%3CLINGO-SUB%20id%3D%22lingo-sub-1173007%22%20slang%3D%22en-US%22%3E%23SecureDevelopment%3A%20Security%20for%20Developers%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1173007%22%20slang%3D%22en-US%22%3E%3CDIV%20style%3D%22text-align%3A%20center!important%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Wallpaper%20Feb%20Final.jpg%22%20style%3D%22width%3A%20432px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F171163i5D1F52B2A7941DEE%2Fimage-dimensions%2F432x243%3Fv%3D1.0%22%20width%3D%22432%22%20height%3D%22243%22%20title%3D%22Wallpaper%20Feb%20Final.jpg%22%20alt%3D%22Wallpaper%20Feb%20Final.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEven%20if%20software%20security%20isn%E2%80%99t%20your%20full-time%20job%2C%20people%20are%20going%20to%20expect%20you%2C%20as%20a%20developer%2C%20to%20know%20what%20is%20going%20on.%20The%20good%20news%20is%20there%20are%20amazing%20security%20innovations%20happening%20right%20now%2C%20like%20using%20machine%20learning%20to%20analyze%20security%20threats%20with%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sentinel%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Sentinel%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fblog.semmle.com%2Fsecure-software-github-semmle%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESemmle%E2%80%99s%3C%2FA%3E%20semantic%20understanding%20engine%20to%20defend%20against%20cybersecurity%20vulnerabilities%20in%20open%20source%20code%20on%20GitHub.%20But%20we%20will%20touch%20more%20on%20this%20later!%3C%2FP%3E%0A%3CP%3EAt%20a%20more%20basic%20level%2C%20when%20you%20use%20Microsoft%20Azure%20or%20Office%20365%2C%20you%20have%20the%20ability%20to%20add%20automated%20defenses%20against%20common%20threats%20like%20Denial%20of%20Service%20(DDoS)%20attacks%20and%20investigate%20suspicious%20activity%20in%20your%20enterprise%20infrastructure.%20These%20defenses%20include%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fddos-protection%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20DDoS%20Protection%3C%2FA%3E%3A%20Available%20in%20both%20Basic%20(free)%20and%20Standard%20versions%2C%20DDoS%20protection%20will%20mitigate%20some%20of%20the%20most%20common%20malicious%20threats%20against%20your%20websites%20and%20services.%20While%20Basic%20DDoS%20Protection%20gives%20you%20active%20traffic%20monitoring%20and%20automatic%20attack%20mitigations%2C%20Standard%20additionally%20provides%20mitigation%20against%3A%3CUL%3E%0A%3CLI%3EVolumetric%20attacks%2C%20including%20UDP%20floods%2C%20amplification%20floods%2C%20and%20other%20spoofed-packet%20floods.%3C%2FLI%3E%0A%3CLI%3EProtocol%20attacks%2C%20including%20SYN%20flood%20attacks%2C%20reflection%20attacks%2C%20and%20other%20protocol%20attacks.%3C%2FLI%3E%0A%3CLI%3EResource%20layer%20attacks%2C%20including%20HTTP%20protocol%20violations%2C%20SQL%20injection%2C%20cross-site%20scripting%2C%20and%20other%20layer-7%20attacks.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIf%20you%20need%20a%20refresher%20on%20what%20DDoS%20attacks%20are%2C%20Anupam%20Vij%20and%20Scott%20Hanselman%20created%20a%20%3CA%20href%3D%22https%3A%2F%2Fchannel9.msdn.com%2FShows%2FAzure-Friday%2FHow-to-defend-against-denial-of-service-attacks-with-Azure-DDoS-Protection%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Egreat%20video%3C%2FA%3E%20explaining%20why%20it%20is%20critical%20for%20every%20business%20running%20in%20Azure%20to%20use%20these%20services%20to%20enhance%20their%20security%20profile.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Ffeatures%2Fazure-advanced-threat-protection%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Advanced%20Threat%20Protection%3C%2FA%3E%3A%20%26nbsp%3BATP%20is%20an%20enterprise%20solution%20that%20protects%20your%20on-premises%20Active%20Directory%20and%2For%20users%20synced%20to%20your%20Azure%20Active%20Directory.%20It%20is%20a%20cloud-based%20service%20that%20monitors%20and%20profiles%20user%20behavior%2C%20identifies%20suspicious%20activity%2C%20and%20investigates%20alerts%20and%20user%20actions.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fenterprise-mobility-security%2Fcloud-app-security%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%3A%20%26nbsp%3BMCAS%20is%20an%20add-on%20for%20Office%20365%20that%20alerts%20you%20to%20suspicious%20activity%20on%20your%20Office%20365%20subscription%2C%20Azure%2C%20and%20other%20cloud%20apps.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fsecurity-center%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%3C%2FA%3E%3A%26nbsp%3B%20ASC%20helps%20you%20protect%20your%20Azure%20infrastructure%2C%20Windows%20VMs%2C%20and%20Linux%20VMs.