Skip to content

Commit 9d95436

Browse files
authored
Merge pull request #50389 from v-thpra/azure-triage-fix-1044281
Technical Review 1044281: Use a framework to identify threats and find ways to reduce or eliminate risk
2 parents f04ff1e + 429e4af commit 9d95436

17 files changed

+85
-84
lines changed

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: Learn how to secure your system with a threat modeling framework
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/1b-threat-modeling-framework.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Threat modeling framework
44
metadata:
55
title: Threat modeling framework
66
description: Learn about each threat category with their corresponding security controls
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/2-spoofing-pretending-to-be-someone-or-something-else.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Spoofing - pretending to be someone or something else
44
metadata:
55
title: Spoofing - pretending to be someone or something else
66
description: Learn about Spoofing and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against spoofing?"
1818
choices:
19-
- content: "Sender digitally signs a message so the receiver knows who the message came from"
19+
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2020
isCorrect: true
21-
explanation: "This message applies to spoofing"
22-
- content: "System logs all actions and users to keep everyone accountable"
21+
explanation: "This message applies to spoofing."
22+
- content: "System logs all actions and users to keep everyone accountable."
2323
isCorrect: false
24-
explanation: "This statement applies to repudiation"
25-
- content: "System grants administrative access to users listed on the access control list"
24+
explanation: "This statement applies to repudiation."
25+
- content: "System grants administrative access to users listed on the access control list."
2626
isCorrect: false
27-
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege "
27+
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/3-tampering-changing-data-without-authorization.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Tampering - changing data without authorization
44
metadata:
55
title: Tampering - changing data without authorization
66
description: Learn about Tampering and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against tampering?"
1818
choices:
19-
- content: "Sender encrypts the attachment of an email so the receiver knows it came from them"
19+
- content: "Sender encrypts the attachment of an email so the receiver knows it came from them."
2020
isCorrect: false
21-
explanation: "Encrypting the attachment isn't enough. Digitally sign a message to ensure tampering doesn't happen"
22-
- content: "System logs all actions and users to keep everyone accountable"
21+
explanation: "Encrypting the attachment isn't enough. Digitally sign a message to ensure tampering doesn't happen."
22+
- content: "System logs all actions and users to keep everyone accountable."
2323
isCorrect: false
24-
explanation: "This statement applies to repudiation"
25-
- content: "System grants administrative access to users listed on the access control list"
24+
explanation: "This statement applies to repudiation."
25+
- content: "System grants administrative access to users listed on the access control list."
2626
isCorrect: true
27-
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege "
27+
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/4-repudiation-not-claiming-responsibility-for-an-action-taken.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Repudiation - not claiming responsibility for an action taken
44
metadata:
55
title: Repudiation - not claiming responsibility for an action taken
66
description: Learn about Repudiation and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against repudiation?"
1818
choices:
19-
- content: "Sender digitally signs a message so the receiver knows who the message came from"
19+
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2020
isCorrect: false
21-
explanation: "This message applies to spoofing"
22-
- content: "System logs all actions and users to keep everyone accountable"
21+
explanation: "This message applies to spoofing."
22+
- content: "System logs all actions and users to keep everyone accountable."
2323
isCorrect: true
24-
explanation: "This statement applies to repudiation"
25-
- content: "System grants administrative access to users listed on the access control list"
24+
explanation: "This statement applies to repudiation."
25+
- content: "System grants administrative access to users listed on the access control list."
2626
isCorrect: false
27-
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege "
27+
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/5-information-disclosure-seeing-data-i-am-not-supposed-to-see.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Information disclosure - seeing data I'm not supposed to see
44
metadata:
55
title: Information disclosure - seeing data I'm not supposed to see
66
description: Learn about Information Disclosure and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -18,10 +18,10 @@ quiz:
1818
choices:
1919
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2020
isCorrect: false
21-
explanation: "This message applies to spoofing"
21+
explanation: "This message applies to spoofing."
2222
- content: "System grants administrative access to users listed on the access control list."
2323
isCorrect: true
24-
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege"
24+
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege."
2525
- content: "System logs all actions and users to keep everyone accountable."
2626
isCorrect: false
27-
explanation: "This statement applies to repudiation"
27+
explanation: "This statement applies to repudiation."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/6-denial-of-service-overwhelming-the-system.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Denial of Service - overwhelming the system
44
metadata:
55
title: Denial of Service - Overwhelming the System
66
description: Learn about Denial of Service and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against denial of service?"
1818
choices:
19-
- content: "Sender digitally signs a message so the receiver knows who the message came from"
19+
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2020
isCorrect: false
21-
explanation: "This message applies to spoofing"
22-
- content: "System logs all actions and users to keep everyone accountable"
21+
explanation: "This message applies to spoofing."
22+
- content: "System logs all actions and users to keep everyone accountable."
2323
isCorrect: false
24-
explanation: "This statement applies to repudiation"
25-
- content: "System relies on elastic resources to handle more requests as they arrive"
24+
explanation: "This statement applies to repudiation."
25+
- content: "System relies on elastic resources to handle more requests as they arrive."
2626
isCorrect: true
27-
explanation: "This statement applies to denial of service"
27+
explanation: "This statement applies to denial of service."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/7-elevation-of-privilege-having-permissions-i-should-not-have.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Elevation of privilege - having permissions I should not have
44
metadata:
55
title: Elevation of Privilege - Having Permissions I Should Not Have
66
description: Learn about Elevation of Privilege and its corresponding security control
7-
ms.date: 07/17/2023
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against elevation of privilege?"
1818
choices:
19-
- content: "System runs a process with the least possible amount of privilege"
19+
- content: "System runs a process with the least possible amount of privilege."
2020
isCorrect: true
21-
explanation: "This statement applies to elevation of privilege"
22-
- content: "Sender digitally signs a message so the receiver knows who the message came from"
21+
explanation: "This statement applies to elevation of privilege."
22+
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2323
isCorrect: false
24-
explanation: "This message applies to spoofing"
25-
- content: "System logs all actions and users to keep everyone accountable"
24+
explanation: "This message applies to spoofing."
25+
- content: "System logs all actions and users to keep everyone accountable."
2626
isCorrect: false
27-
explanation: "This statement applies to repudiation"
27+
explanation: "This statement applies to repudiation."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/8-summary.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ uid: learn.tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eli
33
title: Summary
44
metadata:
55
title: Summary
6-
description: Review what you've learned about each threat category with their corresponding security controls
7-
ms.date: 07/17/2023
6+
description: Review what you learned about each threat category with their corresponding security controls.
7+
ms.date: 05/12/2025
88
author: rodsan
99
ms.author: rodsan
1010
ms.topic: unit

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Using the framework, you're able to answer questions like:
1919
- How do I know someone can't change data in transit, in use, or at rest?
2020
- Can every action be tied to an identity?
2121
- How do I know someone can't see data in transit, in use, or at rest?
22-
- Are there areas in the system where resource is limited?
22+
- Are there areas in the system where resources are limited?
2323
- How do I know someone is allowed to take this action?
2424

2525
In this module, you learn about each threat category and its corresponding security controls.

0 commit comments

Comments
 (0)