Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 97327db

Browse files
committedNov 11, 2020
Links: Azure - security\develop
1 parent 85f58e3 commit 97327db

25 files changed

+169
-169
lines changed
 

‎articles/security/develop/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,6 @@ landingContent:
5050
- linkListType: learn
5151
links:
5252
- text: Top 5 security items
53-
url: https://docs.microsoft.com/learn/modules/top-5-security-items-to-consider
53+
url: /learn/modules/top-5-security-items-to-consider
5454
- text: Secure your cloud applications in Azure
55-
url: https://docs.microsoft.com/learn/paths/secure-your-cloud-apps
55+
url: /learn/paths/secure-your-cloud-apps

‎articles/security/develop/secure-deploy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.workload: na
1818

1919
# Deploy secure applications on Azure
2020
In this article we present security activities and controls to consider when you deploy applications for the cloud. Security questions and concepts to consider during the release and response phases of the Microsoft [Security Development Lifecycle
21-
(SDL)](https://msdn.microsoft.com/library/windows/desktop/84aed186-1d75-4366-8e61-8d258746bopq.aspx) are covered. The goal is to help you define activities and Azure services that you can use to deploy a more secure application.
21+
(SDL)](/previous-versions/windows/desktop/cc307891(v=msdn.10)) are covered. The goal is to help you define activities and Azure services that you can use to deploy a more secure application.
2222

2323
The following SDL phases are covered in this article:
2424

@@ -54,7 +54,7 @@ a known vulnerability at a central location versus securing each
5454
individual web application.
5555

5656
The [Azure Application Gateway
57-
WAF](../../application-gateway/waf-overview.md)
57+
WAF](../../web-application-firewall/ag/ag-overview.md)
5858
provides centralized protection of your web applications from common
5959
exploits and vulnerabilities. The WAF is based on rules from the [OWASP
6060
core rule
@@ -118,7 +118,7 @@ designed to help you continuously improve performance and usability.
118118
#### Azure Security Center
119119

120120
[Azure Security
121-
Center](../../security-center/security-center-intro.md)
121+
Center](../../security-center/security-center-introduction.md)
122122
helps you prevent, detect, and respond to threats with increased
123123
visibility into (and control over) the security of your Azure resources,
124124
including web applications. Azure Security Center helps detect threats
@@ -127,7 +127,7 @@ solutions.
127127

128128
Security Center’s Free tier offers limited security for your Azure
129129
resources only. The [Security Center Standard
130-
tier](../../security-center/security-center-onboarding.md)
130+
tier](../../security-center/security-center-get-started.md)
131131
extends these capabilities to on-premises resources and other clouds.
132132
Security Center Standard helps you:
133133

@@ -140,4 +140,4 @@ Security Center Standard helps you:
140140
In the following articles, we recommend security controls and activities that can help you design and develop secure applications.
141141

142142
- [Design secure applications](secure-design.md)
143-
- [Develop secure applications](secure-develop.md)
143+
- [Develop secure applications](secure-develop.md)

‎articles/security/develop/secure-design.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.workload: na
1818

1919
# Design secure applications on Azure
2020
In this article we present security activities and controls to consider when you design applications for the cloud. Training resources along with security questions and concepts to consider during the requirements and design phases of the Microsoft [Security Development Lifecycle
21-
(SDL)](https://msdn.microsoft.com/library/windows/desktop/84aed186-1d75-4366-8e61-8d258746bopq.aspx) are covered. The goal is to help you define activities and Azure services that you can use to design a more secure application.
21+
(SDL)](/previous-versions/windows/desktop/cc307891(v=msdn.10)) are covered. The goal is to help you define activities and Azure services that you can use to design a more secure application.
2222

2323
The following SDL phases are covered in this article:
2424

@@ -50,22 +50,22 @@ with security best practices on Azure:
5050
started using the Azure platform for their development needs.
5151

5252
- [SDKs and
53-
tools](https://docs.microsoft.com/azure/index?pivot=sdkstools)
53+
tools](../../index.yml?pivot=sdkstools)
5454
describes the tools that are available on Azure.
5555

5656
- [Azure DevOps
57-
Services](https://docs.microsoft.com/azure/devops/)
57+
Services](/azure/devops/)
5858
provides development collaboration tools. The tools include
5959
high-performance pipelines, free Git repositories, configurable
6060
Kanban boards, and extensive automated and cloud-based load testing.
6161
The [DevOps Resource
62-
Center](https://docs.microsoft.com/azure/devops/learn/) combines our
62+
Center](/azure/devops/learn/) combines our
6363
resources for learning DevOps practices, Git version control, agile
6464
methods, how we work with DevOps at Microsoft, and how you can
6565
assess your own DevOps progression.
6666

