Skip to content

Latest commit

 

History

History
17 lines (17 loc) · 2.87 KB

security-governance-compliance.md

File metadata and controls

17 lines (17 loc) · 2.87 KB

Security, Governance and Compliance

Design Considerations

  • Consider what level of logging is necessary to meet your organization’s compliance requirements.
  • Review your security requirements to determine if they allow your web applications to be run on shared network infrastructure or if they require the complete network/virtual machine isolation available with App Service Environments.
  • Review which Web Application Firewall rulesets and/or custom rules are necessary to meet your security and compliance requirements.
  • Evaluate the security of your software supply chain and determine the tools and processes in place to automatically patch application dependency vulnerabilities and reliably deploy them into your environment.

Design Recommendations