Skip to content

Commit bc5aee4

Browse files
authored
Merge pull request #251866 from MicrosoftDocs/main
9/18/2023 AM Publish
2 parents acd3cae + 0683bf1 commit bc5aee4

File tree

77 files changed

+479
-274
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+479
-274
lines changed

articles/active-directory/develop/v2-protocols-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -321,7 +321,7 @@ To sign out a user, perform both of these operations:
321321
* Redirect the user's user-agent to the Microsoft identity platform's logout URI
322322
* Clear your app's cookies or otherwise end the user's session in your application.
323323

324-
If you fail to perform either operation, the user may remain authenticated and not be prompted to sign-in the next time they user your app.
324+
If you fail to perform either operation, the user may remain authenticated and not be prompted to sign-in the next time they use your app.
325325

326326
Redirect the user-agent to the `end_session_endpoint` as shown in the OpenID Connect configuration document. The `end_session_endpoint` supports both HTTP GET and POST requests.
327327

articles/active-directory/external-identities/add-users-administrator.md

Lines changed: 2 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -126,22 +126,14 @@ If you need to manually add B2B collaboration users to a group after the user wa
126126
4. Select a group (or select **New group** to create a new one). It's a good idea to include in the group description that the group contains B2B guest users.
127127
5. Under **Manage**, select **Members**.
128128
6. Select **Add members**.
129-
7. Complete one of the following set of steps:
129+
7. Complete the following set of steps:
130130

131131
- *If the guest user is already in the directory:*
132132

133133
a. On the **Add members** page, start typing the name or email address of the guest user.
134134

135135
b. In the search results, choose the user, and then choose **Select**.
136136

137-
- *If the guest user isn't currently in the directory:*
138-
139-
a. On the **Add members** page, type the user's full email address in the search box, type a **Personal message** (optional), and then choose **Invite** to send an invitation.
140-
141-
b. Choose **Select**.
142-
143-
c. Now add the user to the group: On the **Members** page, choose **Add members**. Type the user's name or email address in the search box, choose the user in the results, and then choose **Select**.
144-
145137
You can also use dynamic groups with Azure AD B2B collaboration. For more information, see [Dynamic groups and Azure Active Directory B2B collaboration](use-dynamic-groups.md).
146138

147139
## Add guest users to an application
@@ -154,7 +146,7 @@ To add B2B collaboration users to an application, follow these steps:
154146
5. Under **Manage**, select **Users and groups**.
155147
6. Select **Add user/group**.
156148
7. On the **Add Assignment** page, select the link under **Users**.
157-
8. Complete one of the following set of steps:
149+
8. Complete the following set of steps:
158150

159151
- *If the guest user is already in the directory:*
160152

@@ -164,16 +156,6 @@ To add B2B collaboration users to an application, follow these steps:
164156

165157
c. On the **Add Assignment** page, choose **Assign** to add the user to the app.
166158

167-
- *If the guest user isn't currently in the directory:*
168-
169-
a. On the **Users** page, type the user's full email address in the search box, type a **Personal message** (optional), and then choose **Invite**.
170-
171-
b. Choose **Select**.
172-
173-
c. Now add the invited user to the application: On the **Add Assignment** page, choose the link under **Users**. Type the invited user's name or email address in the search box, choose the user in the results, and then choose **Select**.
174-
175-
d. On the **Add Assignment** page, choose **Assign**.
176-
177159
9. The guest user appears in the application's **Users and groups** list with the assigned role of **Default Access**. If the application provides different roles and you want to change the user's role, do the following:
178160

179161
a. Select the check box next to the guest user, and then select the **Edit** button.

articles/active-directory/standards/pci-dss-guidance.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ ms.collection:
1717

1818
# Azure Active Directory PCI-DSS guidance
1919

20-
The Payment Card Industry Security Standards Council (PCI SSC) is responsible for developing and promoting data security standards and resources, including the Payment Card Industry Data Security Standard (PCI-DSS), to ensure the security of payment transactions. To achieve PCI compliance, organizations using Azure Active Directory (Azure AD) can refer to guidance in this document. However, it is the responsibility of the organizations to ensure their PCI compliance. Their IT teams, SecOps teams, and Solutions Architects are responsible for creating and maintaining secure systems, products, and networks that handle, process, and store payment card information.
20+
The Payment Card Industry Security Standards Council (PCI SSC) is responsible for developing and promoting data security standards and resources, including the Payment Card Industry Data Security Standard (PCI-DSS), to ensure the security of payment transactions. To achieve PCI compliance, organizations using Azure Active Directory (Azure AD) can refer to guidance in this document. However, it's the responsibility of the organizations to ensure their PCI compliance. Their IT teams, SecOps teams, and Solutions Architects are responsible for creating and maintaining secure systems, products, and networks that handle, process, and store payment card information.
2121