%20As%20we%20move%20into%20a%20world%20with%20more%20devices%20and%20sensors%20being%20managed%20over%20Azure%2C%20we%20are%20fortunate%20to%20have%20a%20special%20version%20of%20ASC%20known%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fasc-for-iot%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%20for%20IoT%3C%2FA%3E%2C%20which%20helps%20you%20make%20sure%20your%20edge%20computing%20infrastructure%2C%20cameras%2C%20and%20other%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DbopTakLqAX8%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIoT%20devices%3C%2FA%3E%20are%20not%20compromised.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fdevelop%2Fsecurity-code-analysis-overview%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Security%20Code%20Analysis%3C%2FA%3E.%26nbsp%3B%20MSCA%20plugs%20into%20your%20Azure%20DevOps%20continuous%20integration%20and%20delivery%20(CI%2FCD)%20pipeline.%20If%20you%20aren%E2%80%99t%20already%20doing%20continuous%20integration%20as%20part%20of%20your%20development%20routine%2C%20then%20MSCA%20is%20the%20tool%20that%20will%20get%20you%20to%20start.%20On%20every%20automated%20build%2C%20Security%20Code%20Analysis%20will%20perform%20the%20following%20checks%20for%20you%3A%3CUL%3E%0A%3CLI%3EAn%20anti-malware%20scanner%20will%20run%20Windows%20Defender%20against%20your%20app.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FMicrosoft%2Fbinskim%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBinSkim%3C%2FA%3E%20will%20validate%20compiler%20settings%2C%20linker%20settings%2C%20and%20other%20security-relevant%20characteristics%20of%20binary%20files.%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EA%20credential%20scanner%20will%20make%20sure%20you%20are%20not%20exposing%20any%20passwords%20or%20secrets.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fsecurity-risk-detection%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Security%20Risk%20Detection%3C%2FA%3E%20(MSRD)%20will%20perform%20fuzz%20testing%2C%20identifying%20exploitable%20security%20bugs%20in%20your%20software.%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EIf%20you%20are%20using%20a%20Microsoft-managed%20language%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdotnet%2Fstandard%2Fanalyzers%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERoslyn-based%20Analyzers%3C%2FA%3E%20will%20perform%20a%20static%20analysis%20of%20your%20managed%20C%23%20and%20Visual%20Basic%20code.%3C%2FLI%3E%0A%3CLI%3EIf%20you%20are%20using%20TypeScript%2C%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fpalantir%2Ftslint%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETSLint%3C%2FA%3E%20will%20perform%20static%20analysis%20on%20your%20code.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EWhen%20we%20look%20to%20the%20future%20of%20code%20and%20app%20security%2C%20we%20all%20hope%20for%20even%20greater%20automation%20beyond%20what%20these%20tools%20and%20services%20provide%20today.%20This%20is%20where%20machine%20learning%20comes%20in.%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sentinel%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Sentinel%3C%2FA%3E%20is%20an%20AI-based%20solution%20that%20connects%20to%20your%20resources%20and%20intelligently%20looks%20for%20new%20threats%20and%20suspicious%20activity.%20It%20uses%20data%20connectors%20to%20integrate%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Fconnect-azure-active-directory%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20AD%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Fconnect-azure-security-center%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Fconnect-azure-atp%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Advanced%20Threat%20Protection%3C%2FA%3E%2C%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Fconnect-cloud-app-security%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E.%20If%20you%20happen%20to%20have%20resources%20on%20AWS%2C%20you%20can%20even%20use%20Azure%20Sentinel%20to%20analyze%20your%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Fconnect-aws%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAWS%20CloudTrail%20data%3C%2FA%3E.%20Impressed%3F%3C%2FP%3E%0A%3CP%3EAnother%20jaw-dropping%20use%20of%20machine%20learning%20is%20happening%20with%20GitHub%E2%80%99s%20%3CA%20href%3D%22https%3A%2F%2Fgithub.blog%2F2019-09-18-github-welcomes-semmle%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eacquisition%3C%2FA%3E%20of%20Semmle%2C%20which%20has%20a%20semantic-understanding%20engine%20for%20open%20source%20code.%20If%20you%20work%20in%20GitHub%2C%20you%20may%20occasionally%20have%20qualms%20about%20finding%20the%20perfect%20code%20to%20solve%20your%20problem%20but%20being%20uncertain%20of%20its%20provenance.%20Semmle%20provides%20a%20declarative%20query%20language%20to%20search%20for%20insecure%20code%20patterns.%20More%20ambitiously%2C%20Semmle%20is%20cataloging%20open%20source%20queries%20for%20%3CA%20href%3D%22https%3A%2F%2Fcve.mitre.org%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ecommon%20vulnerabilities%3C%2FA%3E%2C%20which%20can%20then%20be%20run%20against%20any%20open%20source%20code%20you%20are%20consuming%20in%20your%20own%20code%20base.