Skip to content

Commit 081a5e4

Browse files
authored
Update automation examples and resource roles for Defender
1 parent 08af6be commit 081a5e4

1 file changed

Lines changed: 13 additions & 2 deletions

File tree

0_Azure/8_AzureApps/demos/1_Compute/3_ARO_Defender.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,10 +100,21 @@ To enable it: `This way, you get both runtime threat detection and image vulnera
100100
- **Kubernetes admission controllers / Gatekeeper** → enforce policies at deployment time, often aligned with Defender’s recommendations.
101101
3. **Examples of Automation**:
102102
- **ARO / AKS cluster hardening:** Automatically block deployments that violate Defender recommendations (via Azure Policy + Gatekeeper).
103-
- **Container image scanning:** If Defender finds a vulnerable image in ACR, trigger a Logic App to block its deployment or notify DevOps.
103+
- **Container image scanning:** If Defender finds a vulnerable image in ACR, trigger a Logic App/Function App to block its deployment or notify DevOps.
104104
- **Runtime alerts:** If Defender detects suspicious activity in a container, trigger automation to isolate the pod, scale down the deployment, or alert security teams.
105105

106-
106+
> Defender acts as the “brains”, while Policy/Logic Apps/FA act as the “hands” to enforce or remediate.
107+
108+
| **Resource Type** | **Defender Role** | **Typical Recommendations** | **Automation / Enforcement Options** |
109+
|-------------------|-------------------|-----------------------------|--------------------------------------|
110+
| **Virtual Machines (VMs)** | Monitors OS vulnerabilities, malware, insecure configurations | Apply missing patches, enable endpoint protection, restrict open ports | Azure Policy for secure baseline; Logic Apps/FA to trigger patching scripts; Azure Update Management |
111+
| **Databases (SQL, Cosmos DB, etc.)** | Detects weak authentication, insecure connections, excessive permissions | Enforce TLS, enable auditing, restrict firewall rules | Azure Policy to enforce TLS; Logic Apps/FA to rotate keys or alert DB admins |
112+
| **Storage Accounts** | Identifies public access, missing encryption, insecure shared keys | Require private endpoints, enable encryption, disable anonymous access | Azure Policy to block public access; Logic Apps/FA to disable insecure settings |
113+
| **AKS / ARO / Containers** | Scans images, detects runtime threats, checks pod security | Disallow privileged containers, enforce read-only root filesystem, scan images for CVEs | Azure Policy + Gatekeeper for enforcement; Logic Apps/FA to block deployments or notify DevOps |
114+
| **App Services (Web Apps, Functions)** | Monitors SSL/TLS, outdated frameworks, insecure configurations | Require HTTPS-only, update runtime versions, restrict CORS | Azure Policy to enforce HTTPS; Logic Apps/FA to notify developers |
115+
| **Key Vault** | Detects excessive access permissions, missing logging | Enforce RBAC, enable logging, rotate secrets | Azure Policy to enforce RBAC; Logic Apps/FA to trigger secret rotation |
116+
| **Networking (NSGs, Firewalls)** | Detects overly permissive rules, insecure endpoints | Restrict inbound rules, enforce segmentation, enable DDoS protection | Azure Policy to block insecure NSG rules; Logic Apps/FA to auto-close risky ports |
117+
| **Azure Container Registry (ACR)** | Scans images for vulnerabilities | Block vulnerable images, enforce signed images | Policy to enforce image scanning; Logic Apps/FA to prevent deployment of non-compliant images |
107118

108119
<!-- START BADGE -->
109120
<div align="center">

0 commit comments

Comments
 (0)