nvbad.blogg.se

Microsoft threat modeling tool examples
Microsoft threat modeling tool examples











Log rotation is an automated process used in system administration in which dated log files are archived. Implement centralized loggingĮnsure that log rotation and separation are in place Title Identify all important events and log those events. Identify entities in your solution containing sensitive data and implement change auditing on those entities and fieldsĮnsure that auditing and logging is enforced on the application TitleĮnable auditing and logging on all components. Identify sensitive entities in your solution and implement change auditing Title

  • Ensure that appropriate auditing and logging is enforced on Cloud Gateway.
  • Ensure that appropriate auditing and logging is enforced on Field Gateway.
  • Ensure that auditing and logging is enforced on Web API.
  • Implement sufficient Audit Failure Handling.
  • Use Azure Storage Analytics to audit access of Azure Storage.
  • Ensure that login auditing is enabled on SQL Server.
  • Enable diagnostics logging for web apps in Azure App Service.
  • Ensure that the system has inbuilt defenses against misuse.
  • Ensure that User Management Events are Logged.
  • Ensure that Audit and Log Files have Restricted Access.
  • microsoft threat modeling tool examples

    Ensure that the application does not log sensitive user data.Ensure that log rotation and separation are in place.Ensure that auditing and logging is enforced on the application.Identify sensitive entities in your solution and implement change auditing.













    Microsoft threat modeling tool examples