6767
- [Top 5 security items to consider before pushing to
68-
production](https://docs.microsoft.com/learn/modules/top-5-security-items-to-consider/index?WT.mc_id=Learn-Blog-tajanca)
68+
production](/learn/modules/top-5-security-items-to-consider/index?WT.mc_id=Learn-Blog-tajanca)
6969
shows you how to help secure your web applications on Azure and
7070
protect your apps against the most common and dangerous web
7171
application attacks.
@@ -108,7 +108,7 @@ Ask security questions like:
108108
- Does my application contain sensitive data?
109109

110110
- Does my application collect or store data that requires me to adhere
111-
to industry standards and compliance programs like the [Federal Financial Institution Examination Council (FFIEC)](../blueprints/ffiec-analytics-overview.md) or the [Payment Card Industry Data Security Standards (PCI DSS)](../blueprints/pcidss-analytics-overview.md)?
111+
to industry standards and compliance programs like the [Federal Financial Institution Examination Council (FFIEC)](/previous-versions/azure/security/blueprints/ffiec-analytics-overview) or the [Payment Card Industry Data Security Standards (PCI DSS)](/previous-versions/azure/security/blueprints/pcidss-analytics-overview)?
112112

113113
- Does my application collect or contain sensitive personal or
114114
customer data that can be used, either on its own or with other
@@ -160,7 +160,7 @@ Awareness of these security risks can help you make requirement and
160160
design decisions that minimize these risks in your application.
161161

162162
Thinking about security controls to prevent breaches is important.
163-
However, you also want to [assume a breach](https://docs.microsoft.com/azure/devops/learn/devops-at-microsoft/security-in-devops)
163+
However, you also want to [assume a breach](/azure/devops/learn/devops-at-microsoft/security-in-devops)
164164
will occur. Assuming a breach helps answer some important questions
165165
about security in advance, so they don't have to be answered in an
166166
emergency:
@@ -227,10 +227,10 @@ environments (IDEs) and editors that have advanced debugging
227227
capabilities and built-in Azure support.
228228

229229
Microsoft offers a variety of [languages, frameworks, and
230-
tools](https://docs.microsoft.com/azure/index?pivot=sdkstools&panel=sdkstools-all)
230+
tools](../../index.yml?panel=sdkstools-all&pivot=sdkstools)
231231
that you can use to develop applications on Azure. An example is [Azure
232232
for .NET and .NET Core
233-
developers](https://docs.microsoft.com/dotnet/azure/). For each language
233+
developers](/dotnet/azure/). For each language
234234
and framework that we offer, you’ll find quickstarts, tutorials, and API
235235
references to help you get started fast.
236236

@@ -303,9 +303,9 @@ situation.
303303

304304
| Threat | Security property | Potential Azure platform mitigation |
305305
| ---------------------- | --------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
306-
| Spoofing | Authentication | [Require HTTPS connections](https://docs.microsoft.com/aspnet/core/security/enforcing-ssl?view=aspnetcore-2.1&tabs=visual-studio). |
307-
| Tampering | Integrity | Validate SSL/TLS certificates. Applications that use SSL/TLS must fully verify the X.509 certificates of the entities they connect to. Use Azure Key Vault certificates to [manage your x509 certificates](../../key-vault/about-keys-secrets-and-certificates.md#key-vault-certificates). |
308-
| Repudiation | Non-repudiation | Enable Azure [monitoring and diagnostics](https://docs.microsoft.com/azure/architecture/best-practices/monitoring).|
306+
| Spoofing | Authentication | [Require HTTPS connections](/aspnet/core/security/enforcing-ssl?tabs=visual-studio&view=aspnetcore-2.1). |
307+
| Tampering | Integrity | Validate SSL/TLS certificates. Applications that use SSL/TLS must fully verify the X.509 certificates of the entities they connect to. Use Azure Key Vault certificates to [manage your x509 certificates](../../key-vault/general/about-keys-secrets-certificates.md#key-vault-certificates). |
308+
| Repudiation | Non-repudiation | Enable Azure [monitoring and diagnostics](/azure/architecture/best-practices/monitoring).|
309309
| Information Disclosure | Confidentiality | Encrypt sensitive data [at rest](../fundamentals/encryption-atrest.md) and [in transit](../fundamentals/data-encryption-best-practices.md#protect-data-in-transit). |
310310
| Denial of Service | Availability | Monitor performance metrics for potential denial of service conditions. Implement connection filters. [Azure DDoS protection](../../virtual-network/ddos-protection-overview.md#next-steps), combined with application design best practices, provides defense against DDoS attacks.|
311311
| Elevation of Privilege | Authorization | Use Azure Active Directory <span class="underline"> </span> [Privileged Identity Management](../../active-directory/privileged-identity-management/pim-configure.md).|
@@ -398,7 +398,7 @@ AD)](../../active-directory/fundamentals/active-directory-whatis.md)
398398
is the Azure solution for identity and access management. These Azure AD
399399
tools and services help with secure development:
400400

