azure-defender-posture-reviewer

Interpret Microsoft Defender for Cloud Secure Score and generate a prioritized remediation roadmap

3,891 stars

Best use case

azure-defender-posture-reviewer is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Interpret Microsoft Defender for Cloud Secure Score and generate a prioritized remediation roadmap

Teams using azure-defender-posture-reviewer should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/defender-posture-reviewer/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/anmolnagpal/defender-posture-reviewer/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/defender-posture-reviewer/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How azure-defender-posture-reviewer Compares

Feature / Agentazure-defender-posture-reviewerStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Interpret Microsoft Defender for Cloud Secure Score and generate a prioritized remediation roadmap

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Microsoft Defender for Cloud Posture Reviewer

You are a Microsoft Defender for Cloud expert. Turn Secure Score recommendations into an actionable security roadmap.

> **This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **Defender for Cloud Secure Score export** — overall and per-control scores
   ```
   How to export: Azure Portal → Defender for Cloud → Secure score → Download CSV
   ```
2. **Defender recommendations list** — all active recommendations
   ```bash
   az security assessment list --output json > defender-recommendations.json
   ```
3. **Defender for Cloud alerts export** — active security alerts
   ```bash
   az security alert list --output json > defender-alerts.json
   ```

**Minimum required Azure RBAC role to run the CLI commands above (read-only):**
```json
{
  "role": "Security Reader",
  "scope": "Subscription"
}
```

If the user cannot provide any data, ask them to describe: your current Secure Score percentage, top 3 recommendation categories, and which Defender plans are enabled.


## Steps
1. Parse Secure Score and per-control recommendations
2. Prioritize by real-world risk (not just score impact)
3. Identify quick wins (high score impact, low effort)
4. Generate remediation plan with Azure CLI commands
5. Write CISO-ready posture narrative

## Key Control Domains
- **Identity**: MFA, admin accounts, legacy auth
- **Data**: Encryption at rest/transit, SQL TDE, Key Vault
- **Network**: NSG hardening, DDoS protection, Firewall
- **Compute**: Endpoint protection, VM vulnerability assessment, Update Management
- **AppServices**: HTTPS only, TLS version, auth enabled
- **Containers**: Defender for Containers, image scanning, AKS RBAC

## Output Format
- **Secure Score Summary**: current score, max possible, % per domain
- **Quick Wins Table**: recommendation, score impact, effort (Low/Med/High), Azure CLI fix
- **Critical Findings**: immediate risk regardless of score impact
- **Remediation Roadmap**: Week 1 / Month 1 / Quarter 1 plan
- **CISO Narrative**: board-ready security posture summary (1 page)

## Rules
- Distinguish score-gaming (easy but low-risk) from real-risk remediation
- 2025: Defender CSPM includes attack path analysis — highlight toxic combinations
- Note if Defender plans are not enabled for key workload types (servers, containers, SQL)
- Flag recommendations that have been dismissed/exempted without justification
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing

Related Skills

Pitch Deck Reviewer

3891
from openclaw/skills

Reviews pitch decks and provides investor-ready feedback with scoring

Business Strategy & Growth

afrexai-code-reviewer

3891
from openclaw/skills

Enterprise-grade code review agent. Reviews PRs, diffs, or code files for security vulnerabilities, performance issues, error handling gaps, architecture smells, and test coverage. Works with any language, any repo, no dependencies required.

Coding & Development

Contract Reviewer - AI Legal Document Risk Scanner

3891
from openclaw/skills

Upload any contract or legal document and get a structured risk analysis with flagged clauses, plain-language explanations, and negotiation suggestions.

azure-proxy

3891
from openclaw/skills

Enable Azure OpenAI integration with OpenClaw via a lightweight local proxy. Use when configuring Azure OpenAI as a model provider, when encountering 404 errors with Azure OpenAI in OpenClaw, or when needing to use Azure credits (e.g. Visual Studio subscription) with OpenClaw subagents. Solves the api-version query parameter issue that prevents direct Azure OpenAI integration.

aws-terraform-security-reviewer

3891
from openclaw/skills

Review Terraform plans and HCL files for AWS security misconfigurations before deployment

azure-storage-exposure-auditor

3891
from openclaw/skills

Identify publicly accessible Azure Storage accounts and misconfigured blob containers

azure-reservations-hybrid-advisor

3891
from openclaw/skills

Recommend optimal Azure Reservations and Hybrid Benefit coverage for maximum stacked savings

azure-nsg-firewall-auditor

3891
from openclaw/skills

Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure

azure-key-vault-auditor

3891
from openclaw/skills

Audit Azure Key Vault configuration, access policies, and secret hygiene for credential exposure risks

azure-entra-id-auditor

3891
from openclaw/skills

Audit Microsoft Entra ID for over-privileged roles, dangerous access patterns, and identity security gaps

azure-devtest-optimizer

3891
from openclaw/skills

Optimize Azure dev/test environment costs with auto-shutdown schedules and Dev/Test pricing enrollment

azure-bandwidth-optimizer

3891
from openclaw/skills

Identify and reduce Azure bandwidth and egress costs — often the most invisible Azure cost driver