Edit

Share via


Microsoft Defender for Cloud overview

Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP) that includes security measures and practices designed to protect cloud-based applications from various cyber threats and vulnerabilities. Defender for Cloud includes:

  • A development security operations (DevSecOps) solution that unifies security management at the code level across multicloud and multi-pipeline environments
  • A cloud security posture management (CSPM) solution that identifies actions to prevent breaches
  • A cloud workload protection platform (CWPP) with protections for servers, containers, storage, databases, and other workloads

Diagram that shows the core functionality of Microsoft Defender for Cloud.

Note

For Defender for Cloud pricing information, see the pricing page.

The Microsoft 365 Defender portal helps security teams investigate attacks on cloud resources, devices, and identities. Microsoft 365 Defender provides an overview of attacks, including suspicious and malicious events in cloud environments. Microsoft 365 Defender achieves this by correlating all alerts and incidents, including cloud alerts and incidents.

Learn more about the integration between Microsoft Defender for Cloud and Microsoft Defender XDR.

Secure cloud applications

Defender for Cloud helps you incorporate good security practices early in the software development process, or DevSecOps. You can protect your code management environments and code pipelines, and get insights into your development environment security posture from a single location. Defender for Cloud enables security teams to manage DevOps security across multi-pipeline environments.

Today's applications require security awareness at the code, infrastructure, and runtime levels to ensure that deployed applications are hardened against attacks.

CapabilityWhat problem does it solve?Get startedDefender plan
Code pipeline insightsEmpowers security teams with the ability to protect applications and resources from code to cloud across multi-pipeline environments, including GitHub, Azure DevOps, and GitLab. DevOps security findings, such as Infrastructure as Code (IaC) misconfigurations and exposed secrets, can then be correlated with other contextual cloud security insights to prioritize remediation in code.Connect Azure DevOps, GitHub, and GitLab repositories to Defender for CloudFoundational CSPM (Free) and Defender CSPM

Improve your security posture

The security of your cloud and on-premises resources relies on proper configuration and deployment. Defenders for Cloud recommendations identify steps to secure your environment.

Defender for Cloud includes free Foundational CSPM capabilities. Enable advanced CSPM capabilities with the Defender CSPM plan.

CapabilityWhat problem does it solve?Get startedDefender plan
Centralized policy managementDefine the security conditions that you want to maintain across your environment. The policy translates to recommendations that identify resource configurations that violate your security policy. The Microsoft cloud security benchmark is a built-in standard that applies security principles with detailed technical implementation guidance for Azure and other cloud providers (such as Amazon Web Services (AWS) and Google Cloud Platform (GCP).Customize a security policyFoundational CSPM (Free)
Secure scoreSummarize your security posture based on the security recommendations. As you remediate recommendations, your secure score improves.Track your secure scoreFoundational CSPM (Free)
Multicloud coverageConnect to your multicloud environments with agentless methods for CSPM insight and CWP protection.Connect your Amazon AWS and Google GCP cloud resources to Defender for CloudFoundational CSPM (Free)
Cloud Security Posture Management (CSPM)Use the dashboard to see weaknesses in your security posture.Enable CSPM toolsFoundational CSPM (Free)
Advanced Cloud Security Posture ManagementGet advanced tools to identify weaknesses in your security posture, including:
- Governance to drive actions to improve your security posture
- Regulatory compliance to verify compliance with security standards
- Cloud security explorer to build a comprehensive view of your environment
Enable CSPM toolsDefender CSPM
Data Security Posture ManagementData security posture management automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches.Enable data security posture managementDefender CSPM or Defender for Storage
Attack path analysisModel traffic on your network to identify potential risks before you implement changes to your environment.Build queries to analyze pathsDefender CSPM
Cloud Security ExplorerA map of your cloud environment that lets you build queries to find security risks.Build queries to find security risksDefender CSPM
Security governanceDrive security improvements through your organization by assigning tasks to resource owners and tracking progress in aligning your security state with your security policy.Define governance rulesDefender CSPM
Microsoft Entra Permissions ManagementProvide comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP.Review your Permission Creep Index (CPI)Defender CSPM

Protect cloud workloads

Proactive security principles require implementing security practices to protect your workloads from threats. Cloud workload protections (CWP) provide workload-specific recommendations to guide you to the right security controls to protect your workloads.

When your environment is threatened, security alerts immediately indicate the nature and severity of the threat so you can plan your response. After identifying a threat in your environment, respond quickly to limit the risk to your resources.

CapabilityWhat problem does it solve?Get startedDefender plan
Protect cloud serversProvide server protections through Microsoft Defender for Endpoint or extended protection with just-in-time network access, file integrity monitoring, vulnerability assessment, and more.Secure your multicloud and on-premises serversDefender for Servers
Identify threats to your storage resourcesDetect unusual and potentially harmful attempts to access or exploit your storage accounts using advanced threat detection capabilities and Microsoft Threat Intelligence data to provide contextual security alerts.Protect your cloud storage resourcesDefender for Storage
Protect cloud databasesProtect your entire database estate with attack detection and threat response for the most popular database types in Azure to protect the database engines and data types, according to their attack surface and security risks.Deploy specialized protections for cloud and on-premises databases- Defender for Azure SQL Databases
- Defender for SQL servers on machines
- Defender for Open-source relational databases
- Defender for Azure Cosmos DB
Protect containersSecure your containers so you can improve, monitor, and maintain the security of your clusters, containers, and their applications with environment hardening, vulnerability assessments, and run-time protection.Find security risks in your containersDefender for Containers
Infrastructure service insightsDiagnose weaknesses in your application infrastructure that can leave your environment susceptible to attack.- Identify attacks targeting applications running over App Service
- Detect attempts to exploit Key Vault accounts
- Get alerted on suspicious Resource Manager operations
- Expose anomalous Domain Name System (DNS) activities
- Defender for App Service
- Defender for Key Vault
- Defender for Resource Manager
- Defender for DNS
Security alertsGet informed of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses.Manage security alertsAny workload protection Defender plan
Security incidentsIdentify attack patterns by correlating alerts and integrate with Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and IT classic deployment model solutions to respond to threats and reduce risk to your resources.Export alerts to SIEM, SOAR, or ITSM systemsAny workload protection Defender plan

Important

As of August 1 2023, customers with an existing subscription to Defender for DNS can continue to use the service, but new subscribers will receive alerts about suspicious DNS activity as part of Defender for Servers P2.

Learn More

For more information about Defender for Cloud and how it works, see:

Next steps