Design cloud workload protection with Microsoft Defender for Cloud

Completed

Defender for cloud has workload protections in 7 main areas:

  • Servers
  • Storage
  • Databases
  • Containers
  • Application infrastructure
  • Alerts
  • Incidents

We will highlight three of those capabilities in this article.

Server workload protections

Microsoft Defender for Servers extends protection to your Windows and Linux machines that run in Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises. Defender for Servers integrates with Microsoft Defender for Endpoint to provide endpoint detection and response (EDR) and other threat protection features.

Deployment overview

The following table summarizes the Defender for Servers deployment process:

  1. Foundational CSPM:
    • There are no charges when you use foundational CSPM with no plans enabled.
    • AWS/GCP machines don't need to be set up with Azure Arc for foundational CSPM. On-premises machines do.
    • A couple of foundational recommendations rely on agents:
      • Antimalware/endpoint protection (Log Analytics agent or Azure Monitor agent)
      • OS baselines recommendations (Log Analytics agent or Azure Monitor agent and Guest configuration extension)
      • System updates recommendation (Log Analytics agent)
  2. Start protecting resources:
    • When you open Defender for Cloud in the portal, it starts protecting resources with free foundational CSPM assessments and recommendations.
    • Defender for Cloud creates a default Log Analytics workspace with the SecurityCenterFree solution enabled.
    • Recommendations start appearing in the portal.
  3. Enable defender for servers:
    • When you enable a paid plan, Defender for Cloud enables the security solution on its default workspace.
    • Enable Defender for Servers plan I (subscription only) or Plan 2 (subscription and workspace).
    • After enabling a plan, decide how you want to install agents and extensions on Azure VMS in the subscription/workgroup.
    • By default, auto-provisioning is enabled for some extensions.
  4. Protect AWS/GCP machines:
    • For a Defender for Servers deployment, you set up a connector, turn off plans you don't need, configure auto-provisioning settings, authenticate to AWS/GCP, and deploy the settings.
    • Auto-provisioning includes the agents used by Defender for Cloud and the Azure Connected Machine agent for onboarding to Azure with Azure Arc.
    • AINS uses a CloudFormation template.
    • GCP uses a Cloud Shell template.
    • Recommendations start appearing in the portal.
  5. Protect on-premises servers:
    • Onboard them as Azure Arc machines and deploy agents with auto-provisioning.

When you enable Microsoft Defender for Servers on an Azure subscription or a connected AWS account, all of the connected machines will be protected by Defender for Servers. You can enable Microsoft Defender for Servers at the Log Analytics workspace level, but only servers reporting to that workspace will be protected and billed and those servers won't receive some benefits, such as Microsoft Defender for Endpoint, vulnerability assessment, and just-in-time VM access.

Application workload protections

Microsoft Defender for App Service uses the scale of the cloud to identify attacks targeting applications running over App Service. Attackers probe web applications to find and exploit weaknesses. Before being routed to specific environments, requests to applications running in Azure go through several gateways, where they're inspected and logged. This data is then used to identify exploits and attackers, and to learn new patterns that will be used later.

When you enable Microsoft Defender for App Service, you immediately benefit from the following services offered by this Defender plan:

  • Secure - Defender for App Service assesses the resources covered by your App Service plan and generates security recommendations based on its findings. Use the detailed instructions in these recommendations to harden your App Service resources.

  • Detect - Defender for App Service detects a multitude of threats to your App Service resources by monitoring:

    • the VM instance in which your App Service is running, and its management interface
    • the requests and responses sent to and from your App Service apps
    • the underlying sandboxes and VMs
    • App Service internal logs - available thanks to the visibility that Azure has as a cloud provider

As a cloud-native solution, Defender for App Service can identify attack methodologies applying to multiple targets. For example, from a single host it would be difficult to identify a distributed attack from a small subset of IPs, crawling to similar endpoints on multiple hosts.

The log data and the infrastructure together can tell the story: from a new attack circulating in the wild to compromises in customer machines. Therefore, even if Microsoft Defender for App Service is deployed after a web app has been exploited, it might be able to detect ongoing attacks.

What threats can Defender for App Service detect?

Threats by MITRE ATT&CK tactics

Defender for Cloud monitors for many threats to your App Service resources. The alerts cover almost the complete list of MITRE ATT&CK tactics from pre-attack to command and control.

  • Pre-attack threats - Defender for Cloud can detect the execution of multiple types of vulnerability scanners that attackers frequently use to probe applications for weaknesses.

  • Initial access threats - Microsoft Threat Intelligence powers these alerts that include triggering an alert when a known malicious IP address connects to your Azure App Service FTP interface.

  • Execution threats - Defender for Cloud can detect attempts to run high privilege commands, Linux commands on a Windows App Service, fileless attack behavior, digital currency mining tools, and many other suspicious and malicious code execution activities.

Database workload protections

Microsoft Defender for SQL servers detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases on the SQL server.

You'll see alerts when there are suspicious database activities, potential vulnerabilities, or SQL injection attacks, and anomalous database access and query patterns.

Microsoft Defender for SQL servers on machines extends the protections for your Azure-native SQL servers to fully support hybrid environments and protect SQL servers hosted in Azure, multicloud environments, and even on-premises machines: