课程: Microsoft Security Essentials: Concepts, Solutions, and AI-Powered Protection

CNAPP with Microsoft Defender for Cloud

- [Instructor] Cloud computing empowers modern businesses with scalable, agile, and cost effective services. As small companies move their infrastructure, applications and the data to the cloud, cloud security has become a top concern. Microsoft Defender for Cloud helps organizations improve their overall cloud security posture through its CNAPP capabilities. What is CNAP? CNAPP stands for Cloud-Native Application Protection Platform. It's a unified solution that integrates security and compliance to prevent, detect, and respond to threats across multi-cloud environments. It also enables a security throughout the application development lifecycle, and protects cloud workloads. Microsoft Defender for Cloud provides a CNAPP solution through three key capabilities. Cloud security posture management, CSPM. Security posture refers to the current security state of an organization. It shows how effectively the organization can defend against the threats based on its configurations, policies and controls. Cloud workload protection platform, CWPP. It protects cloud workloads such as servers, app service, storage, databases and containers. Development security operations, DevSecOps. DevOps is a modern security approach, which combines development and operations to enable a continuous integration and continuous delivery CI/CD pipeline. DevSecOps extends DevOps by embedding security practice into every stage of the process. In addition, Microsoft Defender for Cloud integrates with Microsoft Defender XDR, and extended detection and a response suite of products to provide enhanced protection against advanced attacks. Let's take a quick tour of Microsoft Defender for Cloud. On the overview page, you'll see a dashboard with information such as security posture, regulatory compliance, workload protections, and inventory. Under cloud security, you can manage security posture across multi-cloud environments, manage regulatory compliance, and the view recommendations based on industry security benchmarks, apply workload protections, and implement DevOps security.

内容