401-
- [Microsoft identity platform](/azure/active-directory/develop/)
401+
- [Microsoft identity platform](../../active-directory/develop/index.yml)
402402
is a set of components that developers use to build apps that
403403
securely sign in users. The platform assists developers who are building
404404
single-tenant, line-of-business (LOB) apps and developers who are
@@ -433,7 +433,7 @@ is required for each role, you limit the risk of a security issue
433433
occurring.
434434

435435
Ensure that your application enforces [least
436-
privilege](https://docs.microsoft.com/windows-server/identity/ad-ds/plan/security-best-practices/implementing-least-privilege-administrative-models#in-applications)
436+
privilege](/windows-server/identity/ad-ds/plan/security-best-practices/implementing-least-privilege-administrative-models#in-applications)
437437
throughout its access patterns.
438438

439439
> [!NOTE]
@@ -452,7 +452,7 @@ to:
452452
### Require re-authentication for important transactions
453453

454454
[Cross-site request
455-
forgery](https://docs.microsoft.com/aspnet/core/security/anti-request-forgery?view=aspnetcore-2.1)
455+
forgery](/aspnet/core/security/anti-request-forgery?view=aspnetcore-2.1)
456456
(also known as *XSRF* or *CSRF*) is an attack against web-hosted apps in
457457
which a malicious web app influences the interaction between a client
458458
browser and a web app that trusts that browser. Cross-site request
@@ -556,12 +556,12 @@ identities for Azure resources, your Azure web app can access secret
556556
configuration values easily and securely without storing any secrets in
557557
your source control or configuration. To learn more, see [Manage secrets
558558
in your server apps with Azure Key
559-
Vault](https://docs.microsoft.com/learn/modules/manage-secrets-with-azure-key-vault/).
559+
Vault](/learn/modules/manage-secrets-with-azure-key-vault/).
560560

561561
### Implement fail-safe measures
562562

563563
Your application must be able to handle
564-
[errors](https://docs.microsoft.com/dotnet/standard/exceptions/) that
564+
[errors](/dotnet/standard/exceptions/) that
565565
occur during execution in a consistent manner. The application should
566566
catch all errors and either fail safe or closed.
567567

@@ -576,7 +576,7 @@ further attack systems and maintain persistence.
576576
### Take advantage of error and exception handling
577577

578578
Implementing correct error and [exception
579-
handling](https://docs.microsoft.com/dotnet/standard/exceptions/best-practices-for-exceptions)
579+
handling](/dotnet/standard/exceptions/best-practices-for-exceptions)
580580
is an important part of defensive coding. Error and exception handling
581581
are critical to making a system reliable and secure. Mistakes in error
582582
handling can lead to different kinds of security vulnerabilities, such
@@ -587,7 +587,7 @@ Ensure that:
587587

588588
- You handle exceptions in a centralized manner to avoid duplicated
589589
[try/catch
590-
blocks](https://docs.microsoft.com/dotnet/standard/exceptions/how-to-use-the-try-catch-block-to-catch-exceptions)
590+
blocks](/dotnet/standard/exceptions/how-to-use-the-try-catch-block-to-catch-exceptions)
591591
in the code.
592592

593593
- All unexpected behaviors are handled inside the application.
@@ -607,7 +607,7 @@ organizations.
607607

608608
### Use logging and alerting
609609

610-
[Log](https://docs.microsoft.com/aspnet/core/fundamentals/logging/?view=aspnetcore-2.1)
610+
[Log](/aspnet/core/fundamentals/logging/?view=aspnetcore-2.1)
611611
your security issues for security investigations and trigger alerts
612612
about issues to ensure that people know about problems in a timely
613613
manner. Enable auditing and logging on all components. Audit logs should
@@ -633,4 +633,4 @@ you to gather operations data, like who is accessing the application.
633633
In the following articles, we recommend security controls and activities that can help you develop and deploy secure applications.
634634

