Skip to content

Commit 429e4af

Browse files
committed
review-2
1 parent 4abe2cc commit 429e4af

15 files changed

+74
-73
lines changed

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: Learn how to secure your system with a threat modeling framework
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/1b-threat-modeling-framework.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Threat modeling framework
44
metadata:
55
title: Threat modeling framework
66
description: Learn about each threat category with their corresponding security controls
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/2-spoofing-pretending-to-be-someone-or-something-else.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Spoofing - pretending to be someone or something else
44
metadata:
55
title: Spoofing - pretending to be someone or something else
66
description: Learn about Spoofing and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/3-tampering-changing-data-without-authorization.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Tampering - changing data without authorization
44
metadata:
55
title: Tampering - changing data without authorization
66
description: Learn about Tampering and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against tampering?"
1818
choices:
19-
- content: "Sender encrypts the attachment of an email so the receiver knows it came from them"
19+
- content: "Sender encrypts the attachment of an email so the receiver knows it came from them."
2020
isCorrect: false
21-
explanation: "Encrypting the attachment isn't enough. Digitally sign a message to ensure tampering doesn't happen"
22-
- content: "System logs all actions and users to keep everyone accountable"
21+
explanation: "Encrypting the attachment isn't enough. Digitally sign a message to ensure tampering doesn't happen."
22+
- content: "System logs all actions and users to keep everyone accountable."
2323
isCorrect: false
24-
explanation: "This statement applies to repudiation"
25-
- content: "System grants administrative access to users listed on the access control list"
24+
explanation: "This statement applies to repudiation."
25+
- content: "System grants administrative access to users listed on the access control list."
2626
isCorrect: true
27-
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege "
27+
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/4-repudiation-not-claiming-responsibility-for-an-action-taken.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Repudiation - not claiming responsibility for an action taken
44
metadata:
55
title: Repudiation - not claiming responsibility for an action taken
66
description: Learn about Repudiation and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against repudiation?"
1818
choices:
19-
- content: "Sender digitally signs a message so the receiver knows who the message came from"
19+
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2020
isCorrect: false
21-
explanation: "This message applies to spoofing"
22-
- content: "System logs all actions and users to keep everyone accountable"
21+
explanation: "This message applies to spoofing."
22+
- content: "System logs all actions and users to keep everyone accountable."
2323
isCorrect: true
24-
explanation: "This statement applies to repudiation"
25-
- content: "System grants administrative access to users listed on the access control list"
24+
explanation: "This statement applies to repudiation."
25+
- content: "System grants administrative access to users listed on the access control list."
2626
isCorrect: false
27-
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege "
27+
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/5-information-disclosure-seeing-data-i-am-not-supposed-to-see.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Information disclosure - seeing data I'm not supposed to see
44
metadata:
55
title: Information disclosure - seeing data I'm not supposed to see
66
description: Learn about Information Disclosure and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -18,10 +18,10 @@ quiz:
1818
choices:
1919
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2020
isCorrect: false
21-
explanation: "This message applies to spoofing"
21+
explanation: "This message applies to spoofing."
2222
- content: "System grants administrative access to users listed on the access control list."
2323
isCorrect: true
24-
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege"
24+
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege."
2525
- content: "System logs all actions and users to keep everyone accountable."
2626
isCorrect: false
27-
explanation: "This statement applies to repudiation"
27+
explanation: "This statement applies to repudiation."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/6-denial-of-service-overwhelming-the-system.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Denial of Service - overwhelming the system
44
metadata:
55
title: Denial of Service - Overwhelming the System
66
description: Learn about Denial of Service and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against denial of service?"
1818
choices:
19-
- content: "Sender digitally signs a message so the receiver knows who the message came from"
19+
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2020
isCorrect: false
21-
explanation: "This message applies to spoofing"
22-
- content: "System logs all actions and users to keep everyone accountable"
21+
explanation: "This message applies to spoofing."
22+
- content: "System logs all actions and users to keep everyone accountable."
2323
isCorrect: false
24-
explanation: "This statement applies to repudiation"
25-
- content: "System relies on elastic resources to handle more requests as they arrive"
24+
explanation: "This statement applies to repudiation."
25+
- content: "System relies on elastic resources to handle more requests as they arrive."
2626
isCorrect: true
27-
explanation: "This statement applies to denial of service"
27+
explanation: "This statement applies to denial of service."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/7-elevation-of-privilege-having-permissions-i-should-not-have.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Elevation of privilege - having permissions I should not have
44
metadata:
55
title: Elevation of Privilege - Having Permissions I Should Not Have
66
description: Learn about Elevation of Privilege and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against elevation of privilege?"
1818
choices:
19-
- content: "System runs a process with the least possible amount of privilege"
19+
- content: "System runs a process with the least possible amount of privilege."
2020
isCorrect: true
21-
explanation: "This statement applies to elevation of privilege"
22-
- content: "Sender digitally signs a message so the receiver knows who the message came from"
21+
explanation: "This statement applies to elevation of privilege."
22+
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2323
isCorrect: false
24-
explanation: "This message applies to spoofing"
25-
- content: "System logs all actions and users to keep everyone accountable"
24+
explanation: "This message applies to spoofing."
25+
- content: "System logs all actions and users to keep everyone accountable."
2626
isCorrect: false
27-
explanation: "This statement applies to repudiation"
27+
explanation: "This statement applies to repudiation."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/8-summary.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ uid: learn.tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eli
33
title: Summary
44
metadata:
55
title: Summary
6-
description: Review what you've learned about each threat category with their corresponding security controls
7-
ms.date: 07/17/2023
6+
description: Review what you learned about each threat category with their corresponding security controls.
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/includes/3-tampering-changing-data-without-authorization.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,26 +14,26 @@ Examples include:
1414

