9
Specifying Security Requirements for Applications
The previous chapter discussed how to design a strategy for securing SaaS, PaaS, and IaaS infrastructures. This included building a security baseline for each of these services as well as security requirements for the containers, edge computing, application services, databases, and storage accounts within Azure. This chapter will discuss security requirements for applications, including prioritizing mitigating threats, standards for onboarding new applications, and security strategies for applications and APIs.
In this chapter, we are going to cover the following main topics:
- Specifying priorities for mitigating threats to applications
- Specifying a security standard for onboarding a new application ...
Get Microsoft Cybersecurity Architect Exam Ref SC-100 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.