Critical assets protection in Microsoft Defender for Cloud (Preview)

Defender for Cloud now has business criticality concept added to its security posture management capabilities. This feature helps you to identify and protect your most important assets. It uses the critical assets engine created by Microsoft Security Exposure Management (MSEM). You can define critical asset rules in MSEM, and Defender for Cloud can then them in scenarios such as risk prioritization, attack path analysis, and cloud security explorer.

Availability

Aspect Details
Release state Preview
Prerequisites Defender Cloud Security Posture Management (CSPM) enabled
Required Microsoft Entra ID built-in roles: To create/edit/read classification rules: Global Administrator, Security Administrator, Security Operator
To read classification rules: Global Reader, Security Reader
Clouds: All commercial clouds

Set up critical asset management

  1. Sign in to the Azure portal.

  2. Navigate to Microsoft Defender for Cloud > Environment Settings.

  3. Select the Resource criticality tile.

    Screenshot of the resource criticality tile.

  4. The Critical asset management pane opens. Select Open Microsoft Defender portal."

    Screenshot of the critical asset management pane.

  5. You then arrive at the Critical asset management page in the Microsoft Defender XDR portal.

    Screenshot of critical asset management page.

  6. To create custom critical asset rules to tag your resources as Critical resources in Defender for Cloud, select the Create a new classification button.

    Screenshot of Create a new classification button.

  7. Add a name and description for your new classification, and use under Query builder, select Cloud resource to build your critical assets rule. Then select Next.

    Screenshot of how to create critical asset classification.

  8. On the Preview assets page, you can see a list of assets that match the rule you created. After reviewing the page, select Next.

    Screenshot of Preview assets page, showing a list of all assets that match the rule.

  9. On the Assign criticality page, assign the criticality level to all assets matching the rule. Then select Next.

    A screenshot of the Assign criticality page.

  10. You can then see the Review and finish page. Review the results, and once you approve, select Submit.

    Screenshot of the Review and finish page.

  11. After you select Submit, you can close the Microsoft Defender XDR portal. You should wait for up to two hours until all assets matching your rule are tagged as Critical.

Note

Your critical asset rules apply to all the resources in the tenant that match the rule's condition.

View your critical assets in Defender for Cloud

  1. Once your assets are updated, go to the Attack path analysis page in Defender for Cloud. You can see all the attack paths to your critical assets.

    Screenshot of attack path analysis page.

  2. If you select an attack path title, you can see its details. Select the target, and under Insights - Critical resource, you can see the critical asset tagging information.

    Screenshot of critical resource insights.

  3. In the Recommendations page of Defender for Cloud, select the Preview available banner to see all the recommendations, which are now prioritized based on asset criticality.

    Screenshot of the recommendations page, showing critical resources.

  4. Select a recommendation, and then choose the Graph tab. Then choose the target, and select the Insights tab. You can see the critical asset tagging information.

    Screenshot of critical asset insights for recommendations.

  5. In the Inventory page of Defender for Cloud, you can see the critical assets in your organization.

    Screenshot of inventory page with critical assets tagged.

  6. To run custom queries on your critical assets, go to the Cloud Security Explorer page in Defender for Cloud.

    Screenshot of Cloud Security Explorer page with query for critical assets.

For more information about improving your cloud security posture, see Cloud security posture management (CSPM).