You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/develop/secure-deploy.md
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.workload: na
18
18
19
19
# Deploy secure applications on Azure
20
20
In this article we present security activities and controls to consider when you deploy applications for the cloud. Security questions and concepts to consider during the release and response phases of the Microsoft [Security Development Lifecycle
21
-
(SDL)](https://msdn.microsoft.com/library/windows/desktop/84aed186-1d75-4366-8e61-8d258746bopq.aspx) are covered. The goal is to help you define activities and Azure services that you can use to deploy a more secure application.
21
+
(SDL)](/previous-versions/windows/desktop/cc307891(v=msdn.10)) are covered. The goal is to help you define activities and Azure services that you can use to deploy a more secure application.
22
22
23
23
The following SDL phases are covered in this article:
24
24
@@ -54,7 +54,7 @@ a known vulnerability at a central location versus securing each
Copy file name to clipboardExpand all lines: articles/security/develop/secure-design.md
+21-21Lines changed: 21 additions & 21 deletions
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.workload: na
18
18
19
19
# Design secure applications on Azure
20
20
In this article we present security activities and controls to consider when you design applications for the cloud. Training resources along with security questions and concepts to consider during the requirements and design phases of the Microsoft [Security Development Lifecycle
21
-
(SDL)](https://msdn.microsoft.com/library/windows/desktop/84aed186-1d75-4366-8e61-8d258746bopq.aspx) are covered. The goal is to help you define activities and Azure services that you can use to design a more secure application.
21
+
(SDL)](/previous-versions/windows/desktop/cc307891(v=msdn.10)) are covered. The goal is to help you define activities and Azure services that you can use to design a more secure application.
22
22
23
23
The following SDL phases are covered in this article:
24
24
@@ -50,22 +50,22 @@ with security best practices on Azure:
50
50
started using the Azure platform for their development needs.
shows you how to help secure your web applications on Azure and
70
70
protect your apps against the most common and dangerous web
71
71
application attacks.
@@ -108,7 +108,7 @@ Ask security questions like:
108
108
- Does my application contain sensitive data?
109
109
110
110
- Does my application collect or store data that requires me to adhere
111
-
to industry standards and compliance programs like the [Federal Financial Institution Examination Council (FFIEC)](../blueprints/ffiec-analytics-overview.md) or the [Payment Card Industry Data Security Standards (PCI DSS)](../blueprints/pcidss-analytics-overview.md)?
111
+
to industry standards and compliance programs like the [Federal Financial Institution Examination Council (FFIEC)](/previous-versions/azure/security/blueprints/ffiec-analytics-overview) or the [Payment Card Industry Data Security Standards (PCI DSS)](/previous-versions/azure/security/blueprints/pcidss-analytics-overview)?
112
112
113
113
- Does my application collect or contain sensitive personal or
114
114
customer data that can be used, either on its own or with other
@@ -160,7 +160,7 @@ Awareness of these security risks can help you make requirement and
160
160
design decisions that minimize these risks in your application.
161
161
162
162
Thinking about security controls to prevent breaches is important.
163
-
However, you also want to [assume a breach](https://docs.microsoft.com/azure/devops/learn/devops-at-microsoft/security-in-devops)
163
+
However, you also want to [assume a breach](/azure/devops/learn/devops-at-microsoft/security-in-devops)
164
164
will occur. Assuming a breach helps answer some important questions
165
165
about security in advance, so they don't have to be answered in an
166
166
emergency:
@@ -227,10 +227,10 @@ environments (IDEs) and editors that have advanced debugging
227
227
capabilities and built-in Azure support.
228
228
229
229
Microsoft offers a variety of [languages, frameworks, and
| Tampering | Integrity | Validate SSL/TLS certificates. Applications that use SSL/TLS must fully verify the X.509 certificates of the entities they connect to. Use Azure Key Vault certificates to [manage your x509 certificates](../../key-vault/about-keys-secrets-and-certificates.md#key-vault-certificates). |
308
-
| Repudiation | Non-repudiation | Enable Azure [monitoring and diagnostics](https://docs.microsoft.com/azure/architecture/best-practices/monitoring).|
| Tampering | Integrity | Validate SSL/TLS certificates. Applications that use SSL/TLS must fully verify the X.509 certificates of the entities they connect to. Use Azure Key Vault certificates to [manage your x509 certificates](../../key-vault/general/about-keys-secrets-certificates.md#key-vault-certificates). |
308
+
| Repudiation | Non-repudiation | Enable Azure [monitoring and diagnostics](/azure/architecture/best-practices/monitoring).|
309
309
| Information Disclosure | Confidentiality | Encrypt sensitive data [at rest](../fundamentals/encryption-atrest.md) and [in transit](../fundamentals/data-encryption-best-practices.md#protect-data-in-transit). |
310
310
| Denial of Service | Availability | Monitor performance metrics for potential denial of service conditions. Implement connection filters. [Azure DDoS protection](../../virtual-network/ddos-protection-overview.md#next-steps), combined with application design best practices, provides defense against DDoS attacks.|
311
311
| Elevation of Privilege | Authorization | Use Azure Active Directory <spanclass="underline"> </span> [Privileged Identity Management](../../active-directory/privileged-identity-management/pim-configure.md).|
Copy file name to clipboardExpand all lines: articles/security/develop/secure-develop.md
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.workload: na
18
18
19
19
# Develop secure applications on Azure
20
20
In this article we present security activities and controls to consider when you develop applications for the cloud. Security questions and concepts to consider during the implementation and verification phases of the Microsoft [Security Development Lifecycle
21
-
(SDL)](https://msdn.microsoft.com/library/windows/desktop/84aed186-1d75-4366-8e61-8d258746bopq.aspx) are covered. The goal is to help you define activities and Azure services that you can use to develop a more secure application.
21
+
(SDL)](/previous-versions/windows/desktop/cc307891(v=msdn.10)) are covered. The goal is to help you define activities and Azure services that you can use to develop a more secure application.
22
22
23
23
The following SDL phases are covered in this article:
24
24
@@ -34,7 +34,7 @@ misuse of your application.
34
34
35
35
### Perform code reviews
36
36
37
-
Before you check in code, conduct [code reviews](https://docs.microsoft.com/azure/devops/learn/devops-at-microsoft/code-reviews-not-primarily-finding-bugs) to increase overall code quality and reduce the risk of creating bugs. You can use [Visual Studio](https://docs.microsoft.com/azure/devops/repos/tfvc/get-code-reviewed-vs?view=vsts) to manage the code review process.
37
+
Before you check in code, conduct [code reviews](/azure/devops/learn/devops-at-microsoft/code-reviews-not-primarily-finding-bugs) to increase overall code quality and reduce the risk of creating bugs. You can use [Visual Studio](/azure/devops/repos/tfvc/get-code-reviewed-vs?view=vsts) to manage the code review process.
38
38
39
39
### Perform static code analysis
40
40
@@ -149,8 +149,8 @@ Antimalware protection helps identify and remove viruses, spyware, and
149
149
other malicious software. You can install [Microsoft Antimalware](../fundamentals/antimalware.md)
150
150
or a Microsoft partner's endpoint protection solution ([Trend Micro](https://www.trendmicro.com/azure/),
0 commit comments