Skip to content

Commit 55a4abf

Browse files
authored
Merge pull request #111889 from craigcaseyMSFT/vcraic0416
fix broken links from OPS report
2 parents d64f60d + 95efcc2 commit 55a4abf

10 files changed

+30
-30
lines changed

articles/media-services/previous/media-services-use-osmf-smooth-streaming-client-plugin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ package
328328
The Smooth Streaming for OSMF dynamic plugin is compatible with [Strobe Media Playback (SMP)](http://osmf.org/strobe_mediaplayback.html). You can use the SS for OSMF plugin to add Smooth Streaming content playback to SMP. To do this, copy "MSAdaptiveStreamingPlugin-v1.0.3-osmf2.0.swf" under a web server for HTTP load using the following steps:
329329

330330
1. Browse the [Strobe Media Playback setup page](http://osmf.org/dev/2.0gm/setup.html).
331-
2. Set the src to a Smooth Streaming source, (e.g. http://devplatem.vo.msecnd.net/Sintel/Sintel_H264.ism/manifest)
331+
2. Set the src to a Smooth Streaming source, (e.g. http:\//devplatem.vo.msecnd.net/Sintel/Sintel_H264.ism/manifest)
332332
3. Make the desired configuration changes and click Preview and Update.
333333

334334
**Note** Your content web server needs a valid crossdomain.xml.

articles/remote-rendering/how-tos/tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This article describes how to create such access token.
1919

2020
## Token service REST API
2121

22-
To create access tokens, the *Secure Token Service* provides a single REST API. The URL for the ARR STS service is [https://sts.mixedreality.azure.com](https://sts.mixedreality.azure.com).
22+
To create access tokens, the *Secure Token Service* provides a single REST API. The URL for the ARR STS service is https:\//sts.mixedreality.azure.com.
2323

2424
### 'Get token' request
2525

articles/security/develop/secure-develop.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -49,35 +49,35 @@ common web application vulnerabilities. Untrusted data is a vehicle for
4949
injection attacks. Input for your application includes parameters in the
5050
URL, input from the user, data from the database or from an API, and
5151
anything that is passed in that a user could potentially manipulate. An
52-
application should [validate](https://www.owasp.org/index.php/OWASP_Proactive_Controls_2016#4:_Validate_All_Inputs) that data is syntactically and semantically valid before the application uses the data in any way (including displaying it back to the user).
52+
application should [validate](https://owasp.org/www-project-proactive-controls/v3/en/c5-validate-inputs) that data is syntactically and semantically valid before the application uses the data in any way (including displaying it back to the user).
5353

5454
Validate input early in the data flow to ensure that only properly
55-
formed data enters the workflow. You dont want malformed data
55+
formed data enters the workflow. You don't want malformed data
5656
persisting in your database or triggering a malfunction in a downstream
5757
component.
5858

5959
Blacklisting and whitelisting are two general approaches to performing
6060
input syntax validation:
6161

6262
- Blacklisting attempts to check that a given user input doesn't
63-
contain known to be malicious content.
63+
contain "known to be malicious" content.
6464

6565
- Whitelisting attempts to check that a given user input matches a set
66-
of known good inputs. Character-based whitelisting is a form of
66+
of "known good" inputs. Character-based whitelisting is a form of
6767
whitelisting where an application checks that user input contains
68-
only known good characters or that input matches a known format.
68+
only "known good" characters or that input matches a known format.
6969
For example, this might involve checking that a username contains
7070
only alphanumeric characters or that it contains exactly two
7171
numbers.
7272

7373
Whitelisting is the preferred approach for building secure software.
74-
Blacklisting is prone to error because its impossible to think of a
74+
Blacklisting is prone to error because it's impossible to think of a
7575
complete list of potentially bad input.
7676

7777
Do this work on the server, not on the client side (or on the server and
7878
on the client side).
7979

80-
### Verify your applications outputs
80+
### Verify your application's outputs
8181

8282
Any output that you present either visually or within a document should
8383
always be encoded and escaped. [Escaping](https://www.owasp.org/index.php/Injection_Theory#Escaping_.28aka_Output_Encoding.29), also known as *output encoding*, is used to help ensure that untrusted data isn't a vehicle for an injection attack. Escaping, combined with data validation, provides layered defenses to increase security of the
@@ -114,7 +114,7 @@ See [removing standard server headers on Azure websites](https://azure.microsoft
114114