%20This%20is%20the%20first%20step%20in%20making%20all%20the%20open%20source%20code%20on%20GitHub%20fully%20reliable%2C%20removing%20a%20major%20barrier%20that%20has%20been%20hampering%20the%20spread%20of%20open%20source%20software.%20It%20has%20the%20potential%20to%20change%20the%20future%20of%20the%20open%20source%20movement.%3C%2FP%3E%0A%3CP%3EIf%20you%20would%20like%20to%20learn%20more%20about%20these%20security%20topics%2C%20Microsoft%20Learn%20has%20several%20courses%20available%20to%20help%20you%20become%20an%20expert%20on%20software%20and%20cloud%20security%3A%3C%2FP%3E%0A%3CTABLE%20width%3D%22571%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22219%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fpaths%2Fimplement-resource-mgmt-security%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EImplement%20resource%20management%20security%20in%20Azure%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22352%22%3E%3CP%3ELearn%20how%20to%20secure%20resources%20using%20policy%2C%20role-based%20access%20control%20and%20other%20Azure%20services.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22219%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fpaths%2Fmanage-identity-and-access%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EManage%20identity%20and%20access%20in%20Azure%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22352%22%3E%3CP%3ELearn%20how%20to%20work%20with%20subscriptions%2C%20users%2C%20and%20groups%20by%20configuring%20Microsoft%20Azure%20Active%20Directory%20for%20workloads.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22219%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fpaths%2Fmanage-security-operations%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EManage%20security%20operations%20in%20Azure%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22352%22%3E%3CP%3ELearn%20how%20to%20configure%20security%20policies%20and%20manage%20security%20alerts%20with%20the%20tools%20and%20services%20in%20Azure.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22219%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fpaths%2Fsecure-your-cloud-apps%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3ESecure%20your%20cloud%20applications%20in%20Azure%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22352%22%3E%3CP%3ELearn%20how%20to%20secure%20your%20Azure%20apps%20and%20associated%20data%20with%20encryption%2C%20certificates%2C%20and%20policy.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22219%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fpaths%2Fimplement-network-security%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EImplement%20network%20security%20in%20Azure%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22352%22%3E%3CP%3ELearn%20how%20to%20configure%2C%20protect%2C%20and%20isolate%20your%20networks%20in%20Azure.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22219%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fpaths%2Fimplement-host-security%2F%3Fdevcontent0220%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EImplement%20virtual-machine%20host%20security%20in%20Azure%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22352%22%3E%3CP%3ELearn%20how%20to%20protect%20and%20harden%20your%20virtual%20machines%20in%20Azure.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%20to%20all%20of%20these%20great%20resources%2C%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.rsaconference.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERSA%20Conference%3C%2FA%3E%20will%20be%20held%20in%20San%20Francisco%20from%20February%2024-28%2C%20giving%20you%20an%20opportunity%20for%20an%20up%20to%20date%2C%20deep%20dive%20into%20the%20world%20of%20software%20security!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Wallpaper%20Feb%20Final.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F171162iBB9097EB51A1831E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Wallpaper%20Feb%20Final.jpg%22%20alt%3D%22Wallpaper%20Feb%20Final.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1173007%22%20slang%3D%22en-US%22%3E%3CP%3EAs%20a%20developer%2C%20you%20need%20to%20keep%20up%20with%20advances%20in%20software%20and%20infrastructure%20security%2C%20even%20if%20it%20isn%E2%80%99t%20your%20job%20100%25%20of%20the%20time.%20But%20how%20do%20you%20keep%20up%20with%20all%20the%20security%20threats%20that%20are%20constantly%20emerging%2C%20and%20the%20tools%20developed%20to%20combat%20them%3F%20This%20blog%20will%20help%20you%20stay%20up%20to%20date%20on%20the%20latest%20trends%20and%2C%20hopefully%2C%20ease%20your%20concerns.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1173007%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Developer%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EDeveloper%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIoT%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft
Wallpaper Feb Final.jpg

