e745988 elementor-widget elementor-widget-heading\" data-id=\"e745988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance in Azure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fb468f elementor-widget elementor-widget-text-editor\" data-id=\"1fb468f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In my example I have chosen 2 extra standards, CIS Azure 2.0.0 and NIST SP 800 53 R5:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4190463 elementor-widget elementor-widget-image\" data-id=\"4190463\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"63\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_selected_benchmarks.png?fit=640%2C63&amp;ssl=1\" class=\"attachment-large size-large wp-image-2069\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_selected_benchmarks.png?w=931&amp;ssl=1 931w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_selected_benchmarks.png?resize=300%2C29&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_selected_benchmarks.png?resize=768%2C75&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_selected_benchmarks.png?resize=850%2C83&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-631d9b9 elementor-widget elementor-widget-text-editor\" data-id=\"631d9b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MCSB aka <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-regulatory-compliance\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Microsoft cloud security benchmark<\/span><\/a> is always on when you have onboarded subscriptions to Defender for Cloud.<\/p><p>Under selected benchmark you can see top levels and <a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/overview\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">controls<\/span><\/a> related to that MSCB benchmark. If top level starts with red circle with white x in it, there&#8217;s something to do in resources which are not compliant.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9713b2f elementor-widget elementor-widget-image\" data-id=\"9713b2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_regu_benchmark_controls\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjA3MSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDNcL21kY19yZWd1X2JlbmNobWFya19jb250cm9scy5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"282\" height=\"300\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls.png?fit=282%2C300&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2071\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls.png?w=667&amp;ssl=1 667w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls.png?resize=282%2C300&amp;ssl=1 282w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls.png?resize=300%2C319&amp;ssl=1 300w\" sizes=\"(max-width: 282px) 100vw, 282px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23f4990 elementor-widget elementor-widget-heading\" data-id=\"23f4990\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">MCSB control overview<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e00767 elementor-widget elementor-widget-text-editor\" data-id=\"8e00767\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Microsoft cloud security benchmark (MCSB) provides prescriptive best practices and recommendations to help improve the security of workloads, data, and services on Azure and your multi-cloud environment. This benchmark focuses on cloud-centric control areas with input from a set of holistic Microsoft and industry security guidance that includes:<\/p><ul><li><strong>Cloud Adoption Framework<\/strong>: Guidance on security, including\u00a0<span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/organize\/cloud-security\" target=\"_blank\" rel=\"noopener\" data-linktype=\"absolute-path\">strategy, roles and responsibilities<\/a><\/span>,\u00a0<span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/get-started\/security#step-1-establish-essential-security-practices\" target=\"_blank\" rel=\"noopener\" data-linktype=\"absolute-path\">Azure Top 10 Security Best Practices<\/a><\/span>, and\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/ready\/enterprise-scale\" target=\"_blank\" rel=\"noopener\" data-linktype=\"absolute-path\"><span style=\"text-decoration: underline;\">reference implementation<\/span>.<\/a><\/li><li><strong>Azure Well-Architected Framework<\/strong>: Guidance on\u00a0<span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/assessments\/?mode=pre-assessment&amp;session=local\" target=\"_blank\" rel=\"noopener\" data-linktype=\"absolute-path\">securing your workloads on Azure<\/a><\/span>.<\/li><li><strong>The Chief Information Security Officer (CISO) Workshop<\/strong>:\u00a0<span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/ciso-workshop\/the-ciso-workshop\" target=\"_blank\" rel=\"noopener\" data-linktype=\"absolute-path\">Program guidance and reference strategies to accelerate security modernization using Zero Trust principles<\/a><\/span>.<\/li><li><strong>Other industry and cloud service providers security best practice standards and framework<\/strong>: Examples include the Amazon Web Services (AWS) Well-Architected Framework, Center for Internet Security (CIS) Controls, National Institute of Standards and Technology (NIST), and Payment Card Industry Data Security Standard (PCI-DSS).<\/li><\/ul><p>SOURCE: MS Learn<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df30323 elementor-widget elementor-widget-heading\" data-id=\"df30323\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">and descriptions<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9005057 elementor-widget elementor-widget-text-editor\" data-id=\"9005057\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Click the <span style=\"text-decoration: underline;\">control link<\/span> to see the whole description. The column right\u00a0 side shows only the short one. <\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0bcb547 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0bcb547\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-747466a\" data-id=\"747466a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d60e1f elementor-widget elementor-widget-text-editor\" data-id=\"5d60e1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-network-security\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Network Security<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4512e1e\" data-id=\"4512e1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21022e2 elementor-widget elementor-widget-text-editor\" data-id=\"21022e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Network Security covers controls to secure and protect networks, including securing virtual networks, establishing private connections, preventing, and mitigating external attacks, and securing DNS.