{"id":593,"date":"2022-08-18T13:00:13","date_gmt":"2022-08-18T13:00:13","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/?p=593"},"modified":"2024-11-04T14:50:06","modified_gmt":"2024-11-04T22:50:06","slug":"secure-product-infrastructure-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/secure-product-infrastructure-security\/","title":{"rendered":"How to secure your product infrastructure security"},"content":{"rendered":"\n
This is part two of a three-part series on product infrastructure security.<\/em><\/p>\n\n\n\n Startup organizations often face a challenge in implementing the right products for enabling security for hybrid and multi-cloud deployments. The most common reason is the complexity of security solutions, which is compounded by the lack of a specialized security team. With Microsoft Defender for Cloud<\/a> the process of ensuring security of your cloud assets is simplified, so that you get to focus on solutions that add value to your business without worrying about your security posture.<\/p>\n\n\n\n In the first part of this blog series<\/a>, we explored the basics of product security posture management. We also explored how Microsoft Defender for Cloud helps defend your cloud deployments from infiltrations and threats and give a unified view of the state of security of your cloud deployments across different cloud platforms. In this second part, we’ll look at how to use Microsoft Defender for Cloud to secure your cloud infrastructure step by step.<\/p>\n\n\n\n While the free plan of Microsoft Defender for Cloud provides continuous security assessments and hardening recommendations, the enhanced security features offered by the service can be a definite game changer in enabling security of your workloads. Let\u2019s take a deeper look at these capabilities.<\/p>\n\n\n\n For robust endpoint detection and response (EDR), Microsoft Defender for Endpoint<\/a> is incorporated in Microsoft Defender for Servers. It helps with real time detection of attacks in a range of devices like Windows, Linux, macOS, Android, etc. Powered by best-in-class intelligent threat management algorithms, you can automate the remediation of identified threats at scale.<\/p>\n\n\n\n Microsoft Defender for Cloud provides vulnerability assessment for resources like virtual machines, SQL resources and container registries. You can configure auto provisioning to onboard the resources to Microsoft Defender for Cloud. The findings will be consolidated in Defender for cloud and can be investigated directly from the service console.<\/p>\n\n\n\n Startups with resources deployed in AWS and Google cloud can connect those environments to Microsoft Defender for Cloud and monitor the security posture from a single pane. Non-Azure windows and Linux machines can be boarded by installing log analytics agents that communicate with Microsoft Defender for Cloud. Another option is to connect them to Azure Arc, Microsoft\u2019s hybrid and multi-cloud management solution, that provides machine policy management in addition to security hardening provided by Microsoft Defender for Cloud.<\/p>\n\n\n\n Microsoft Defender for Cloud provides next-generation protection against ever evolving threat vectors like polymorphic and metamorphic malwares. The behavioral analytics and machine learning based approach helps in early detection and mitigation of attacks. It helps identify zero-day exploits for machines, networks, SQL servers, Azure storage, etc. Microsoft Defender for Cloud’s contextual threat intelligence alerts assist you in tracking the attack vector, conducting deeper investigations, and implementing faster remedies.<\/p>\n\n\n\n With enhanced security features enabled, you can assess the hybrid and multi-cloud deployments against several industry leading compliance standards and benchmarks. It provides a clear view of how many controls have passed or failed the assessment in your deployments. Remediation guidance for failed controls is also provided by the service. This makes life easier for startups working in highly regulated industries.<\/p>\n\n\n\n Adaptive application controls help you to control the type of applications that you want to run in your environment. You can create an allow list and a blocklist depending on your organization’s regulations, or you can use Microsoft Defender for Cloud’s machine learning-powered recommendations. To protect against brute force attacks that target allowed ports and services on virtual machines, you can leverage the just-in-time access control mechanisms that allow access only during a defined time period.