Home Applications Windows Azure Security Best Practices – Part 4: What Else You Need to Do

Windows Azure Security Best Practices – Part 4: What Else You Need to Do

0
0

So which security threats are mitigated by the Windows Azure environment and which security threats must be mitigated by the developer?

The paper, Security Best Practices for Developing Windows Azure Applications, describes what you should consider as key threats that your an application running on the Windows Azure. And it shows specifically where Azure provides the mitigation and those you need to call APIs and those which you need to handle yourself. (It does not address regulatory compliance issues.)

What You Should Handle

I’ll take a selection of the threats and and what you should do and provide a reference for where you can learn more about how to implement them in your code. This list comes from Windows Azure Security Overview.  But the results will come for you.

This is not an exhaustive list. And as you can tell from the previous parts in this series, you tailor your security practices based on your own application needs.

To learn more and to read the entire article at its source, please refer to the following page, Windows Azure Security Best Practices – Part 4: What Else You Need to Do- Microsoft US ISV Developer Evangelism Team

  

Featured Resources:

Related Articles:

DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!
| LATEST RESOURCES

White Papers

    NEW VMware Whitepaper – Deliver Office 365 in VMware Horizon 7 with Published Applications

    By Frank Anderson, End-User-Computing Solutions Architect, Desktop Technical Marketing, VMware and Cindy Heyer Carroll, Technical Writer, End-User-Computing Technical Marketing, VMware We are excited to announce a new white paper, Best Practices for Delivering Microsoft Office 365 in VMware Horizon 7 with Published Applications, now available to help you avoid risks that can occur during setup […]

    Downloads

      FREE Tool – Troubleshoot Remote Desktop Connections

      Everyone wants to do things in a simple and effortless way. From a child that plays with a remote controlled car to a photographer who uses a drone for landscape photography, nowadays nearly everything can be automated or operated remotely. And system administration is no exception. Troubleshooting remote desktops is now as easy as using […]

      On-Demand Webinars

        How analyzing data patterns can improve IT service delivery – On-Demand Webinar

        Watch this webinar to know how to use Analytics Plus to- 1. Identify data patterns using visual analysis to spot trends easily. 2. Correlate data from multiple sources and get unified visibility into your IT. 3. Create live dashboards to make continuous improvements in ITSM processes. This video is from the fine folks at ManageEngine

        Latest Videos

          VMware TrustPoint and AirWatch Integration Demo Video

          Learn how out-of-the-box integration of VMware TrustPoint and AirWatch further enhances securing and managing mobile, desktop and server environments, and dynamically drives policy configuration changes across the organization for even stronger compliance and faster threat containment. This video is from the fine folks at VMware EUC.

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win a Tesla P100D

          Visit our Sponsors!


          Close