Skip to content

Commit 019459d

Browse files
authored
Merge pull request #51014 from v-thpra/azure-triage-fix-1058583
Technical Review 1058583: Guide to Secure .NET Development with OWASP Top 10
2 parents 3345a0a + 85a7104 commit 019459d

27 files changed

+134
-135
lines changed

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Overview of OWASP Top 10 in 2021 for .NET Developers. What is OWASP Top 10?"
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/10-software-data-integrity-failures​.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Software and data integrity failures
44
metadata:
55
title: Software and data integrity failures
66
description: "OWASP Top 10 for .NET Developers. Software and data integrity failures."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -20,13 +20,13 @@ quiz:
2020
choices:
2121
- content: "Static application security testing (SAST)."
2222
isCorrect: false
23-
explanation: "Static analysis focuses on code prior to its deployment."
23+
explanation: "Static analysis focuses on code before its deployment."
2424
- content: "Software Composition Analysis (SCA)."
2525
isCorrect: false
26-
explanation: "Composition analysis focuses on code prior to its deployment."
26+
explanation: "Composition analysis focuses on code before its deployment."
2727
- content: "Dynamic Application Security Testing (DAST)."
2828
isCorrect: true
2929
explanation: "Correct. Dynamic analysis can inspect and report on infrastructure configuration and expose its weak points."
3030
- content: "Chaos testing."
3131
isCorrect: false
32-
explanation: "This is a helpful technique in reliability and disaster recovery testing, but not quite right for this situation."
32+
explanation: "Chaos testing is a helpful technique in reliability and disaster recovery testing, but not the best choice for this situation."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/11-security-logging-monitoring​.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Security logging and monitoring
44
metadata:
55
title: Security logging and monitoring
66
description: "OWASP Top 10 for .NET Developers. Security logging and monitoring."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -15,12 +15,12 @@ content: |
1515
quiz:
1616
title: Check your knowledge
1717
questions:
18-
- content: "Which of these statements would you consider secure logging best practices?"
18+
- content: "Which of these statements would you consider to be secure logging best practices?"
1919
choices:
2020
- content: "Log all events occurring in the system and store the logs in an easily accessible public location."
2121
isCorrect: false
2222
explanation: "Overlogging can add noise when diagnosing issues. Logs should be protected and not exposed to the public."
23-
- content: "Log user and password of all failed authentication attempts."
23+
- content: "Log the user and password of all failed authentication attempts."
2424
isCorrect: false
2525
explanation: "Not quite. Failed authentication attempts should be logged and audited. Logging passwords is a security risk."
2626
- content: "Sanitize logs from sensitive information and guard access to logged information."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/12-server-side-request-forgery.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Server-side request forgery
44
metadata:
55
title: Server-side request forgery
66
description: "OWASP Top 10 for .NET Developers. Server-side request forgery."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -16,7 +16,7 @@ content: |
1616
quiz:
1717
title: Check your knowledge
1818
questions:
19-
- content: "Is performing input validation on the client side only considered to be best practice?"
19+
- content: "Is it considered to be best practice to perform input validation on the client side only?"
2020
choices:
2121
- content: "Yes."
2222
isCorrect: false

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/13-summary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Summary
44
metadata:
55
title: Summary
66
description: "OWASP Top 10 for .NET Developers. Summary of what OWASP Top 10 means to .NET developers."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/2-what-is-owasp-top-10.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: What is OWASP Top 10?
44
metadata:
55
title: What is OWASP Top 10?
66
description: "Overview of OWASP Top 10 in 2021 for .NET Developers. What is OWASP Top 10?"
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/3-broken-access-control.yml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Broken access control
44
metadata:
55
title: Broken access control
66
description: "OWASP Top 10 for .NET Developers. Broken Access Control."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -21,16 +21,15 @@ quiz:
2121

2222
- content: "The goal of the Open Web Application Security Project (OWASP) Top 10 report put together by security experts is to:"
2323
choices:
24-
- content: "Create a standard for security benchmark of web applications."
24+
- content: "Create a standard security benchmark for web applications."
2525
isCorrect: false
26-
explanation: "Incorrect. OWASP Top 10 is often effort to be an 'awareness document' for educational purposes."
27-
- content: "Improve awareness and promote recommended mitigation techniques to most critical security concerns for web app security."
26+
explanation: "Incorrect. OWASP Top 10 is primarily an 'awareness document' for educational purposes."
27+
- content: "Improve awareness and promote recommended mitigation techniques to the most critical security concerns for web app security."
2828
isCorrect: true
2929
explanation: "Correct."
3030
- content: "Be the only go-to report your organization would need to stay secured."
3131
isCorrect: false
3232
explanation: "Incorrect. There are many security reports beyond OWASP, with SANS CWE Top 25 being one of them."
33-
3433
- content: "What is Broken Access Control?"
3534
choices:
3635
- content: "A vulnerability that allows an attacker to access restricted information."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/4-cryptographic-failures.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Cryptographic failures
44
metadata:
55
title: Cryptographic failures
66
description: "OWASP Top 10 for .NET Developers. Cryptographic failures."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -23,9 +23,7 @@ quiz:
2323
explanation: "Incorrect. Rely on industry-standard encryption and hashing implementations. Review the documentation to ensure you're using strong algorithms."
2424
- content: "No."
2525
isCorrect: true
26-
explanation: "Correct. Rely on industry-standard encryption and hashing implementations. Review the documentation to ensure you're using strong algorithms."
27-
28-
26+
explanation: "Correct. Rely on industry-standard encryption and hashing implementations. Review the documentation to ensure you're using strong algorithms."
2927
- content: "The process of converting data to a different format for storage, transmission, compression, or decompression best describes:"
3028
choices:
3129
- content: "Encryption."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/5-injection.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Injection
44
metadata:
55
title: Injection
66
description: "OWASP Top 10 for .NET Developers. Injection."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -18,15 +18,15 @@ quiz:
1818
questions:
1919
- content: "In modern day .NET, how can the code fragment `string sql='SELECT * FROM users WHERE name = '\" + username + \"'` be written more securely?"
2020
choices:
21-
- content: "Using an object relational mapper (ORM)."
21+
- content: "By using an object relational mapper (ORM)."
2222
isCorrect: false
23-
explanation: "Entity Framework with LINQ is a powerful way of querying many relational database engines."
24-
- content: "Using stored procedures."
23+
explanation: "Using Entity Framework with Language Integrated Query (LINQ) is a powerful way of querying many relational database engines."
24+
- content: "By using stored procedures."
2525
isCorrect: false
2626
explanation: "Stored procedures are the most effective way of countering the SQL Injection vulnerability."
27-
- content: "Using parameterized queries."
27+
- content: "By using parameterized queries."
2828
isCorrect: false
2929
explanation: "Use parameterized queries where a direct SQL query must be used."
30-
- content: "You should use at least one or combinations of few techniques, including Entity Framework and input validation"
30+
- content: "You should use at least one or a combination of a few techniques, including Entity Framework and input validation."
3131
isCorrect: true
3232
explanation: "With username validation as a minimum, you can use any of the methods."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/6-insecure-design.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Insecure design
44
metadata:
55
title: Insecure design
66
description: "OWASP Top 10 for .NET Developers. Insecure design."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

0 commit comments

Comments
 (0)