22-
While Azure AD helps meet some PCI-DSS control requirements, and provides modern identity and access protocols for cardholder data environment (CDE) resources, it should not be the sole mechanism for protecting cardholder data. Therefore, review this document set and all PCI-DSS requirements to establish a comprehensive security program that preserves customer trust. For a complete list of requirements, please visit the official PCI Security Standards Council website at pcisecuritystandards.org: [Official PCI Security Standards Council Site](https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf)
22+
While Azure AD helps meet some PCI-DSS control requirements, and provides modern identity and access protocols for cardholder data environment (CDE) resources, it shouldn't be the sole mechanism for protecting cardholder data. Therefore, review this document set and all PCI-DSS requirements to establish a comprehensive security program that preserves customer trust. For a complete list of requirements, visit the official PCI Security Standards Council website at pcisecuritystandards.org: [Official PCI Security Standards Council Site](https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf)
2323

2424
## PCI requirements for controls
2525

26-
The global PCI-DSS v4.0 establishes a baseline of technical and operational standards for protecting account data. It was developed to encourage and enhance payment card account data security and facilitate the broad adoption of consistent data security measures, globally. It provides a baseline of technical and operational requirements designed to protect account data. While specifically designed to focus on environments with payment card account data, PCI-DSS can also be used to protect against threats and secure other elements in the payment ecosystem.
26+
The global PCI-DSS v4.0 establishes a baseline of technical and operational standards for protecting account data. It "was developed to encourage and enhance payment card account data security and facilitate the broad adoption of consistent data security measures, globally. It provides a baseline of technical and operational requirements designed to protect account data. While designed to focus on environments with payment card account data, PCI-DSS can also be used to protect against threats and secure other elements in the payment ecosystem."
2727

2828
## Azure AD configuration and PCI-DSS
2929

@@ -41,11 +41,11 @@ PCI-DSS requirements **3**, **4**, **9**, and **12** aren't addressed or met by
4141

4242
|PCI Data Security Standard - High Level Overview|Azure AD recommended PCI-DSS controls|
4343
|-|-|
44-
|Build and Maintain Secure Network and Systems|[1. Install and Maintain Network Security Controls]() </br> [2. Apply Secure Configurations to All System Components]()|
44+
|Build and Maintain Secure Network and Systems|[1. Install and Maintain Network Security Controls](pci-requirement-1.md) </br> [2. Apply Secure Configurations to All System Components](pci-requirement-2.md)|
4545
|Protect Account Data|3. Protect Stored Account Data </br> 4. Protect Cardholder Data with Strong Cryptography During Transmission Over Public Networks|
46-
|Maintain a Vulnerability Management Program|[5. Protect All Systems and Networks from Malicious Software]() </br> [6. Develop and Maintain Secure Systems and Software]()|
47-
|Implement Strong Access Control Measures|[7. Restrict Access to System Components and Cardholder Data by Business Need to Know]() </br> [8. Identify and Authenticate Access to System Components]() </br> 9. Restrict Physical Access to System Components and Cardholder Data|
48-
|Regularly Monitor and Test Networks|[10. Log and Monitor All Access to System Components and Cardholder Data]() </br> [11. Test Security of Systems and Networks Regularly]()|
46+
|Maintain a Vulnerability Management Program|[5. Protect All Systems and Networks from Malicious Software](pci-requirement-5.md) </br> [6. Develop and Maintain Secure Systems and Software](pci-requirement-6.md)|
47+
|Implement Strong Access Control Measures|[7. Restrict Access to System Components and Cardholder Data by Business Need to Know](pci-requirement-7.md) </br> [8. Identify and Authenticate Access to System Components](pci-requirement-8.md) </br> 9. Restrict Physical Access to System Components and Cardholder Data|
48+
|Regularly Monitor and Test Networks|[10. Log and Monitor All Access to System Components and Cardholder Data](pci-requirement-10.md) </br> [11. Test Security of Systems and Networks Regularly](pci-requirement-11.md)|
4949
|Maintain an Information Security Policy|12. Support Information Security with Organizational Policies and Programs|
5050

5151
## PCI-DSS applicability
@@ -62,7 +62,7 @@ CHD consists of:
6262
SAD consists of security-related information used to authenticate cardholders and/or authorize payment card transactions. SAD includes, but isn't limited to:
6363

6464
* **Full track data** - magnetic stripe or chip equivalent
65-
* **Card verification codes/values** - also referred to as the card validation code (CVC), or value (CVV). Its the three- or four-digit value on the front or back of the payment card. Its also referred to as CAV2, CVC2, CVN2, CVV2 or CID, determined by the participating payment brands (PPB).
65+
* **Card verification codes/values** - also referred to as the card validation code (CVC), or value (CVV). It's the three- or four-digit value on the front or back of the payment card. It's also referred to as CAV2, CVC2, CVN2, CVV2 or CID, determined by the participating payment brands (PPB).
6666
* **PIN** - personal identification number
6767
* **PIN blocks** - an encrypted representation of the PIN used in a debit or credit card transaction. It ensures the secure transmission of sensitive information during a transaction
6868

@@ -77,11 +77,11 @@ Protecting the CDE is essential to the security and confidentiality of customer
7777