115115
### Segregate your production data
116116

117-
Your production data, or real data, should not be used for
117+
Your production data, or "real" data, should not be used for
118118
development, testing, or any other purpose than what the business
119119
intended. A masked ([anonymized](https://en.wikipedia.org/wiki/Data_anonymization)) dataset should be used for all development and testing.
120120

@@ -147,7 +147,7 @@ If your application allows [file uploads](https://www.owasp.org/index.php/Unrest
147147

148148
Antimalware protection helps identify and remove viruses, spyware, and
149149
other malicious software. You can install [Microsoft Antimalware](../fundamentals/antimalware.md)
150-
or a Microsoft partners endpoint protection solution ([Trend Micro](https://www.trendmicro.com/azure/),
150+
or a Microsoft partner's endpoint protection solution ([Trend Micro](https://www.trendmicro.com/azure/),
151151
[Broadcom](https://www.broadcom.com/products),
152152
[McAfee](https://www.mcafee.com/us/products.aspx), [Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10),
153153
and [Endpoint Protection](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-protection)).
@@ -167,7 +167,7 @@ like the Temporary Internet Files folder, in the case of Internet
167167
Explorer. When these pages are referred to again, the browser displays
168168
the pages from its cache. If sensitive information (address, credit card
169169
details, Social Security number, username) is displayed to the user, the
170-
information might be stored in the browsers cache and be retrievable by
170+
information might be stored in the browser's cache and be retrievable by
171171
examining the browser's cache or by simply pressing the browser's
172172
**Back** button.
173173

@@ -205,7 +205,7 @@ tools analyze source code or compiled versions of code when the code is
205205
not executing in order to find security flaws.
206206

207207
Perform DAST, preferably with the assistance of a security professional
208-
(a [penetration tester](../fundamentals/pen-testing.md) or vulnerability assessor). If a security professional isn't available, you can perform DAST yourself with a web proxy scanner and some training. Plug in a DAST scanner early on to ensure that you dont introduce obvious security issues into your code. See the [OWASP](https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools) site for a list of web application vulnerability scanners.
208+
(a [penetration tester](../fundamentals/pen-testing.md) or vulnerability assessor). If a security professional isn't available, you can perform DAST yourself with a web proxy scanner and some training. Plug in a DAST scanner early on to ensure that you don't introduce obvious security issues into your code. See the [OWASP](https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools) site for a list of web application vulnerability scanners.
209209

210210
### Perform fuzz testing
211211

articles/security/develop/secure-web-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -801,7 +801,7 @@ After you add the Azure AD configuration and secrets to Key Vault, users can be
801801
In the app code, this is handled by the Azure Active Directory Authentication Library (ADAL).
802802

803803
After the secrets are in Key Vault and the application has access to the secrets and the database, the application service can be reached through the gateway's
804-
application URL (https://GATEWAY_HASH.cloudapp.net), which you can get from its blade.
804+
application URL (https:\//GATEWAY_HASH.cloudapp.net), which you can get from its blade.
805805

806806
If, when you sign in to Azure AD, you get an error that says "User is not registered in the directory you're trying to log into," you need to add the user. To add the user, go to the **Users** tab of Azure AD and add the user manually by entering their details or invite the user by entering their email address as a guest user to Azure AD in the **Invite Guest** blade.
807807

@@ -976,7 +976,7 @@ After you fix some of the code errors found by the linting tools, you have more
976976

977977
### Find and fix vulnerabilities in app dependencies
978978

979-
To find and fix application dependencies, you can use [OWASP's Dependency Check](https://www.owasp.org/index.php/OWASP_Dependency_Check).
979+
To find and fix application dependencies, you can use [OWASP's Dependency Check](https://owasp.org/www-project-dependency-check/).
980980

