Enable permissions management
Microsoft Defender for Cloud's integration with Microsoft Entra Permissions Management provides a Cloud Infrastructure Entitlement Management (CIEM) security model that helps organizations manage and control user access and entitlements in their cloud infrastructure. CIEM is a critical component of the Cloud Native Application Protection Platform (CNAPP) solution that provides visibility into who or what has access to specific resources. It ensures that access rights adhere to the principle of least privilege (PoLP), where users or workload identities, such as apps and services, receive only the minimum levels of access necessary to perform their tasks. CIEM also helps organizations to monitor and manage permissions across multiple cloud environments, including Azure, AWS, and GCP.
Before you start
You must enable Defender CSPM on your Azure subscription, AWS account, or GCP project.
Have the following roles and permissions
- AWS and GCP: Security Admin, Application.ReadWrite.All
- Azure: Security Admin, Microsoft.Authorization/roleAssignments/write
Enable permissions management for Azure
When you enabled the Defender CSPM plan on your Azure account, the Azure CSPM standard is automatically assigned to your subscription. The Azure CSPM standard provides Cloud Infrastructure Entitlement Management (CIEM) recommendations.
When Permission Management is disabled, the CIEM recommendations within the Azure CSPM standard won’t be calculated.
Sign in to the Azure portal.
Search for and select Microsoft Defender for Cloud.
Navigate to Environment settings.
Select relevant subscription.
Locate the Defender CSPM plan and select Settings.
Enable Permissions Management.
Select Continue.
Select Save.
The applicable permissions management recommendations appear on your subscription within a few hours.
Enable permissions management for AWS
When you enabled the Defender CSPM plan on your AWS account, the AWS CSPM standard is automatically assigned to your subscription. The AWS CSPM standard provides Cloud Infrastructure Entitlement Management (CIEM) recommendations. When Permission Management is disabled, the CIEM recommendations within the AWS CSPM standard won’t be calculated.
Sign in to the Azure portal.
Search for and select Microsoft Defender for Cloud.
Navigate to Environment settings.
Select relevant AWS account.
Locate the Defender CSPM plan and select Settings.
Enable Permissions Management.
Select Configure access.
Select the relevant permissions type.
Select a deployment method.
Run the updated script on your AWS environment using the onscreen instructions.
Check the CloudFormation template has been updated on AWS environment (Stack) checkbox.
Select Review and generate.
Select Update.
The applicable permissions management recommendations appear on your subscription within a few hours.
Enable permissions management for GCP
When you enabled the Defender CSPM plan on your GCP project, the GCP CSPM standard is automatically assigned to your subscription. The GCP CSPM standard provides Cloud Infrastructure Entitlement Management (CIEM) recommendations.
When Permission Management is disabled, the CIEM recommendations within the GCP CSPM standard won’t be calculated.
To enable permissions management for GCP:
Sign in to the Azure portal.
Search for and select Microsoft Defender for Cloud.
Navigate to Environment settings.
Select relevant GCP project.
Locate the Defender CSPM plan and select Settings.
Toggle permissions management to On.
Select Save.
Select Next: Configure access.
Select the relevant permissions type.
Select a deployment method.
Run the updated Cloud shell or Terraform script on your GCP environment using the on screen instructions.
Add a check to the I ran the deployment template for the changes to take effect checkbox.
Select Review and generate.
Select Update.
The applicable permissions management recommendations appear on your subscription within a few hours.
Next step
Pripomienky
https://aka.ms/ContentUserFeedback.
Pripravujeme: V priebehu roka 2024 postupne zrušíme službu Problémy v službe GitHub ako mechanizmus pripomienok týkajúcich sa obsahu a nahradíme ju novým systémom pripomienok. Ďalšie informácie nájdete na stránke:Odoslať a zobraziť pripomienky pre