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9564f12 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9564f12\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-820237a\" data-id=\"820237a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c4f393 elementor-widget elementor-widget-text-editor\" data-id=\"8c4f393\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-identity-management\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Identity Management<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-967af93\" data-id=\"967af93\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fb1d8c elementor-widget elementor-widget-text-editor\" data-id=\"7fb1d8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Identity Management covers controls to establish a secure identity and access controls using identity and access management systems, including the use of single sign-on, strong authentications, managed identities (and service principals) for applications, conditional access, and account anomalies monitoring.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-03702c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03702c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b82e85a\" data-id=\"b82e85a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4d9843 elementor-widget elementor-widget-text-editor\" data-id=\"a4d9843\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-privileged-access\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Privileged access<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5851ea8\" data-id=\"5851ea8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14b101d elementor-widget elementor-widget-text-editor\" data-id=\"14b101d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Privileged Access covers controls to protect privileged access to your tenant and resources, including a range of controls to protect your administrative model, administrative accounts, and privileged access workstations against deliberate and inadvertent risk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9af41bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9af41bf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0ed779c\" data-id=\"0ed779c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44def1a elementor-widget elementor-widget-text-editor\" data-id=\"44def1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-data-protection\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Data protection<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2ee330c\" data-id=\"2ee330c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee7cc90 elementor-widget elementor-widget-text-editor\" data-id=\"ee7cc90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data Protection covers control of data protection at rest, in transit, and via authorized access mechanisms, including discover, classify, protect, and monitor sensitive data assets using access control, encryption, key management and certificate management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f7f0ec3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f7f0ec3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4001a6f\" data-id=\"4001a6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59dfbbd elementor-widget elementor-widget-text-editor\" data-id=\"59dfbbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-asset-management\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Asset Management<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8aba975\" data-id=\"8aba975\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f6b51cd elementor-widget elementor-widget-text-editor\" data-id=\"f6b51cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Asset Management covers controls to ensure security visibility and governance over your resources, including recommendations on permissions for security personnel, security access to asset inventory, and managing approvals for services and resources (inventory, track, and correct).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1219722 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1219722\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-93784ce\" data-id=\"93784ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6b5c26 elementor-widget elementor-widget-text-editor\" data-id=\"b6b5c26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-logging-threat-detection\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Logging and Threat protection<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-94cddd6\" data-id=\"94cddd6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4ec0d8 elementor-widget elementor-widget-text-editor\" data-id=\"e4ec0d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Logging and Threat Detection covers controls for detecting threats on cloud, and enabling, collecting, and storing audit logs for cloud services, including enabling detection, investigation, and remediation processes with controls to generate high-quality alerts with native threat detection in cloud services<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-315df53 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"315df53\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bbb4098\" data-id=\"bbb4098\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1526af3 elementor-widget elementor-widget-text-editor\" data-id=\"1526af3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-incident-response\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Incident response<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3265553\" data-id=\"3265553\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca4c5bd elementor-widget elementor-widget-text-editor\" data-id=\"ca4c5bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Incident Response covers controls in incident response life cycle &#8211; preparation, detection and analysis, containment, and post-incident activities, including using Azure services (such as Microsoft Defender for Cloud and Sentinel) and\/or other cloud services to automate the incident response process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6432eed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6432eed\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-df4862f\" data-id=\"df4862f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ee6dbe elementor-widget elementor-widget-text-editor\" data-id=\"4ee6dbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-posture-vulnerability-management\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Posture and Vulnerability