Specifying Security Requirements for Applications
The previous chapter discussed how to design a strategy for securing SaaS, PaaS, and IaaS infrastructures. This included building a security baseline for each of these services as well as security requirements for the containers, edge computing, application services, databases, and storage accounts within Azure. This chapter will discuss security requirements for applications, including prioritizing mitigating threats, standards for onboarding new applications, and security strategies for applications and APIs.
In this chapter, we are going to cover the following main topics:
- Specifying priorities for mitigating threats to applications
- Specifying a security standard for onboarding a new application
- Specifying a security strategy for applications and APIs
- Case study – security requirements for applications