You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 0_Azure/8_AzureApps/demos/1_Compute/3_ARO_Defender.md
+13-2Lines changed: 13 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,10 +100,21 @@ To enable it: `This way, you get both runtime threat detection and image vulnera
100
100
-**Kubernetes admission controllers / Gatekeeper** → enforce policies at deployment time, often aligned with Defender’s recommendations.
101
101
3.**Examples of Automation**:
102
102
-**ARO / AKS cluster hardening:** Automatically block deployments that violate Defender recommendations (via Azure Policy + Gatekeeper).
103
-
-**Container image scanning:** If Defender finds a vulnerable image in ACR, trigger a Logic App to block its deployment or notify DevOps.
103
+
-**Container image scanning:** If Defender finds a vulnerable image in ACR, trigger a Logic App/Function App to block its deployment or notify DevOps.
104
104
-**Runtime alerts:** If Defender detects suspicious activity in a container, trigger automation to isolate the pod, scale down the deployment, or alert security teams.
105
105
106
-
106
+
> Defender acts as the “brains”, while Policy/Logic Apps/FA act as the “hands” to enforce or remediate.
0 commit comments