management<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-eac416f\" data-id=\"eac416f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21a43d0 elementor-widget elementor-widget-text-editor\" data-id=\"21a43d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Posture and Vulnerability Management focuses on controls for assessing and improving cloud security posture, including vulnerability scanning, penetration testing and remediation, as well as security configuration tracking, reporting, and correction in cloud resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-35d7082 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35d7082\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-278ef22\" data-id=\"278ef22\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03e4e22 elementor-widget elementor-widget-text-editor\" data-id=\"03e4e22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-endpoint-security\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Endpoint security<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-62537e8\" data-id=\"62537e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef27751 elementor-widget elementor-widget-text-editor\" data-id=\"ef27751\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Endpoint Security covers controls in endpoint detection and response, including use of endpoint detection and response (EDR) and anti-malware service for endpoints in cloud environments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bdd385e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bdd385e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e0a941f\" data-id=\"e0a941f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d16f9a elementor-widget elementor-widget-text-editor\" data-id=\"8d16f9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-backup-recovery\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Backup and recovery<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ade1e38\" data-id=\"ade1e38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a23d43 elementor-widget elementor-widget-text-editor\" data-id=\"3a23d43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Backup and Recovery covers controls to ensure that data and configuration backups at the different service tiers are performed, validated, and protected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-db54f5f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"db54f5f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ad1e40d\" data-id=\"ad1e40d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5638aa4 elementor-widget elementor-widget-text-editor\" data-id=\"5638aa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-devops-security\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">DevOps security<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6205d73\" data-id=\"6205d73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48a824f elementor-widget elementor-widget-text-editor\" data-id=\"48a824f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DevOps Security covers the controls related to the security engineering and operations in the DevOps processes, including deployment of critical security checks (such as static application security testing, vulnerability management) prior to the deployment phase to ensure the security throughout the DevOps process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e459075 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e459075\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fe5b543\" data-id=\"fe5b543\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-587d068 elementor-widget elementor-widget-text-editor\" data-id=\"587d068\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-governance-strategy\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Governance and Strategy<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-556ef7e\" data-id=\"556ef7e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12b3b83 elementor-widget elementor-widget-text-editor\" data-id=\"12b3b83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Governance and Strategy provides guidance for ensuring a coherent security strategy and documented governance approach to guide and sustain security assurance, including establishing roles and responsibilities for the different cloud security functions, unified technical strategy, and supporting policies and standards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfe0c51 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cfe0c51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6932fdf elementor-widget elementor-widget-heading\" data-id=\"6932fdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">an example of NS control<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47d2471 elementor-widget elementor-widget-text-editor\" data-id=\"47d2471\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here you can see the passed controls (green) and the controls which have something to do (red).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0a229b elementor-widget elementor-widget-image\" data-id=\"a0a229b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_regu_benchmark_controls_opened\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjA3MiwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDNcL21kY19yZWd1X2JlbmNobWFya19jb250cm9sc19vcGVuZWQucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"109\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?fit=640%2C109&amp;ssl=1\" class=\"attachment-large size-large wp-image-2072\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?w=3346&amp;ssl=1 3346w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?resize=300%2C51&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?resize=1024%2C175&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?resize=768%2C132&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?resize=1536%2C263&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?resize=2048%2C351&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?resize=850%2C146&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_benchmark_controls_opened.