7878
PCI audit scope relates to the systems, networks, and processes in the storage, processing, or transmission of CHD and/or SAD. If Account Data is stored, processed, or transmitted in a cloud environment, PCI-DSS applies to that environment and compliance typically involves validation of the cloud environment and the usage of it. There are five fundamental elements in scope for a PCI audit:
7979

80-
* **Cardholder data environment (CDE)** - the area where CHD, and/or SAD, is stored, processed, or transmitted. It includes an organizations components that touch CHD, such as networks, and network components, databases, servers, applications, and payment terminals.
80+
* **Cardholder data environment (CDE)** - the area where CHD, and/or SAD, is stored, processed, or transmitted. It includes an organization's components that touch CHD, such as networks, and network components, databases, servers, applications, and payment terminals.
8181
* **People** - with access to the CDE, such as employees, contractors, and third-party service providers, are in the scope of a PCI audit.
8282
* **Processes** - that involve CHD, such as authorization, authentication, encryption and storage of account data in any format, are within the scope of a PCI audit.
8383
* **Technology** - that processes, stores, or transmits CHD, including hardware such as printers, and multi-function devices that scan, print and fax, end-user devices such as computers, laptops workstations, administrative workstations, tablets and mobile devices, software, and other IT systems, are in the scope of a PCI audit.
84-
* **System components** – that might not store, process, or transmit CHD/SAD but have unrestricted connectivity to system components that store, process, or transmit CHD/SAD, or that could effect the security of the CDE.
84+
* **System components** – that might not store, process, or transmit CHD/SAD but have unrestricted connectivity to system components that store, process, or transmit CHD/SAD, or that could affect the security of the CDE.
8585

8686
If PCI scope is minimized, organizations can effectively reduce the effects of security incidents and lower the risk of data breaches. Segmentation can be a valuable strategy for reducing the size of the PCI CDE, resulting in reduced compliance costs and overall benefits for the organization including but not limited to:
8787

@@ -92,7 +92,7 @@ If PCI scope is minimized, organizations can effectively reduce the effects of s
9292

9393
## Strategies to reduce PCI audit scope
9494

95-
An organizations definition of its CDE determines PCI audit scope. Organizations document and communicate this definition to the PCI-DSS Qualified Security Assessor (QSA) performing the audit. The QSA assesses controls for the CDE to determine compliance.
95+
An organization's definition of its CDE determines PCI audit scope. Organizations document and communicate this definition to the PCI-DSS Qualified Security Assessor (QSA) performing the audit. The QSA assesses controls for the CDE to determine compliance.
9696
Adherence to PCI standards and use of effective risk mitigation helps businesses protect customer personal and financial data, which maintains trust in their operations. The following section outlines strategies to reduce risk in PCI audit scope.
9797

9898
### Tokenization
@@ -167,7 +167,7 @@ With ongoing processes, organizations respond effectively to changes in the regu
167167

168168
### Implement strong security for shared infrastructure
169169

170-
Typically, web services such as Azure, have a shared infrastructure wherein customer data might be stored on the same physical server or data storage device. This scenario creates the risk of unauthorized customers accessing data they dont own, and the risk of malicious actors targeting the shared infrastructure. Azure AD security features help mitigate risks associated with shared infrastructure:
170+
Typically, web services such as Azure, have a shared infrastructure wherein customer data might be stored on the same physical server or data storage device. This scenario creates the risk of unauthorized customers accessing data they don't own, and the risk of malicious actors targeting the shared infrastructure. Azure AD security features help mitigate risks associated with shared infrastructure:
171171

172172
* User authentication to network access technologies that support modern authentication protocols: virtual private network (VPN), remote desktop, and network access points.
173173
* Access control policies that enforce strong authentication methods and device compliance based on signals such as user context, device, location, and risk.
@@ -194,8 +194,8 @@ Implement accurate logging and monitoring to detect, and respond to, security in
194194

195195
Learn more:
196196

197-
[What are Azure AD reports?](../reports-monitoring/overview-reports.md)
198-
[Azure AD built-in roles](../roles/permissions-reference.md)
197+
* [What are Azure AD reports?](../reports-monitoring/overview-reports.md)
198+
* [Azure AD built-in roles](../roles/permissions-reference.md)
199199

200200
### Multi-application environments: host outside the CDE
201201

articles/advisor/advisor-reference-cost-recommendations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -330,8 +330,11 @@ Learn more about [App Service plans](../app-service/overview-hosting-plans.md).
330330

331331
### Unused/Empty App Service plans
332332

333-
Your App Service plan has no apps running for at least 3 days. Consider deleting the resource to save costs.
333+
Your App Service plan has no apps running for at least 3 days. Consider deleting the resource to save costs or add new apps under it.
334334

335+
> [!NOTE]
336+
> It might take up to 48 hours for this recommendation to refresh after you take an action.
337+
335338
Learn more about [App Service plans](../app-service/overview-hosting-plans.md).
336339

337340
## Azure Monitor

0 commit comments

Comments
 (0)