Cloud Security Posture Management (CSPM)

One of Microsoft Defender for Cloud's main pillars for cloud security is Cloud Security Posture Management (CSPM). CSPM provides you with hardening guidance that helps you efficiently and effectively improve your security. CSPM also gives you visibility into your current security situation.

Defender for Cloud continually assesses your resources, subscriptions, and organization for security issues and shows your security posture in secure score, an aggregated score of the security findings that tells you, at a glance, your current security situation: the higher the score, the lower the identified risk level.

Availability

Aspect Details
Release state: Foundational CSPM capabilities: GA
Defender Cloud Security Posture Management (CSPM): Preview
Prerequisites - Foundational CSPM capabilities - None

- Defender Cloud Security Posture Management (CSPM) - Agentless scanning requires the Subscription Owner to enable the plan. Anyone with a lower level of authorization can enable the Defender CSPM plan but the agentless scanner won't be enabled by default due to lack of permissions. Attack path analysis and security explorer won't be populated with vulnerabilities because the agentless scanner is disabled.
Clouds: Foundational CSPM capabilities
Commercial clouds
National (Azure Government, Azure China 21Vianet)

For Connected AWS accounts and GCP projects availability, see the feature availability table.

Defender Cloud Security Posture Management (CSPM)
Commercial clouds
National (Azure Government, Azure China 21Vianet)

For Connected AWS accounts and GCP projects availability, see the feature availability table.

Defender CSPM plan options

The Defender CSPM plan comes with two options, foundational CSPM capabilities and Defender CSPM. When you deploy Defender for Cloud to your subscription and resources, you'll automatically gain the basic coverage offered by the CSPM plan. To gain access to the other capabilities provided by Defender CSPM, you'll need to enable the Defender Cloud Security Posture Management (CSPM) plan on your subscription and resources.

The following table summarizes what's included in each plan and their cloud availability.

Feature Foundational CSPM capabilities Defender CSPM Cloud availability
Continuous assessment of the security configuration of your cloud resources Azure, AWS, GCP, on-premises
Security recommendations to fix misconfigurations and weaknesses Azure, AWS, GCP, on-premises
Secure score Azure, AWS, GCP, on-premises
Governance - Azure, AWS, GCP, on-premises
Regulatory compliance - Azure, AWS, GCP, on-premises
Cloud security explorer - Azure, AWS
Attack path analysis - Azure, AWS
Agentless scanning for machines - Azure, AWS

Note

If you have enabled Defender for DevOps, you will only gain cloud security graph and attack path analysis to the artifacts that arrive through those connectors.

To enable Governance for for DevOps related recommendations, the Defender CSPM plan needs to be enabled on the Azure subscription that hosts the DevOps connector.

Security governance and regulatory compliance

Security governance and regulatory compliance refer to the policies and processes which organizations have in place to ensure that they comply with laws, rules and regulations put in place by external bodies (government) which control activity in a given jurisdiction. Defender for Cloud allows you to view your regulatory compliance through the regulatory compliance dashboard.

Defender for Cloud continuously assesses your hybrid cloud environment to analyze the risk factors according to the controls and best practices in the standards that you've applied to your subscriptions. The dashboard reflects the status of your compliance with these standards.

Learn more about security and regulatory compliance in Defender for Cloud.

Cloud security explorer

The cloud security graph is a graph-based context engine that exists within Defender for Cloud. The cloud security graph collects data from your multicloud environment and other data sources. For example, the cloud assets inventory, connections and lateral movement possibilities between resources, exposure to internet, permissions, network connections, vulnerabilities and more. The data collected is then used to build a graph representing your multicloud environment.

Defender for Cloud then uses the generated graph to perform an attack path analysis and find the issues with the highest risk that exist within your environment. You can also query the graph using the cloud security explorer.

Learn more about cloud security explorer

Attack path analysis

Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans:

  • expose exploitable paths that attackers may use to breach your environment and reach your high-impact assets
  • provide recommendations for ways to prevent successful breaches

By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more, this analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.

Learn more about attack path analysis.

Agentless scanning for machines

With agentless scanning for VMs, you can get visibility on actionable OS posture issues without installed agents, network connectivity, or machine performance impact.

Learn more about agentless scanning.

Next steps

Learn about Microsoft Defender for Cloud's basic and enhanced security features