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1404371 elementor-widget elementor-widget-text-editor\" data-id=\"1404371\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you click the Asset name Azure opens the details of assessment:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4ee2b8 elementor-widget elementor-widget-image\" data-id=\"d4ee2b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"417\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_control_details_fix.png?fit=640%2C417&amp;ssl=1\" class=\"attachment-large size-large wp-image-2073\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_control_details_fix.png?w=1333&amp;ssl=1 1333w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_control_details_fix.png?resize=300%2C195&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_control_details_fix.png?resize=1024%2C667&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_control_details_fix.png?resize=768%2C500&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_control_details_fix.png?resize=850%2C553&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_control_details_fix.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08694b6 elementor-widget elementor-widget-text-editor\" data-id=\"08694b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li>Navigation shows Exempt, Enforce, view policy definition and open query<\/li><li>Panel shows assessment Severity, Freshness interval, and Mitre Att@ck tactics and techiniques<\/li><li>Panel shows description for the assessment, remediation steps if there are any (most cases this quick fix does not work and affected resources<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7d6175 elementor-widget elementor-widget-heading\" data-id=\"e7d6175\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">example of policy definition<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd39ee5 elementor-widget elementor-widget-image\" data-id=\"dd39ee5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_regu_policy_definition\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjA3NCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDNcL21kY19yZWd1X3BvbGljeV9kZWZpbml0aW9uLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"301\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?fit=640%2C301&amp;ssl=1\" class=\"attachment-large size-large wp-image-2074\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?w=3771&amp;ssl=1 3771w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?resize=300%2C141&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?resize=1024%2C482&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?resize=768%2C361&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?resize=1536%2C723&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?resize=2048%2C963&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?resize=850%2C400&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_policy_definition.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-917826e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"917826e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c31bd44 elementor-widget elementor-widget-heading\" data-id=\"c31bd44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Available compliance standards in Defender for Cloud<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-685a05a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"685a05a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27a615a\" data-id=\"27a615a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54033f9 elementor-widget elementor-widget-text-editor\" data-id=\"54033f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Standards<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-48f2170\" data-id=\"48f2170\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-439f41d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"439f41d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cloud(s)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb66493 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fb66493\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-775aa5f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"775aa5f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3219c0e\" data-id=\"3219c0e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6788349 elementor-widget elementor-widget-text-editor\" data-id=\"6788349\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>EU 2022 2555 (NIS2) 2022\u2003\u2003 <br \/>EU General Data Protection Regulation (GDPR) 2016 679\u2003\u2003 <br \/>NIST CSF v2.0\u2003\u2003 <br \/>NIST 800 171 Rev3\u2003\u2003 <br \/>NIST SP 800 53 R5.1.1\u2003\u2003 <br \/>PCI DSS v4.0.1\u2003\u2003 <br \/>CIS AWS Foundations v3.0.0\u2003\u2003 <br \/>CIS Azure Foundations v2.1.0\u2003\u2003 <br \/>CIS Controls v8.1\u2003\u2003 <br \/>CIS GCP Foundations v3.0\u2003\u2003 <br \/>CIS Google Cloud Platform Foundation Benchmark <br \/>CIS Azure Kubernetes Service (AKS) Benchmark <br \/>CIS Amazon Elastic Kubernetes Service (EKS) Benchmark <br \/>CIS Google Kubernetes Engine (GKE) Benchmark <br \/>HITRUST CSF v11.3.0\u2003\u2003 <br \/>SOC 2023\u2003\u2003 <br \/>SWIFT Customer Security Controls Framework 2024\u2003\u2003 <br \/>ISO IEC 27001:2022\u2003\u2003 <br \/>ISO IEC 27002:2022\u2003\u2003 <br \/>ISO IEC 27017:2015\u2003\u2003 <br \/>Cybersecurity Maturity Model Certification (CMMC) Level 2 v2.0\u2003\u2003 <br \/>AWS Well Architected Framework 2024\u2003\u2003 <br \/>Canada Federal PBMM 3.2020\u2003\u2003 <br \/>APRA CPS 234 2019\u2003\u2003 <br \/>CSA Cloud Controls Matrix v4.0.12\u2003\u2003 <br \/>Cyber Essentials v3.1\u2003\u2003 <br \/>Criminal Justice Information Services Security Policy v5.9.5\u2003\u2003 <br \/>FFIEC CAT 2017\u2003\u2003 <br \/>Brazilian General Data Protection Law (LGPD) 2018\u2003\u2003 <br \/>NZISM v3.7\u2003\u2003 <br \/>Sarbanes Oxley Act 2022 (SOX)\u2003\u2003<br \/>NCSC Cyber Assurance Framework (CAF) v3.2\u2003\u2003 <br \/>Australian Government ISM Protected <br \/>FedRAMP \u2018H\u2019 &amp; \u2018M\u2019 <br \/>HIPAA <br \/>RMIT Malaysia <br \/>SOC 2 <br \/>Spanish ENS <br \/>California Consumer Privacy Act (CCPA) <br \/>UK OFFICIAL and UK NHS <br \/>AWS Foundational Security Best Practices <br \/>CRI Profile <br \/>NIST SP 800-172<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d99e9b8\" data-id=\"d99e9b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db3bbb8 elementor-widget elementor-widget-text-editor\" data-id=\"db3bbb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>AWS<br \/>Azure<br \/>Azure, AWS, GCP<br \/>GCP<br \/>GCP<br \/>Azure<br \/>AWS<br \/>GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>AWS<br \/>Azure, AWS, GCP<br \/>Azure, AWS<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure, AWS, GCP<br \/>Azure<br \/>Azure<br \/>Azure<br \/>Azure<br \/>Azure, GCP<br \/>Azure<br \/>AWS, GCP<br \/>Azure<br \/>AWS<br \/>AWS, GCP<br \/>AWS, GCP<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab8796c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ab8796c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-791a432 elementor-widget