![]() Container images in AWS registry should have vulnerability findings resolved.Containers running in Azure should have vulnerability findings resolved.Container images in Azure registry should have vulnerability findings resolved.They report on container images for registry and container workloads for runtime: ![]() To support the new risk-based prioritization experience for recommendations, we've created new recommendations for container vulnerability assessments in Azure, AWS, and GCP. New container vulnerability assessment recommendations The risk factors include the potential impact of the security issue being breached, the categories of risk, and the attack path that the security issue is part of. This feature helps you to focus on the most critical security issues in your environment by prioritizing recommendations based on the risk factors of each resource. Risk prioritization is now the default experience in Defender for Cloud. Update to recommendations to align with Azure AI Services resourcesÄeprecation of Cognitive Services recommendationĬontainers multicloud recommendations (GA) New container vulnerability assessment recommendationsÄefender for open-source relational databases updates Risk prioritization is now the default experience in Defender for Cloud If you're looking for items older than six months, you can find them in the Archive for What's new in Microsoft Defender for Cloud. To learn about planned changes that are coming soon to Defender for Cloud, see Important upcoming changes to Microsoft Defender for Cloud. Get notified when this page is updated by copying and pasting the following URL into your feed reader:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |