|
Core features and Cyber Risk Exposure Management
|
Resources:
|
|
Agentless Vulnerability & Threat Detection
|
Resource Groups:
IAM and Security:
Key Vault
-
key vault (1)
-
key vault access policy (1 for primary location, 2 per region)
-
key vault secret (2 for primary location)
Storage
-
storage account (1 per region)
-
storage container (3 per region)
-
storage blob (21 per region)
-
storage queue (8 per region)
-
storage table (1 per region)
-
storage share (2 per region)
-
storage management policy (1 per region)
Service Bus
-
servicebus namespace (1 per region)
-
servicebus queue (1 dispatcher for primary location, 3 per region)
App Services
-
service plan (1 dispatcher and 1 secret token rotator for primary location, 6 per region)
-
linux function app (1 dispatcher for primary location, 16 per region)
Virtual Machines
|
|
Real-Time Posture Monitoring
|
Azure resources:
|
|
Data Security Posture
|
Terraform resources:
-
azurerm_network_security_group
-
azurerm_network_security_rule
-
azurerm_resource_group
-
azurerm_automation_account
-
azurerm_role_assignment
-
azurerm_automation_webhook
-
azurerm_monitor_action_group
-
azurerm_automation_python3_package
-
azurerm_automation_runbook
-
azurerm_automation_job_schedule
-
azurerm_public_ip
-
azurerm_subnet
-
azurerm_subnet_network_security_group_association
-
azurerm_bastion_host
|
|
Microsoft Defender for Endpoint Log Collection
|
Azure resources:
|
|
Cloud Detections for Azure Activity Log
|
Azure resources:
|