elementor-widget-text-editor\" data-id=\"791a432\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>List of compliance standards have updated on February, 2025: <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/release-notes#31-new-and-enhanced-multicloud-regulatory-standards-coverage\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/release-notes#31-new-and-enhanced-multicloud-regulatory-standards-coverage<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e7ca8b elementor-widget elementor-widget-image\" data-id=\"9e7ca8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/NIS2_ISO27-e1741897513743.jpg?fit=512%2C512&amp;ssl=1\" class=\"attachment-large size-large wp-image-2082\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3853f1c elementor-widget elementor-widget-heading\" data-id=\"3853f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Add built-in compliance standard to Azure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59af946 elementor-widget elementor-widget-text-editor\" data-id=\"59af946\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To add or manage compliance standards you can click the\u00a0 &#8220;Manage compliance standards&#8221; link on top.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97ba95e elementor-widget elementor-widget-image\" data-id=\"97ba95e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance_standard.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_regu_manage_compliance_standard\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjA3NiwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDNcL21kY19yZWd1X21hbmFnZV9jb21wbGlhbmNlX3N0YW5kYXJkLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"22\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance_standard.png?fit=640%2C22&amp;ssl=1\" class=\"attachment-large size-large wp-image-2076\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance_standard.png?w=1474&amp;ssl=1 1474w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance_standard.png?resize=300%2C10&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance_standard.png?resize=1024%2C35&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance_standard.png?resize=768%2C27&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance_standard.png?resize=850%2C29&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance_standard.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Manage compliance standards. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89d2ef4 elementor-widget elementor-widget-text-editor\" data-id=\"89d2ef4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>or you can do go to subscription environment settings and choose <strong>Security policies.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e75c5c2 elementor-widget elementor-widget-image\" data-id=\"e75c5c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_regu_manage_compliance\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjA3NSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDNcL21kY19yZWd1X21hbmFnZV9jb21wbGlhbmNlLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"214\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?fit=640%2C214&amp;ssl=1\" class=\"attachment-large size-large wp-image-2075\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?w=2241&amp;ssl=1 2241w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?resize=300%2C101&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?resize=1024%2C343&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?resize=768%2C257&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?resize=1536%2C515&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?resize=2048%2C686&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?resize=850%2C285&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_manage_compliance.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Choosing Security policies. Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9a9fc5 elementor-widget elementor-widget-heading\" data-id=\"d9a9fc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Make your own  custom security standard and recommendation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b3576e elementor-widget elementor-widget-text-editor\" data-id=\"5b3576e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are prerequisites when you want to create your own ones:<\/p><ul><li>You need Owner permissions on the subscription to create a new security standard.<\/li><li>You need Security Admin permissions to create custom recommendations.<\/li><li>To create custom recommendations based on KQL, you must have the <span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-cloud-security-posture-management\" target=\"_blank\" rel=\"noopener\" data-linktype=\"relative-path\">Defender CSPM plan<\/a><\/span> enabled. All customers can create custom recommendations <strong>based on Azure Policy.<\/strong><\/li><li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/support-matrix-cloud-environment\" target=\"_blank\" rel=\"noopener\" data-linktype=\"relative-path\"><span style=\"text-decoration: underline;\">Review support in Azure clouds<\/span><\/a> for custom recommendations.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-764c8da elementor-widget elementor-widget-image\" data-id=\"764c8da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"298\" height=\"175\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_regu_create_custom.png?fit=298%2C175&amp;ssl=1\" class=\"attachment-large size-large wp-image-2077\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Create your own selection<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bd9911 elementor-widget elementor-widget-text-editor\" data-id=\"9bd9911\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On the same Security policies panel you can\u00a0 click &#8220;<strong>+Create<\/strong>&#8221; to start creating your own Standard or recommendation.<\/p><p>There&#8217;s a good article in <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/create-custom-recommendations\" target=\"_blank\" rel=\"noopener\">MS Learn.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11c0995 elementor-widget elementor-widget-heading\" data-id=\"11c0995\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resources<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c3ad3b elementor-widget elementor-widget-text-editor\" data-id=\"4c3ad3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/update-regulatory-compliance-packages\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Assigning compliance standards in Defender for Cloud.