981981
Safety is a similar application that checks dependencies. You can find it on [GitHub](https://github.com/pyupio/safety). Safety scans for vulnerabilities found in well-known vulnerability databases.
982982

articles/security/develop/threat-modeling-tool-communication-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ This rule works by returning an HTTP status code of 301 (permanent redirect) whe
144144
| **SDL Phase** | Build |
145145
| **Applicable Technologies** | Generic |
146146
| **Attributes** | N/A |
147-
| **References** | [OWASP HTTP Strict Transport Security Cheat Sheet](https://www.owasp.org/index.php/HTTP_Strict_Transport_Security_Cheat_Sheet) |
147+
| **References** | [OWASP HTTP Strict Transport Security Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.html) |
148148
| **Steps** | <p>HTTP Strict Transport Security (HSTS) is an opt-in security enhancement that is specified by a web application through the use of a special response header. Once a supported browser receives this header that browser will prevent any communications from being sent over HTTP to the specified domain and will instead send all communications over HTTPS. It also prevents HTTPS click through prompts on browsers.</p><p>To implement HSTS, the following response header has to be configured for a website globally, either in code or in config. Strict-Transport-Security: max-age=300; includeSubDomains HSTS addresses the following threats:</p><ul><li>User bookmarks or manually types `https://example.com` and is subject to a man-in-the-middle attacker: HSTS automatically redirects HTTP requests to HTTPS for the target domain</li><li>Web application that is intended to be purely HTTPS inadvertently contains HTTP links or serves content over HTTP: HSTS automatically redirects HTTP requests to HTTPS for the target domain</li><li>A man-in-the-middle attacker attempts to intercept traffic from a victim user using an invalid certificate and hopes the user will accept the bad certificate: HSTS does not allow a user to override the invalid certificate message</li></ul>|
149149

150150
## <a id="sqlserver-validation"></a>Ensure SQL server connection encryption and certificate validation
@@ -156,7 +156,7 @@ This rule works by returning an HTTP status code of 301 (permanent redirect) whe
156156
| **Applicable Technologies** | SQL Azure |
157157
| **Attributes** | SQL Version - V12 |
158158
| **References** | [Best Practices on Writing Secure Connection Strings for SQL Database](https://social.technet.microsoft.com/wiki/contents/articles/2951.windows-azure-sql-database-connection-security.aspx#best) |
159-
| **Steps** | <p>All communications between SQL Database and a client application are encrypted using Secure Sockets Layer (SSL) at all times. SQL Database doesnt support unencrypted connections. To validate certificates with application code or tools, explicitly request an encrypted connection and do not trust the server certificates. If your application code or tools do not request an encrypted connection, they will still receive encrypted connections</p><p>However, they may not validate the server certificates and thus will be susceptible to "man in the middle" attacks. To validate certificates with ADO.NET application code, set `Encrypt=True` and `TrustServerCertificate=False` in the database connection string. To validate certificates via SQL Server Management Studio, open the Connect to Server dialog box. Click Encrypt connection on the Connection Properties tab</p>|
159+
| **Steps** | <p>All communications between SQL Database and a client application are encrypted using Secure Sockets Layer (SSL) at all times. SQL Database doesn't support unencrypted connections. To validate certificates with application code or tools, explicitly request an encrypted connection and do not trust the server certificates. If your application code or tools do not request an encrypted connection, they will still receive encrypted connections</p><p>However, they may not validate the server certificates and thus will be susceptible to "man in the middle" attacks. To validate certificates with ADO.NET application code, set `Encrypt=True` and `TrustServerCertificate=False` in the database connection string. To validate certificates via SQL Server Management Studio, open the Connect to Server dialog box. Click Encrypt connection on the Connection Properties tab</p>|
160160

161161
## <a id="encrypted-sqlserver"></a>Force Encrypted communication to SQL server
162162

@@ -210,7 +210,7 @@ This rule works by returning an HTTP status code of 301 (permanent redirect) whe
210210
| **SDL Phase** | Build |
211211
| **Applicable Technologies** | Generic, Windows Phone |
212212
| **Attributes** | N/A |
213-
| **References** | [Certificate and Public Key Pinning](https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning#.Net) |
213+
| **References** | [Certificate and Public Key Pinning](https://owasp.org/www-community/controls/Certificate_and_Public_Key_Pinning) |
214214
| **Steps** | <p>Certificate pinning defends against Man-In-The-Middle (MITM) attacks. Pinning is the process of associating a host with their expected X509 certificate or public key. Once a certificate or public key is known or seen for a host, the certificate or public key is associated or 'pinned' to the host. </p><p>Thus, when an adversary attempts to do SSL MITM attack, during SSL handshake the key from attacker's server will be different from the pinned certificate's key, and the request will be discarded, thus preventing MITM Certificate pinning can be achieved by implementing ServicePointManager's `ServerCertificateValidationCallback` delegate.</p>|
215215

216216
### Example

0 commit comments

Comments
 (0)