<\/p>\n\n\n\n Microsoft Defender for Containers<\/a> provides a comprehensive security solution for your Kubernetes workloads running in Microsoft Azure as well as other cloud platforms. The service provides run time protection for your Linux nodes and Kubernetes clusters, alerting you of any malicious activity in these systems. Container images stored are scanned in real time for any vulnerabilities before they are stored in the container registry.<\/p>\n\n\n\n Microsoft Defender for Cloud provides native threat detection and protection for your Microsoft Azure cloud resources. The resources like Azure networks, Key Vault, Azure DNS, Azure Resource Manager are automatically onboarded and protected by the service against possible threats.<\/p>\n\n\n\n To enable enhanced security features, browse to Azure portal > Microsoft Defender for cloud > Environment settings:<\/p>\n\n\n\n Once the enhanced features are enabled, you can see notifications that confirm that the process is completed.<\/p>\n\n\n To add non-Azure machines in hybrid cloud deployments and to protect multi-cloud resources, browse to Microsoft Defender for cloud > Getting started.<\/p>\n\n\n\n Auto provisioning will install Microsoft Defender for Cloud agents in target resources so that any new or existing resource is automatically onboarded to the service. This helps with speedier security management for all cloud resources supported.<\/p>\n\n\n\n The default setting is \u201cNone\u201d i.e., the security events are not stored in workspace. For a full audit trail, the optimal configuration to use is \u201cCommon\u201d. Other options available are \u201cMinimal\u201d and \u201cAll events\u201d. One of these options can be selected as per your logging requirements. Click \u201cApply\u201d<\/p>\n\n\n\n Threat detection and protection for your workloads in AWS, Azure, GCP or on-premises are provided by Microsoft Defender for Servers.<\/p>\n\n\n\n By default, in enhanced security settings, Microsoft Defender for Servers Plan 2 is enabled, which provides the following capabilities:<\/p>\n\n\n\n You can either choose from one of the following integrated solutions – Threat and vulnerability management solution by Microsoft Defender for Endpoint or the vulnerability scanner powered by Qualys. If you already have the license to a third party scanner, you can use that as well in a BYOL model. Click on Proceed.<\/p>\n\n\n\n Note: Integrated vulnerability management solution is available for the following set of supported operating systems:<\/p>\n\n\n By default, Azure Security Benchmark<\/a> based compliance assessment is enabled and you can view the status from Microsoft Defender for Cloud > Overview.<\/p>\n\n\n You can choose to enable standard from this view or Click on \u201cAdd more standards\u201d to see additional compliance standards.<\/p>\n\n\n\n Enabling Microsoft Defender for cloud protection for your multi-cloud resources is just a matter of a few clicks. You can use the details outlined in the blog to get started with strengthening your security posture with Microsoft Defender for Cloud. In the final part of this blog series<\/a>, we will do a deep dive on the concept of secure score and how you can leverage it and the threat detection capabilities provided by Microsoft Defender for Cloud to protect your infrastructure from malicious attacks.<\/p>\n\n\n\n\n
Harden security using enhanced security features<\/h2>\n\n\n\n
Microsoft Defender for Endpoint<\/h3>\n\n\n\n
Vulnerability assessment<\/h3>\n\n\n\n
Multi-cloud and hybrid cloud security<\/h3>\n\n\n\n
Threat protection alerts<\/h3>\n\n\n\n
Compliance tracking<\/h3>\n\n\n\n
Access and application control<\/h3>\n\n\n\n
Container security<\/h3>\n\n\n\n
Azure resource threat detection<\/h3>\n\n\n\n
Enable enhanced security features of Microsoft Defender for Cloud<\/h2>\n\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
Multi-cloud and hybrid cloud protection<\/h2>\n\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
Auto provisioning of Microsoft Defender for agents and extensions<\/h2>\n\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
Workload protection<\/h2>\n\n\n\n
\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
<\/figure><\/div>\n\n\n
Regulatory compliance<\/h2>\n\n\n\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
For example, if your organization is focused on the healthcare vertical and want to measure compliance against HITRUST\/HIPAA, you can select the standard from the list as shown here.<\/li>\n<\/ol>\n\n\n<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
Access and application control<\/h2>\n\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
Summary<\/h2>\n\n\n\n