Microsoft Defender for Cloud Adds Native CIEM Across AWS, Azure, and GCP
Microsoft Defender for Cloud integrates native Cloud Infrastructure Entitlement Management across all three major clouds, introducing activity-based inactive identity detection with a 90-day lookback window.
Microsoft Defender for Cloud integrated native Cloud Infrastructure Entitlement Management (CIEM) across AWS, Azure, and GCP effective February 2, 2026. The integration brings identity and access governance capabilities directly into Defender's security posture management platform, eliminating the need for separate CIEM products for organizations operating in multicloud environments.
What Changed
The most significant change is how inactive identities are detected. Previous CIEM implementations in Defender relied on sign-in activity to determine whether an identity was active. The new approach evaluates unused role assignments — identifying identities that have permissions they are not actually using, regardless of whether the identity has recently signed in. This is a more precise measure of excess privilege, because an identity can sign in regularly while using only a fraction of its assigned permissions.
The lookback window for inactive identity analysis has been extended from 45 to 90 days, providing a longer observation period that reduces false positives from seasonal or periodic activity patterns. An identity that is used quarterly for compliance reporting, for example, would not be flagged as inactive under a 90-day lookback but might be under a 45-day window.
The Permissions Creep Index (PCI) metric, which previously provided a numerical score representing the gap between assigned and used permissions, has been deprecated in favor of the activity-based CIEM logic. The PCI was useful as a summary metric but could obscure the specific permissions that were over-provisioned. The new approach surfaces individual unused role assignments directly, providing actionable remediation guidance rather than abstract scores.
Multicloud Coverage
The CIEM capabilities now cover all three major cloud platforms — Azure, AWS, and GCP — in a unified interface within the Microsoft Defender portal. Cloud security teams can view identity posture, unused permissions, and remediation recommendations across all three clouds in a single dashboard, rather than switching between cloud-specific tools. This consolidation is particularly valuable for organizations where identity governance has been managed separately for each cloud, leading to inconsistent policies and blind spots.
Market Context
CIEM has been a standalone product category dominated by specialized vendors like CrowdStrike (via the Preempt acquisition), Ermetic (acquired by Tenable), and CloudKnox (acquired by Microsoft in 2021). Native integration into Defender for Cloud, which is included in Defender for Cloud's existing licensing, removes a significant procurement and integration barrier for organizations that already use Microsoft's security platform.
The least-privilege principle — giving identities only the permissions they actually need — is widely understood as a security best practice but rarely enforced consistently across multicloud environments. The operational difficulty of auditing permissions across three cloud platforms with different identity models and permission structures has historically made least-privilege enforcement a manual, error-prone process. Native CIEM that spans all three clouds automates the most labor-intensive part of this process: identifying where excess permissions exist and recommending specific remediations.
Related Articles
NGINX 1.29.6 Adds Native Sticky Sessions and Fixes QUIC Reset Packet Overflow
NGINX 1.29.6 mainline release introduces a sticky-session directive for upstream blocks, enabling cookie-based session affinity without external load balancers and solving session-loss issues during worker restarts. The release also fixes oversized QUIC reset packets and improves SCGI backend proxying.
FreeBSD 14.4 Delivers Post-Quantum SSH, OpenZFS 2.2.9, and Intel E610 Support
FreeBSD 14.4-RELEASE has arrived with OpenSSH 10.0p2 defaulting to hybrid post-quantum key exchange, OpenZFS 2.2.9, and new driver support for Intel Ethernet E610 NICs. The release also adds 9P filesystem support for Bhyve virtualization guests and patches vulnerabilities in OpenSSL and libarchive.
OFC 2026: Coherent and Broadcom Demonstrate 3.2 Terabit-Per-Second Optical Transceivers
At the Optical Fiber Communication Conference in Los Angeles, Coherent and Broadcom have demonstrated 3.2 Tbps optical transceiver modules — doubling the bandwidth of current-generation 1.6T interconnects. The technology is designed for the next wave of AI data center buildouts, where single training runs require moving exabytes of data between thousands of GPUs.