{"id":595,"date":"2022-08-18T14:00:02","date_gmt":"2022-08-18T14:00:02","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/?p=595"},"modified":"2024-11-04T14:40:50","modified_gmt":"2024-11-04T22:40:50","slug":"defend-product-infrastructure-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/","title":{"rendered":"How to defend your product infrastructure against malicious attacks"},"content":{"rendered":"\n
This is part three of a three-part series on product infrastructure security.<\/em><\/p>\n\n\n\n The attack vectors in the cloud are constantly evolving. These attacks frequently use unpatched vulnerabilities and insecure configurations to gain access to your systems. Quick and effective detection and proactive remediation is the key. As a startup building your business in the cloud, becoming the target of a malicious attack can set you back from your peers. Microsoft Defender for Cloud<\/a> has built in controls and integrated tools that can protect you from such predicaments.<\/p>\n\n\n\n In this blog series, we started off by discussing the relevance of security posture management and how to get started with the service<\/a>. In the second part, we looked at the steps to get started with some of the key features of Microsoft Defender for Cloud<\/a> that will help you get started with the service. In the concluding part of this series, we will deep dive further into the capabilities of Microsoft Defender for Cloud that will help protect your environment from malicious attacks.<\/p>\n\n\n\n For startups working in highly regulated industry verticals, ensuring compliance can involve extensive efforts. The option to download a certificate demonstrating how secure your infrastructure and services are will help make this process go more smoothly. The secure score provided by Microsoft Defender for Cloud based on leading compliance standards puts forth the easiest solution for this.<\/p>\n\n\n\n The security status of your deployments is continuously assessed by Microsoft Defender for Cloud and the outcomes are quantified as a secure score. The secure score is displayed as a percentage, and the service also displays the security findings that contribute to the score.<\/p>\n\n\n\n The Secure score can be viewed from Microsoft Defender for Cloud > Security posture. The security posture of different connected environments can also be viewed from here:<\/p>\n\n\n Click on Recommendations to see the controls and recommendations for each environment. The view also shows the maximum score for each control, the current score and potential score increase that is possible by remediating the findings.<\/p>\n\n\n You can expand the security control to see the recommendations associated with it. For example, shown below are the recommendations associated with the control \u201cSecure management ports.\u201d This control provides guidance on securing the management ports associated with your resources. If left unprotected, these ports can be targeted by brute force attacks to gain access to the environment.<\/p>\n\n\n Max score<\/strong>: If all findings are remediated, the maximum possible score will be 8. The score is associated with a control based on its relevance to the respective environment. The recommendations associated with the control having the highest score should be prioritized first.<\/p>\n\n\n\n Current Score<\/strong>: It shows the current score based on the number of resources that are already in line with the recommendations.<\/p>\n\n\n\n Potential score increase<\/strong>: This section shows the percentage by which the score can be increased by remediating the recommendations.<\/p>\n\n\n\n Insights<\/strong>: It gives you additional information about the respective recommendations. The guidance provided can be used to fix the findings. You can also set up policies that will either rectify the problem if someone creates a non-compliant resource or altogether prevent the creation of resources with this issue.<\/p>\n\n\n\n Secure score calculation<\/strong>: The score associated with a single security control is calculated using the following formula<\/p>\n\n\n The score associated with each control rolls ups to provide the secure score of the Azure subscription or other connected cloud environment using the below formula:<\/p>\n\n\n When there are multiple subscriptions or connected AWS\/GCP environments the overall security posture is calculated using the following formula<\/p>\n\n\n Note that Microsoft Defender for Cloud assigns a weight to each environment depending on parameters such as the number of resources in that environment.<\/p>\n\n\n\n Microsoft Defender for Cloud protects your subscriptions by implementing security initiatives. One or more security policies are included in these initiatives. Each of these policies yields a security recommendation for strengthening your posture.<\/p>\n\n\n\n Security policy<\/strong>: Azure policies help implement subscription wide restrictions like usage of tags, naming convention, allowed regions. A security Policy uses the same constructs to create a set of rules for controlling certain security configurations. Defender for Cloud policies can either be \u201cAudit\u201d or \u201cEnforce\u201d policies. ‘Audit’ policies, inspect and report on certain security configurations. “Enforce” policies on the other hand that can be used to enforce secure settings.<\/p>\n\n\n\n\n
Assess security posture through secure score<\/h2>\n\n\n\n
What is Microsoft Secure Score?<\/h3>\n\n\n\n
<\/figure><\/div>\n\n\n
<\/figure><\/div>\n\n\n
<\/figure><\/div>\n\n\n
<\/figure><\/div>\n\n\n
<\/figure><\/div>\n\n\n
<\/figure><\/div>\n\n\n
Resolve threats and improve secure score<\/h2>\n\n\n\n