Windows Azure Security Best Practices – Part 4: What Else You Need to Do
So which security threats are mitigated by the Windows Azure environment and which security threats must be mitigated by the developer?
The paper, Security Best Practices for Developing Windows Azure Applications, describes what you should consider as key threats that your an application running on the Windows Azure. And it shows specifically where Azure provides the mitigation and those you need to call APIs and those which you need to handle yourself. (It does not address regulatory compliance issues.)
What You Should Handle
I’ll take a selection of the threats and and what you should do and provide a reference for where you can learn more about how to implement them in your code. This list comes from Windows Azure Security Overview. But the results will come for you.
This is not an exhaustive list. And as you can tell from the previous parts in this series, you tailor your security practices based on your own application needs.
To learn more and to read the entire article at its source, please refer to the following page, Windows Azure Security Best Practices – Part 4: What Else You Need to Do- Microsoft US ISV Developer Evangelism Team