1515
|Name|Shape|Definition|
1616
|----|-----|----------|
17-
|Process|![Process.](../media/process50.png)|Activity that modifies or redirects input to an output|
18-
|Data store|![Data store.](../media/data-store50.png)|Permanent or temporary data storage|
19-
|Data-flow|![Data-flow.](../media/data-flow50.png)|Data movement between elements|
17+
|Process|![Process.](../media/process50.png)|Activity that modifies or redirects input to an output.|
18+
|Data store|![Data store.](../media/data-store50.png)|Permanent or temporary data storage.|
19+
|Data-flow|![Data-flow.](../media/data-flow50.png)|Data movement between elements.|
2020

2121
### Interaction
2222

2323
|Name|Interaction|Definition|
2424
|----|-----------|----------|
25-
|Process <-> Data store|![Process to Data Store Interaction.](../media/process-datastore.png)|A task sends or receives data to or from a data store|
26-
|Data-flow <-> Trust boundary|![Data-Flow to Trust Boundary Interaction.](../media/flow-trustboundary.png)|Data is transmitted from a trusted environment to someone over the internet (and vice-versa)|
25+
|Process <-> Data store|![Process to Data Store Interaction.](../media/process-datastore.png)|A task sends or receives data to or from a data store.|
26+
|Data-flow <-> Trust boundary|![Data-Flow to Trust Boundary Interaction.](../media/flow-trustboundary.png)|Data is transmitted from a trusted environment to someone over the internet (and vice-versa).|
2727

2828
## How to prevent tampering
2929

3030
**Integrity** prevents data from being maliciously modified. Examples include:
3131

32-
- Validating input to prevent the processing of malicious payloads and mishandling of unexpected behavior
33-
- Signing messages with digital signatures to ensure messages aren't tampered with
34-
- Using access-control lists to apply permissions
35-
- Using SSL/TLS to secure transmission
36-
- Creating an IPSec tunnel to secure communication between endpoints
32+
- Validating input to prevent the processing of malicious payloads and mishandling of unexpected behavior.
33+
- Signing messages with digital signatures to ensure messages aren't tampered with.
34+
- Using access-control lists to apply permissions.
35+
- Using TLS/SSL to secure transmission.
36+
- Creating an IPSec tunnel to secure communication between endpoints.
3737

3838
### Common security controls to reduce or eliminate risk
3939

0 commit comments

Comments
 (0)