You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/advocates/top-5-security-items-to-consider/3-inputs-and-outputs.yml
+27-27Lines changed: 27 additions & 27 deletions
Original file line number
Diff line number
Diff line change
@@ -5,8 +5,8 @@ metadata:
5
5
title: Inputs and Outputs
6
6
description: Inputs and Outputs
7
7
author: patridge
8
-
ms.author: adpatrid
9
-
ms.date: 05/26/2023
8
+
ms.author: robmcm
9
+
ms.date: 03/14/2025
10
10
ms.topic: unit
11
11
durationInMinutes: 10
12
12
content: |
@@ -15,44 +15,44 @@ quiz:
15
15
title: Check your knowledge
16
16
questions:
17
17
18
-
- content: 'Which of the following data sources need to be validated?'
18
+
- content: "Which of the following data sources need to be validated?"
19
19
choices:
20
-
- content: 'Data from a 3rd party API'
20
+
- content: "Data from a 3rd party API"
21
21
isCorrect: false
22
-
explanation: 'This is just one of many sources that needs to be validated.'
23
-
- content: 'Data from the URL parameter'
22
+
explanation: "This is just one of many sources that needs to be validated."
23
+
- content: "Data from the URL parameter"
24
24
isCorrect: false
25
-
explanation: 'This is just one of many sources that needs to be validated'
26
-
- content: 'Data collected from the user via an input field'
25
+
explanation: "This is just one of many sources that needs to be validated."
26
+
- content: "Data collected from the user via an input field"
27
27
isCorrect: false
28
-
explanation: 'This is just one of many sources that needs to be validated.'
29
-
- content: 'All of the above'
28
+
explanation: "This is just one of many sources that needs to be validated."
29
+
- content: "All of the above"
30
30
isCorrect: true
31
-
explanation: 'All these sources of data need to be validated. Never trust any data that could have been modified.'
31
+
explanation: "All these sources of data need to be validated. Never trust any data that could have been modified."
32
32
33
-
- content: 'Parameterized queries (stored procedures in SQL) are a secure way to talk to the database because:'
33
+
- content: "Parameterized queries (stored procedures in SQL) are a secure way to talk to the database because:"
34
34
choices:
35
-
- content: 'They're more organized than inline database commands, and therefore less confusing for users.'
35
+
- content: "They're more organized than inline database commands, and therefore less confusing for users."
36
36
isCorrect: false
37
-
explanation: 'Organization of the code is not the reason that parameterized queries are more secure than inline SQL.'
38
-
- content: 'There's a clear outline of the script in the stored procedure, ensuring better visibility.'
37
+
explanation: "Organization of the code is not the reason that parameterized queries are more secure than inline SQL."
38
+
- content: "There's a clear outline of the script in the stored procedure, ensuring better visibility."
39
39
isCorrect: false
40
-
explanation: 'Clear outline of the script is not the reason that parameterized queries are more secure than inline SQL.'
41
-
- content: 'Parameterized queries substitute variables before running queries, meaning it avoids the opportunity for code to be submitted in place of a variable.'
40
+
explanation: "Clear outline of the script is not the reason that parameterized queries are more secure than inline SQL."
41
+
- content: "Parameterized queries substitute variables before running queries, meaning it avoids the opportunity for code to be submitted in place of a variable."
42
42
isCorrect: true
43
-
explanation: 'Parameter fields used in parameterized queries are treated as data, not code, protecting against injection vulnerabilities. For more information on how to implement parameterized queries please see the [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html).'
43
+
explanation: "Parameter fields used in parameterized queries are treated as data, not code, protecting against injection vulnerabilities. For more information on how to implement parameterized queries please see the [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)."
44
44
45
-
- content: 'Which of the following data needs to be output encoded?'
45
+
- content: "Which of the following data needs to be output encoded?"
46
46
choices:
47
-
- content: 'Data saved to the database'
47
+
- content: "Data saved to the database"
48
48
isCorrect: false
49
-
explanation: 'Although data saved to the database needs to be validated to ensure the data is good, we don't need to encode it for output.'
50
-
- content: 'Data to be output to the screen'
49
+
explanation: "Although data saved to the database needs to be validated to ensure the data is good, we don't need to encode it for output."
50
+
- content: "Data to be output to the screen"
51
51
isCorrect: true
52
-
explanation: 'Data sent to the screen needs to be output encoded to ensure it's never interpreted as code.'
53
-
- content: 'Data sent to a 3rd party API'
52
+
explanation: "Data sent to the screen needs to be output encoded to ensure it's never interpreted as code."
53
+
- content: "Data sent to a 3rd party API"
54
54
isCorrect: false
55
-
explanation: 'Although data sent to a 3rd party API needs to be validated to ensure the data is good, we don't need to encode it for output.'
56
-
- content: 'Data in the URL parameters'
55
+
explanation: "Although data sent to a 3rd party API needs to be validated to ensure the data is good, we don't need to encode it for output."
56
+
- content: "Data in the URL parameters"
57
57
isCorrect: false
58
-
explanation: 'Although data from URL Parameters needs to be validated before it's used in our application, we don't need to encode it for output.'
58
+
explanation: "Although data from URL Parameters needs to be validated before it's used in our application, we don't need to encode it for output."
Copy file name to clipboardExpand all lines: learn-pr/advocates/top-5-security-items-to-consider/includes/2-azure-security-center.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ Defender for Cloud is part of the [Center for Internet Security](https://www.cis
15
15
16
16
## Activating Microsoft Defender for Cloud
17
17
18
-
Microsoft Defender for Cloud provides unified security management and advanced threat protection for hybrid cloud workloads and is offered in several plans. The Foundational Cloud Security Posture Management (CSPM) plan, which is free and activated by default provides security policies, assessments, and recommendations. The Defender CSPM plan provides a robust set of features, including threat intelligence. There are also plans for Servers, App Service, and more.
18
+
Microsoft Defender for Cloud provides unified security management and advanced threat protection for hybrid cloud workloads, and is offered in several plans. The Foundational Cloud Security Posture Management (CSPM) plan, which is free and activated by default provides security policies, assessments, and recommendations. The Defender CSPM plan provides a robust set of features, including threat intelligence. There are also plans for Servers, App Service, and more.
19
19
20
20
Given the benefits of Defender for Cloud, the security team at your company has decided that it will be turned on for all subscriptions at your office. You got an email this morning to turn it on for your applications, so let's look at how to do that.
Copy file name to clipboardExpand all lines: learn-pr/advocates/top-5-security-items-to-consider/index.yml
+3-2Lines changed: 3 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,10 @@ metadata:
5
5
title: Top 5 security items to consider before pushing to production
6
6
description: Learn about the Site Reliability Engineering approach to the challenge of assuring reliability and gain a better understanding of why it matters.
7
7
author: patridge
8
-
ms.author: adpatrid
9
-
ms.date: 05/26/2023
8
+
ms.author: robmcm
9
+
ms.date: 03/14/2025
10
10
ms.topic: module
11
+
ms.service: security
11
12
title: Top 5 security items to consider before pushing to production
12
13
summary: Secure your web applications on Azure and protect your apps against the most common and dangerous web application attacks.
0 commit comments