 

Even if software security isn’t your full-time job, people are going to expect you, as a developer, to know what is going on. The good news is there are amazing security innovations happening right now, like using machine learning to analyze security threats with Azure Sentinel and Semmle’s semantic understanding engine to defend against cybersecurity vulnerabilities in open source code on GitHub. But we will touch more on this later!

At a more basic level, when you use Microsoft Azure or Office 365, you have the ability to add automated defenses against common threats like Denial of Service (DDoS) attacks and investigate suspicious activity in your enterprise infrastructure. These defenses include:

  • Azure DDoS Protection: Available in both Basic (free) and Standard versions, DDoS protection will mitigate some of the most common malicious threats against your websites and services. While Basic DDoS Protection gives you active traffic monitoring and automatic attack mitigations, Standard additionally provides mitigation against:
    • Volumetric attacks, including UDP floods, amplification floods, and other spoofed-packet floods.
    • Protocol attacks, including SYN flood attacks, reflection attacks, and other protocol attacks.
    • Resource layer attacks, including HTTP protocol violations, SQL injection, cross-site scripting, and other layer-7 attacks.

If you need a refresher on what DDoS attacks are, Anupam Vij and Scott Hanselman created a great video explaining why it is critical for every business running in Azure to use these services to enhance their security profile.

  • Azure Advanced Threat Protection:  ATP is an enterprise solution that protects your on-premises Active Directory and/or users synced to your Azure Active Directory. It is a cloud-based service that monitors and profiles user behavior, identifies suspicious activity, and investigates alerts and user actions.

 

  • Microsoft Cloud App Security:  MCAS is an add-on for Office 365 that alerts you to suspicious activity on your Office 365 subscription, Azure, and other cloud apps.

 

  • Azure Security Center:  ASC helps you protect your Azure infrastructure, Windows VMs, and Linux VMs. As we move into a world with more devices and sensors being managed over Azure, we are fortunate to have a special version of ASC known as Azure Security Center for IoT, which helps you make sure your edge computing infrastructure, cameras, and other IoT devices are not compromised.

 

  • Microsoft Security Code Analysis.  MSCA plugs into your Azure DevOps continuous integration and delivery (CI/CD) pipeline. If you aren’t already doing continuous integration as part of your development routine, then MSCA is the tool that will get you to start. On every automated build, Security Code Analysis will perform the following checks for you:
    • An anti-malware scanner will run Windows Defender against your app.
    • BinSkim will validate compiler settings, linker settings, and other security-relevant characteristics of binary files. 
    • A credential scanner will make sure you are not exposing any passwords or secrets.
    • Microsoft Security Risk Detection (MSRD) will perform fuzz testing, identifying exploitable security bugs in your software. 
    • If you are using a Microsoft-managed language, Roslyn-based Analyzers will perform a static analysis of your managed C# and Visual Basic code.
    • If you are using TypeScript, TSLint will perform static analysis on your code.

When we look to the future of code and app security, we all hope for even greater automation beyond what these tools and services provide today. This is where machine learning comes in. Azure Sentinel is an AI-based solution that connects to your resources and intelligently looks for new threats and suspicious activity. It uses data connectors to integrate with Azure AD, Azure Security Center, Azure Advanced Threat Protection, and Microsoft Cloud App Security. If you happen to have resources on AWS, you can even use Azure Sentinel to analyze your AWS CloudTrail data. Impressed?

Another jaw-dropping use of machine learning is happening with GitHub’s acquisition of Semmle, which has a semantic-understanding engine for open source code. If you work in GitHub, you may occasionally have qualms about finding the perfect code to solve your problem but being uncertain of its provenance. Semmle provides a declarative query language to search for insecure code patterns. More ambitiously, Semmle is cataloging open source queries for common vulnerabilities, which can then be run against any open source code you are consuming in your own code base. This is the first step in making all the open source code on GitHub fully reliable, removing a major barrier that has been hampering the spread of open source software. It has the potential to change the future of the open source movement.

If you would like to learn more about these security topics, Microsoft Learn has several courses available to help you become an expert on software and cloud security:

Implement resource management security in Azure

Learn how to secure resources using policy, role-based access control and other Azure services.

Manage identity and access in Azure

Learn how to work with subscriptions, users, and groups by configuring Microsoft Azure Active Directory for workloads.

Manage security operations in Azure

Learn how to configure security policies and manage security alerts with the tools and services in Azure.

Secure your cloud applications in Azure

Learn how to secure your Azure apps and associated data with encryption, certificates, and policy.

Implement network security in Azure

Learn how to configure, protect, and isolate your networks in Azure.

Implement virtual-machine host security in Azure

Learn how to protect and harden your virtual machines in Azure.

 

In addition to all of these great resources, the RSA Conference will be held in San Francisco from February 24-28, giving you an opportunity for an up to date, deep dive into the world of software security!

 

Wallpaper Feb Final.jpg