<\/span><\/a><\/p><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/servicetrust.microsoft.com\/\" target=\"_blank\" rel=\"noopener\">Service Trust Portal<\/a>\u00a0 is a place to look for papers of regulations, standards, guides etc<\/span>. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf39d20 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf39d20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcbc6cb elementor-widget elementor-widget-text-editor\" data-id=\"bcbc6cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here was a scratch of Regulatory Compliance for Azure resources.\u00a0 This will help if you need to audit your resources against the certain standard.<\/p><p>The next topic is about workload protection in Azure. <\/p><p>Thanks for reading!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ce25bd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9ce25bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-728b8209 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"728b8209\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-50a71bd5\" data-id=\"50a71bd5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12909b07 elementor-widget elementor-widget-heading\" data-id=\"12909b07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The parts of the MDC blog series<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f2ed4cf elementor-widget elementor-widget-text-editor\" data-id=\"6f2ed4cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e84b670 elementor-widget elementor-widget-heading\" data-id=\"e84b670\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\u00a0<\/div><div class=\"elementor-element elementor-element-e246c31 elementor-widget elementor-widget-text-editor\" data-id=\"e246c31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><ul><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/01\/20\/microsoft-defender-for-cloud-the-blog-series-part-0-introduction\/\" target=\"_blank\" rel=\"noopener\">Part 0: Microsoft Defender for Cloud \u2013 The EPIC blog series \u2013 introduction<\/a><\/span><\/li><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/01\/25\/microsoft-defender-for-cloud-the-blog-series-part-1-getting-started\/\" target=\"_blank\" rel=\"noopener\">Part 1: Getting started aka Setup<\/a><\/span>\u00a0<strong><br \/><\/strong><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/06\/22\/defender-for-cloud-part-2-the-asset-inventory\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 2: The Asset Inventory\u00a0<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/06\/22\/defender-for-cloud-part-3-security-posture\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 3: Security posture<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/08\/24\/defender-for-cloud-part-4-security-recommendations\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 4: Security recommendations<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/08\/31\/defender-for-cloud-part-5-security-alerts\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 5: Security alerts<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/02\/12\/defender-for-cloud-part-6-attack-path-analysis\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 6: Attack path analysis<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/02\/22\/defender-for-cloud-part-7-cloud-security-explorer\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 7: Cloud security explorer<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/03\/07\/defender-for-cloud-part-8-workbooks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 8: Workbooks<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/03\/13\/defender-for-cloud-part-regulatory-compliance\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 9: Regulatory compliance<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/04\/24\/defender-for-cloud-part-10-cloud-workload-protection-cwp\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 10: Workload protections<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/05\/10\/defender-for-cloud-part-10-5-cwp-advanced-protection\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">part 10.5: Advanced Workload protection<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/05\/27\/defender-for-cloud-part-11-data-and-ai-security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 11: Data and AI security &#8211; The end of the series<\/span><\/a><\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1591bc55 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1591bc55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55ce2caf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55ce2caf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b87a7f6\" data-id=\"1b87a7f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-770f0b3c elementor-widget elementor-widget-author-box\" data-id=\"770f0b3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/07\/jussi_06_2024.jpg?fit=262%2C300&#038;ssl=1\" alt=\"Picture of Jussi Metso\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h6 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tJussi Metso\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>Author is a a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. Motto: Learning is the key for your future. <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Microsoft Defender for Cloud provides Regulatory Compliance capabilities to help organizations assess and maintain compliance with industry standards, frameworks, and regulatory requirements. It continuously monitors cloud resources and provides insights into security posture, ensuring alignment with compliance benchmarks.<\/p>\n","protected":false},"author":1,"featured_media":2051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[9],"tags":[36,40],"class_list":["post-2049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defender-for-cloud","tag-cloudsecurity","tag-mdcseries"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/03\/mdc_series_9.png?fit=800%2C400&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pes24X-x3","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/2049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/comments?post=2049"}],"version-history":[{"count":20,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/2049\/revisions"}],"predecessor-version":[{"id":2472,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/2049\/revisions\/2472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media\/2051"}],"wp:attachment":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media?parent=2049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/categories?post=2049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/tags?post=2049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}