Internet exposure analysis
Internet exposure analysis in Microsoft Defender for Cloud lets you understand which of your multicloud resources are exposed to the internet. Defender for Cloud uses internet exposure to determine the risk level of your misconfigurations, vulnerabilities, and other issues.
How Defender for Cloud detects internet exposure
Defender for Cloud assesses connected cloud resources to see if they're configured for internet exposure. Detecting internet exposure can be as simple as checking if a virtual machine (VM) has a public Internet Protocol (IP) address. However, the process can be more complex. Defender for Cloud attempts to locate internet-exposed resources in complex multicloud architectures. For example, a VM might not be directly exposed to the internet but could be behind a load balancer, which distributes network traffic across multiple servers to ensure no single server becomes overwhelmed.
The following table lists the resources that Defender for Cloud assesses for internet exposure:
Category | Services/Resources |
---|---|
Virtual machines | Azure VM Amazon Web Service (AWS) EC2 Google Cloud Platform (GCP) compute instance |
Virtual machine clusters | Azure Virtual Machine Scale Set GCP instance groups |
Databases (DB) | Azure SQL Azure PostgreSQL Azure MySQL Azure SQL Managed Instance Azure MariaDB Azure Cosmos DB Azure Synapse AWS Relational Database Service (RDS) DB GCP SQL admin instance |
Storage | Azure Storage AWS S3 buckets GCP storage buckets |
AI | Azure OpenAI Service Azure AI Services Azure Cognitive Search |
Containers | Azure Kubernetes Service (AKS) AWS EKS GCP GKE |
API | Azure API Management Operations |
The following table lists the network components that Defender for Cloud assesses for internet exposure:
Category | Services/Resources |
---|---|
Azure | Application gateway Load Balancer Azure Firewall Network Security Groups |
AWS | Elastic load balancer |
GCP | Load balancer |
How to view internet exposed resources
Defender for Cloud offers a few different ways to view internet-exposed resources.
Cloud Security Explorer - The Cloud Security Explorer lets you run graph-based queries on the Cloud Security Graph. On the Cloud Security Explorer page, you can run a query to find resources exposed to the internet. This query returns all your attached resources exposed to the internet and lets you view any associated details.
Attack Path Analysis - The Attack Path Analysis page lets you view attack paths that an attacker could take to reach a specific resource. With Attack Path Analysis, you can view a visual representation of the attack path and see which resources are exposed to the internet. Internet exposure often serves as an entry point for attack paths, especially when the resource has vulnerabilities. Internet-exposed resources often lead to targets with sensitive data.
Recommendations - Defender for Cloud prioritizes recommendations based on their exposure to the internet.
Defender External Attack Surface Management integration
Defender for Cloud also integrates with Defender External Attack Surface Management to assess resources for internet exposure by attempting to contact them from an external source and seeing if they respond.
Learn more about the Defender External Attack Surface Management integration.