module/ConfigurationProvider/ControlConfigurations/Services/SecurityConnectors.json

{
  "FeatureName": "SecurityConnectors",
  "Reference": "aka.ms/azsktcp/securityconnectors",
  "IsMaintenanceMode": false,
  "Controls": [
    {
      "ControlID": "Azure_SecurityConnectors_Config_Enable_MicrosoftDefender_Container_AWSConnector_MCSB",
      "Description": "[MCSB] Microsoft Defender for Containers should be enabled on AWS connectors",
      "Id": "SecurityConnectors100",
      "ControlSeverity": "High",
      "Automated": "Yes",
      "ControlScanSource": "MDC",
      "DisplayName": "[MCSB] Microsoft Defender for Containers should be enabled on AWS connectors",
      "Category": "Monitoring must be correctly configured",
      "ControlRequirements": "To support threat detection scenarios, monitor all known resource types for known and expected threats and anomalies",
      "Rationale": "Microsoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments. You can use this information to quickly remediate security issues and improve the security of your containers.",
      "Recommendation": "To enable this plan on all Kubernetes clusters in an AWS connector: From Defender for Cloud's 'Environment settings' page, select the relevant AWS connector --> In the 'Defender plans' page, set 'Containers' to 'On'",
      "Tags": [
        "SDL",
        "Automated",
        "Baseline",
        "Config"
      ],
      "AssessmentProperties": {
        "AssessmentNames": [
          "11d0f4af-6924-4a2e-8b66-781a4553c828"
        ],
        "ResourceDetails": {
          "HasExtendedResourceId": true
        },
        "AssessmentStatusMappings": [
          {
            "AssessmentStatusCode": "NotApplicable",
            "EffectiveVerificationResult": "Failed",
            "AssessmentStatusCausePatterns": "(.)*OffByPolicy|Exempt(.)*",
            "AppendMessageToStatusReason": "Disabling or exempting the policy from getting evaluated is not recommended. The Control will be marked as Failed."
          }
        ]
      },
      "Enabled": false,
      "CustomTags": [
        "Daily",
        "MCSB"
      ]
    },
    {
      "ControlID": "Azure_SecurityConnectors_Config_Enable_MicrosoftDefender_Container_GCPConnector_MCSB",
      "Description": "[MCSB] Microsoft Defender for Containers should be enabled on GCP connectors",
      "Id": "SecurityConnectors110",
      "ControlSeverity": "High",
      "Automated": "Yes",
      "ControlScanSource": "MDC",
      "DisplayName": "[MCSB] Microsoft Defender for Containers should be enabled on GCP connectors",
      "Category": "Monitoring must be correctly configured",
      "ControlRequirements": "To support threat detection scenarios, monitor all known resource types for known and expected threats and anomalies",
      "Rationale": "Microsoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments. You can use this information to quickly remediate security issues and improve the security of your containers.",
      "Recommendation": "To enable this plan on all Kubernetes clusters in a GCP connector: From Defender for Cloud's 'Environment settings' page, select the relevant GCP connector --> In the 'Defender plans' page, set 'Containers' to 'On'",
      "Tags": [
        "SDL",
        "Automated",
        "Baseline",
        "Config"
      ],
      "AssessmentProperties": {
        "AssessmentNames": [
          "d42ac63d-0592-43b2-8bfa-ff9199da595e"
        ],
        "ResourceDetails": {
          "HasExtendedResourceId": true
        },
        "AssessmentStatusMappings": [
          {
            "AssessmentStatusCode": "NotApplicable",
            "EffectiveVerificationResult": "Failed",
            "AssessmentStatusCausePatterns": "(.)*OffByPolicy|Exempt(.)*",
            "AppendMessageToStatusReason": "Disabling or exempting the policy from getting evaluated is not recommended. The Control will be marked as Failed."
          }
        ]
      },
      "Enabled": false,
      "CustomTags": [
        "Daily",
        "MCSB"
      ]
    }
  ]
}