Skip to content

Commit 7292b94

Browse files
committed
Line edits
1 parent 4074ec4 commit 7292b94

10 files changed

+14
-14
lines changed

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/1b-elements.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
uid: learn.tm-create-a-threat-model-using-foundational-data-flow-diagram-elements.1b-elements
33
title: Data-flow diagram elements
44
metadata:
5-
title: Data-flow diagram elements
5+
title: Data-Flow Diagram Elements
66
description: Explore each element in a data-flow diagram, made up of distinct shapes, functions, and recommended context
77
ms.date: 03/27/2025
88
author: rodsan

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/2-process-the-task-element.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
uid: learn.tm-create-a-threat-model-using-foundational-data-flow-diagram-elements.2-process-the-task-element
33
title: Process - The task element
44
metadata:
5-
title: Process - The task element
5+
title: Process - The Task Element
66
description: The process element in a data-flow diagram
77
ms.date: 03/27/2025
88
author: rodsan

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/3-data-store-the-storage-element.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
uid: learn.tm-create-a-threat-model-using-foundational-data-flow-diagram-elements.3-data-store-the-storage-element
33
title: Data store - The storage element
44
metadata:
5-
title: Data store - The storage element
5+
title: Data Store - The Storage Element
66
description: The data store element in a data-flow diagram
77
ms.date: 03/27/2025
88
author: rodsan

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/4-external-entity-the-no-control-element.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
uid: learn.tm-create-a-threat-model-using-foundational-data-flow-diagram-elements.4-external-entity-the-no-control-element
33
title: External entity - The no control element
44
metadata:
5-
title: External entity - The no control element
5+
title: External Entity - The No Control Element
66
description: The external entity element in a data-flow diagram
77
ms.date: 03/27/2025
88
author: rodsan

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/5-data-flow-the-data-in-transit-element.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
uid: learn.tm-create-a-threat-model-using-foundational-data-flow-diagram-elements.5-data-flow-the-data-in-transit-element
33
title: Data-flow - The data in transit element
44
metadata:
5-
title: Data-flow - The data in transit element
5+
title: Data-Flow - The Data in Transit Element
66
description: The data-flow element in a data-flow diagram
77
ms.date: 03/27/2025
88
author: rodsan

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/6-trust-boundary-the-trust-zone-change-element.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
uid: learn.tm-create-a-threat-model-using-foundational-data-flow-diagram-elements.6-trust-boundary-the-trust-zone-change-element
33
title: Trust boundary - The trust zone change element
44
metadata:
5-
title: Trust boundary - The trust zone change element
5+
title: Trust Boundary - The Trust Zone Change Element
66
description: The trust boundary element in a data-flow diagram
77
ms.date: 03/27/2025
88
author: rodsan

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Examples include:
99

1010
We use elements and their interactions in threat modeling to help identify threats and reduce system risk. The process helps engineers collaborate more efficiently while securing their systems against the most common threats.
1111

12-
In this module, you explore each element of a data-flow diagram. These elements have distinct shapes and functions, and require specific context.
12+
In this module, you explore each element of a data-flow diagram. These elements have distinct shapes and functions and require specific context.
1313

1414
> [!NOTE]
1515
> We might also refer to elements as as *Stencils* throughout this learning path.

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/includes/3-data-store-the-storage-element.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
![Rendering of a two parallel horizontal lines representing the Data Store Element.](../media/data-store.png)
1+
![Rendering of two parallel horizontal lines representing the Data Store Element.](../media/data-store.png)
22

33
The **data store element** is depicted as parallel lines. This element represents data stored on a temporary or permanent basis.
44

@@ -21,6 +21,6 @@ Include the following context with each data store element:
2121
|Context|Questions|
2222
|-------|---------|
2323
|Type|Does the system use Azure SQL, cookies, local, or some other type of storage? If so, what is it?|
24-
|Function|How is the storage used? Is it used to share data, store backups, security logs, credentials, secrets?|
24+
|Function|How is the storage used? Is it used to share data, store backups, security logs, credentials, or secrets?|
2525
|Permission level|How is access control implemented? Who has read and write permissions?|
2626
|Additional controls|Is data encrypted? What about the disk? Are digital signatures used?|

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/includes/6-trust-boundary-the-trust-zone-change-element.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Examples include:
1414
- Connections to third-party services
1515
- Parts of your system only available to administrators
1616

17-
Areas with changing trust zones are the most targeted by attackers, and should be carefully designed.
17+
Areas with changing trust zones are the most targeted by attackers and should be carefully designed.
1818

1919
Microsoft has predefined trust-zone requirements for engineers to use internally. It takes the guesswork out of which boundaries to apply. If you work at Microsoft, contact your security team to learn more.
2020

learn-pr/azure/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/index.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
### YamlMime:Module
22
uid: learn.tm-create-a-threat-model-using-foundational-data-flow-diagram-elements
33
metadata:
4-
title: Create a threat model using data-flow diagram elements
5-
description: Data-flow diagrams are graphical representations of your system and should specify each element, their interactions and context.
4+
title: Create a Threat Model Using Data-Flow Diagram Elements
5+
description: Data-flow diagrams are graphical representations of your system and should specify each element, their interactions, and context.
66
ms.date: 03/27/2025
77
author: rodsan
88
ms.author: rodsan
@@ -11,8 +11,8 @@ title: Create a threat model using data-flow diagram elements
1111
summary: Data-flow diagrams are graphical representations of your system and should specify each element, their interactions and helpful context.
1212
abstract: |
1313
In this module, you learn how to:
14-
- Distinguish between the shape and function of each element
15-
- Include the right context for an element when creating a data-flow diagram
14+
- Distinguish between the shape and function of each element.
15+
- Include the right context for an element when creating a data-flow diagram.
1616
prerequisites: None
1717
iconUrl: /training/achievements/create-a-threat-model-using-data-flow-diagram-elements.svg
1818
levels:

0 commit comments

Comments
 (0)