635635
- [Develop secure applications](secure-develop.md)
636-
- [Deploy secure applications](secure-deploy.md)
636+
- [Deploy secure applications](secure-deploy.md)

‎articles/security/develop/secure-dev-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ the development lifecycle helps you catch issues early, and it helps you
5454
reduce your development costs.
5555

5656
We follow the phases of the Microsoft [Security Development Lifecycle
57-
(SDL)](https://msdn.microsoft.com/library/windows/desktop/84aed186-1d75-4366-8e61-8d258746bopq.aspx)
57+
(SDL)](/previous-versions/windows/desktop/cc307891(v=msdn.10))
5858
to introduce activities and Azure services that you can use to fulfill
5959
secure software development practices in each phase of the lifecycle.
6060

@@ -90,7 +90,7 @@ Use the following resources to learn more about developing secure
9090
applications and to help secure your applications on Azure:
9191

9292
[Microsoft Security Development Lifecycle
93-
(SDL)](https://msdn.microsoft.com/library/windows/desktop/84aed186-1d75-4366-8e61-8d258746bopq.aspx)
93+
(SDL)](/previous-versions/windows/desktop/cc307891(v=msdn.10))
9494
– The SDL is a software development process from Microsoft that helps
9595
developers build more secure software. It helps you address security
9696
compliance requirements while reducing development costs.
@@ -135,4 +135,4 @@ In the following articles, we recommend security controls and activities that ca
135135

136136
- [Design secure applications](secure-design.md)
137137
- [Develop secure applications](secure-develop.md)
138-
- [Deploy secure applications](secure-deploy.md)
138+
- [Deploy secure applications](secure-deploy.md)

‎articles/security/develop/secure-develop.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.workload: na
1818

1919
# Develop secure applications on Azure
2020
In this article we present security activities and controls to consider when you develop applications for the cloud. Security questions and concepts to consider during the implementation and verification phases of the Microsoft [Security Development Lifecycle
21-
(SDL)](https://msdn.microsoft.com/library/windows/desktop/84aed186-1d75-4366-8e61-8d258746bopq.aspx) are covered. The goal is to help you define activities and Azure services that you can use to develop a more secure application.
21+
(SDL)](/previous-versions/windows/desktop/cc307891(v=msdn.10)) are covered. The goal is to help you define activities and Azure services that you can use to develop a more secure application.
2222

2323
The following SDL phases are covered in this article:
2424

@@ -34,7 +34,7 @@ misuse of your application.
3434

3535
### Perform code reviews
3636

37-
Before you check in code, conduct [code reviews](https://docs.microsoft.com/azure/devops/learn/devops-at-microsoft/code-reviews-not-primarily-finding-bugs) to increase overall code quality and reduce the risk of creating bugs. You can use [Visual Studio](https://docs.microsoft.com/azure/devops/repos/tfvc/get-code-reviewed-vs?view=vsts) to manage the code review process.
37+
Before you check in code, conduct [code reviews](/azure/devops/learn/devops-at-microsoft/code-reviews-not-primarily-finding-bugs) to increase overall code quality and reduce the risk of creating bugs. You can use [Visual Studio](/azure/devops/repos/tfvc/get-code-reviewed-vs?view=vsts) to manage the code review process.
3838

3939
### Perform static code analysis
4040

@@ -149,8 +149,8 @@ Antimalware protection helps identify and remove viruses, spyware, and
149149
other malicious software. You can install [Microsoft Antimalware](../fundamentals/antimalware.md)
150150
or a Microsoft partner's endpoint protection solution ([Trend Micro](https://www.trendmicro.com/azure/),
151151
[Broadcom](https://www.broadcom.com/products),
152-
[McAfee](https://www.mcafee.com/us/products.aspx), [Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10),
153-
and [Endpoint Protection](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-protection)).
152+
[McAfee](https://www.mcafee.com/us/products.aspx), [Windows Defender](/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10),
153+
and [Endpoint Protection](/configmgr/protect/deploy-use/endpoint-protection)).
154154

155155
[Microsoft Antimalware](../fundamentals/antimalware.md)
156156
includes features like real-time protection, scheduled scanning, malware
@@ -257,4 +257,4 @@ of AzSK, which makes SVTs available as a Visual Studio extension.
257257
In the following articles, we recommend security controls and activities that can help you design and deploy secure applications.
258258

259259
- [Design secure applications](secure-design.md)
260-
- [Deploy secure applications](secure-deploy.md)
260+
- [Deploy secure applications](secure-deploy.md)

0 commit comments

Comments
 (0)
Please sign in to comment.