Security Command Center provides increased support for Microsoft Azure data
Share
Services
## Feature
Security Command Center provides increased support for Microsoft Azure data.
* Security Command Center can collect [Microsoft Azure resource and configuration data](https://cloud.google.com/security-command-center/docs/connect-scc-to-azure).
* Risk Engine can discover [toxic combinations](https://cloud.google.com/security-command-center/docs/toxic-combinations-overview), [attack paths](https://cloud.google.com/security-command-center/docs/attack-exposure-learn), and [issues](https://cloud.google.com/security-command-center/docs/issues-overview) in your Microsoft Azure environment.
* The Sensitive Data Protection discovery service can [profile your Azure Blob Storage](https://cloud.google.com/sensitive-data-protection/docs/profile-azure-blob-storage) data and identify vulnerabilities and misconfigurations that can expose sensitive data.
* [Cloud Infrastructure Entitlement Management (CIEM)](https://cloud.google.com/security-command-center/docs/ciem-overview) can analyze and generate misconfiguration findings for Azure role-assignments that grant principals excessive privileges beyond what they use. This capability is available in [Preview](https://cloud.google.com/products#product-launch-stages).
## Announcement
[Toxic Combinations](https://cloud.google.com/security-command-center/docs/toxic-combinations-overview) for Amazon Web Services (AWS) has been released to [General Availability](https://cloud.google.com/products#product-launch-stages).