You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/architecture/distributed-cloud-native-apps-containers/cloud-native-identity/azure-security.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ As applications become more complicated the number of attack vectors increases a
45
45
46
46
Penetration testing or "pen testing" involves bringing in external actors to attempt to attack the system. These attackers may be an external consulting company or other developers with good security knowledge from another part of the business. They're given carte blanche to attempt to subvert the system. Frequently, they'll find extensive security holes that need to be patched. Sometimes the attack vector will be something totally unexpected such as a phishing attack against the CEO.
47
47
48
-
Azure itself is constantly undergoing attacks from a team of hackers inside Microsoft - [Inside the world of the elite hacker and those trying to stop him](https://www.microsoft.com/industry/blog/financial-services/2016/05/17/red-vs-blue/). Over the years, they've been the first to find dozens of potentially catastrophic attack vectors, closing them before they can be exploited externally. The more tempting a target, the more likely that eternal actors will attempt to exploit it and there are a few targets in the world more tempting than Azure.
48
+
Azure itself is constantly undergoing attacks from a team of hackers inside Microsoft. Over the years, they've been the first to find dozens of potentially catastrophic attack vectors, closing them before they can be exploited externally. The more tempting a target, the more likely that eternal actors will attempt to exploit it and there are a few targets in the world more tempting than Azure.
49
49
50
50
## Monitoring
51
51
@@ -270,7 +270,7 @@ While Cosmos DB doesn't provide for supplying customer encryption keys, there ha
270
270
271
271
## Keeping secure
272
272
273
-
Azure has all the tools necessary to release a highly secure product. However, a chain is only as strong as its weakest link. If the applications deployed on top of Azure aren't developed with a proper security mindset and good security audits, then they become the weak link in the chain. There are many great static analysis tools, encryption libraries, and security practices that can be used to ensure that the software installed on Azure is as secure as Azure itself. Examples include [static analysis tools](https://www.mend.io/sca/), [encryption libraries](https://www.libressl.org/), and [security practices](https://www.microsoft.com/industry/blog/financial-services/2016/05/17/red-vs-blue/).
273
+
Azure has all the tools necessary to release a highly secure product. However, a chain is only as strong as its weakest link. If the applications deployed on top of Azure aren't developed with a proper security mindset and good security audits, then they become the weak link in the chain. There are many great static analysis tools, encryption libraries, and security practices that can be used to ensure that the software installed on Azure is as secure as Azure itself. Examples include [static analysis tools](https://www.mend.io/sca/), [encryption libraries](https://www.libressl.org/), and [security practices](/azure/security/fundamentals/best-practices-and-patterns).
Copy file name to clipboardExpand all lines: docs/architecture/distributed-cloud-native-apps-containers/includes/download-alert.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,14 @@
1
1
---
2
-
ms.date: 04/23/2024
3
2
ms.topic: include
4
3
---
5
4
6
5
> [!TIP]
7
6
> :::row:::
8
7
> :::column span="3":::
9
-
> This content is an excerpt from the eBook, Architecture for Distributed Cloud-Native Apps with .NET & Containers, available on [.NET Docs](/dotnet/architecture/TODO) or as a free downloadable PDF that can be read offline.
8
+
> This content is an excerpt from the eBook, Architecture for Distributed Cloud-Native Apps with .NET & Containers, available on [.NET Docs](/dotnet/architecture/distributed-cloud-native-apps-containers) or as a free downloadable PDF that can be read offline.
10
9
>
11
10
> > [!div class="nextstepaction"]
12
-
> > [Download PDF TODO](https://dotnet.microsoft.com/download/e-book/microservices-architecture/pdf)
> **[Alistair Matthews](https://github.com/alistairmatthews)**, Principal Technologist, Civica
40
42
41
43
Participants and Reviewers:
42
44
43
-
<!-- TODO: James to fill in... -->
45
+
> **[James Montemagno](https://github.com/jamesmontemagno)**, Principal Lead Program Manager, Developer Community, Microsoft
44
46
45
47
> **[David Pine](https://github.com/IEvangelist)**, Senior Content Developer, .NET Aspire, Microsoft
46
48
@@ -50,7 +52,7 @@ Editors:
50
52
51
53
## Acknowledgments
52
54
53
-
This book was inspired by the [.NET Microservices: Architecture for Containerized .NET Applications](https://dotnet.microsoft.com/download/e-book/microservices-architecture/pdf) and [Architecting Cloud Native .NET Applications for Azure](https://dotnet.microsoft.com/download/e-book/cloud-native-azure/pdf) eBooks. Some chapters were adapted from these eBooks to provide a more focused and in-depth look at building enterprise applications using .NET Aspire.
55
+
This book was inspired by the [.NET Microservices: Architecture for Containerized .NET Applications](https://dotnet.microsoft.com/download/e-book/microservices-architecture/pdf) and [Architecting Cloud Native .NET Applications for Azure](https://dotnet.microsoft.com/download/e-book/cloud-native-azure/pdf) eBooks. Some chapters were adapted from these eBooks to provide a more focused and in-depth look at architecting distributed cloud-native applications using .NET Aspire.
54
56
55
57
## Introduction
56
58
@@ -60,13 +62,13 @@ With the advent of .NET Aspire, it's never been a better time to be a .NET devel
60
62
61
63
This book is for .NET developers that want to learn how to architect and build distributed cloud-native applications using .NET Aspire. The book assumes that you have a basic understanding of .NET and .NET Aspire. If you are new to .NET Aspire, you can learn more about it in the [Building your first app](/dotnet/aspire/get-started/build-your-first-aspire-app) guide in the .NET Aspire documentation.
Copy file name to clipboardExpand all lines: docs/architecture/distributed-cloud-native-apps-containers/service-to-service-communication-patterns/service-mesh-communication-infrastructure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ We next move to distributed data in cloud-native systems and the benefits and ch
0 commit comments