Skip to content

Commit 2ba6e4e

Browse files
authored
Enhance ARO Defender documentation with automation details
Added details on automating recommendations with Microsoft Defender for Cloud, including monitoring, automated actions, and examples of automation in ARO and containers.
1 parent 1c0e94b commit 2ba6e4e

1 file changed

Lines changed: 29 additions & 0 deletions

File tree

0_Azure/8_AzureApps/demos/1_Compute/3_ARO_Defender.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,35 @@ To enable it: `This way, you get both runtime threat detection and image vulnera
7474

7575
> - Configure image vulnerability scanning for your container registries (e.g., Azure Container Registry or integrated third-party registries).
7676
77+
## Automating recommendations
78+
79+
> Microsoft Defender for Cloud (and Defender for Containers) is primarily a monitoring, detection, and recommendation engine. `It does not directly “reach into” your ARO (Azure Red Hat OpenShift) or AKS/containers and change configurations by itself. Instead, it surfaces recommendations and alerts, and you can automate actions around them.`
80+
81+
82+
> [!TIP]
83+
> - **Defender does not directly “do actions” inside ARO/containers.**
84+
> - It provides **recommendations and alerts**, and you can **wire automation** (Azure Policy, Logic Apps, Kubernetes admission controllers) to enforce or remediate those recommendations.
85+
> - In practice, Defender acts as the **brains** (detect + recommend), while **Policy/Logic Apps/Function Apps/Kubernetes controllers** act as the **hands** (enforce + remediate).
86+
87+
88+
> What You *Can* Do in ARO or Containers:
89+
90+
1. **Monitoring & Recommendations** Defender for Containers integrates with **ARO** (since ARO is built on OpenShift/Kubernetes). It provides:
91+
- Vulnerability scanning of container images.
92+
- Runtime threat detection.
93+
- Compliance checks (e.g., privileged containers, read-only root filesystem).
94+
- Recommendations for hardening workloads.
95+
2. **Automated Actions**: Defender itself doesn’t directly enforce changes inside ARO pods or containers. But you can **automate remediation** using:
96+
- **Azure Policy** → enforce container security settings (e.g., read-only root filesystem, disallow privileged escalation).
97+
- **Workflow automation (Logic Apps/Function Apps)** → trigger scripts or actions when Defender raises an alert.
98+
- **Kubernetes admission controllers / Gatekeeper** → enforce policies at deployment time, often aligned with Defender’s recommendations.
99+
3. **Examples of Automation**:
100+
- **ARO / AKS cluster hardening:** Automatically block deployments that violate Defender recommendations (via Azure Policy + Gatekeeper).
101+
- **Container image scanning:** If Defender finds a vulnerable image in ACR, trigger a Logic App to block its deployment or notify DevOps.
102+
- **Runtime alerts:** If Defender detects suspicious activity in a container, trigger automation to isolate the pod, scale down the deployment, or alert security teams.
103+
104+
105+
77106
<!-- START BADGE -->
78107
<div align="center">
79108
<img src="https://img.shields.io/badge/Total%20views-1497-limegreen" alt="Total views">

0 commit comments

Comments
 (0)