Threat Modeling Report

Created on 1/28/2021 10:08:08 AM

Threat Model Name:

Owner:

Reviewer:

Contributors:

Description:

Assumptions:

External Dependencies:


Threat Model Summary:

Not Started327
Not Applicable0
Needs Investigation0
Mitigation Implemented0
Total327
Total Migrated0


Diagram: FuzzingService Threat Model

FuzzingService Threat Model diagram screenshot

FuzzingService Threat Model Diagram Summary:

Not Started119
Not Applicable0
Needs Investigation0
Mitigation Implemented0
Total119
Total Migrated0

Interaction: #.) Azure Function Metrics

#.) Azure Function Metrics interaction screenshot

1. An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

2. An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

3. An adversary may gain unauthorized access to Shared Dashboard account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Shared Dashboard account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

4. An adversary can abuse poorly managed Shared Dashboard account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Shared Dashboard account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

5. An adversary can abuse an insecure communication channel between a client and Shared Dashboard  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Shared Dashboard
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

6. An adversary can deny actions on Shared Dashboard due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

7. An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: #.) Config & Logging Storage SAS Exchange

#.) Config & Logging Storage 
SAS Exchange interaction screenshot

8. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

9. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

10. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

11. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

12. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

13. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

14. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

Interaction: #.) Config & Logging Storage SAS Exchange

#.) Config & Logging Storage 
SAS Exchange interaction screenshot

15. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

16. An adversary can deny actions on Azure Storage (funcXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

17. An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

18. An adversary can abuse poorly managed Azure Storage (funcXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (funcXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

19. An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

20. An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

21. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

Interaction: #.) Config & Logging Storage

#.) Config & Logging
Storage interaction screenshot

22. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

23. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

24. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

25. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

26. An adversary can deny actions on Azure Storage (funcXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

27. An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

28. An adversary can abuse poorly managed Azure Storage (funcXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (funcXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

29. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

30. An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

31. An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

32. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

33. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

34. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

Interaction: #.) Crash & Coverage Storage

#.) Crash & Coverage
Storage interaction screenshot

35. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

36. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

37. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

38. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

39. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

40. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

41. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

42. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

43. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

44. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

45. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

46. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

47. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

Interaction: #.) Traces & Custom Events

#.) Traces & Custom Events interaction screenshot

48. An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

49. An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

50. An adversary may gain unauthorized access to Shared Dashboard account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Shared Dashboard account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

51. An adversary can abuse poorly managed Shared Dashboard account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Shared Dashboard account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

52. An adversary can abuse an insecure communication channel between a client and Shared Dashboard  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Shared Dashboard
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

53. An adversary can deny actions on Shared Dashboard due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

54. An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: #.) Traces & Custom Events

#.) Traces & Custom Events interaction screenshot

55. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

56. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

57. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

58. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

59. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

60. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

Interaction: #.) User-Assigned Managed Identity (IMS) Exchange

#.) User-Assigned
Managed Identity (IMS) Exchange interaction screenshot

61. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

62. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

63. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

64. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

65. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

66. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

Interaction: #.) User-Assigned Managed Identity (IMS) Exchange

#.) User-Assigned
Managed Identity (IMS) Exchange interaction screenshot

67. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

68. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

69. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

70. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

71. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

72. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

Interaction: 10.) Binary & Symbol Exchange

10.) Binary & Symbol Exchange interaction screenshot

73. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

74. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

75. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

76. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

77. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

78. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

Interaction: 13.) Traffic Forward

13.) Traffic Forward interaction screenshot

79. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

80. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

81. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

82. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

83. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

84. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: 17.) Binary & Symbol Exchange

17.) Binary & Symbol Exchange interaction screenshot

85. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

86. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

87. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

88. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

89. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

90. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

91. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: 2.) AAD Token Exchange

2.) AAD Token Exchange interaction screenshot

92. An adversary can get access to a user's session by replaying authentication tokens   [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:An adversary can get access to a user's session by replaying authentication tokens
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that TokenReplayCache is used to prevent the replay of ADAL authentication tokens. Refer: <a href="https://aka.ms/tmtauthn#tokenreplaycache-adal">https://aka.ms/tmtauthn#tokenreplaycache-adal</a>
SDL Phase:Implementation

93. An adversary can bypass authentication due to non-standard Azure AD authentication schemes  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:An adversary can bypass authentication due to non-standard Azure AD authentication schemes
Justification:<no mitigation provided>
Possible Mitigation(s):Use standard authentication scenarios supported by Azure Active Directory. Refer: <a href="https://aka.ms/tmtauthn#authn-aad">https://aka.ms/tmtauthn#authn-aad</a>
SDL Phase:Implementation

94. An adversary can leverage the weak scalability of token cache and cause DoS  [State: Not Started]  [Priority: High] 

Category:Denial of Service
Description:The default cache that ADAL (Active Directory Authentication Library) uses is an in-memory cache that relies on a static store, available process-wide. While this works for native applications, it does not scale for mid tier and backend applications. This can cause availability issues and result in denial of service either by the influence of an adversary or by the large scale of application's users.
Justification:<no mitigation provided>
Possible Mitigation(s):Override the default ADAL token cache with a scalable alternative. Refer: <a href="https://aka.ms/tmtauthn#adal-scalable">https://aka.ms/tmtauthn#adal-scalable</a>
SDL Phase:Design

Interaction: 5.) Resource Deployment

5.) Resource Deployment interaction screenshot

95. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

96. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

97. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

98. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

99. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

100. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

Interaction: 7.) Fuzzer & Private Symbols Upload (Unique SAS Token)

7.) Fuzzer & Private Symbols Upload 
(Unique SAS Token) interaction screenshot

101. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

102. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

103. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

104. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

105. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

106. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

107. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

Interaction: 8.) Job Deployment & Agent Tasks

8.) Job Deployment & Agent Tasks interaction screenshot

108. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

109. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

110. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

111. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

112. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

113. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

Interaction: 8.) Job Deployment & Agent Tasks

8.) Job Deployment & Agent Tasks interaction screenshot

114. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

115. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

116. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

117. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

118. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

119. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation


Diagram: Diagram 2

Diagram 2 diagram screenshot

Diagram 2 Diagram Summary:

Not Started88
Not Applicable0
Needs Investigation0
Mitigation Implemented0
Total88
Total Migrated0

Interaction: AAD Auth Request

AAD Auth Request interaction screenshot

120. An adversary can leverage the weak scalability of token cache and cause DoS  [State: Not Started]  [Priority: High] 

Category:Denial of Service
Description:The default cache that ADAL (Active Directory Authentication Library) uses is an in-memory cache that relies on a static store, available process-wide. While this works for native applications, it does not scale for mid tier and backend applications. This can cause availability issues and result in denial of service either by the influence of an adversary or by the large scale of application's users.
Justification:<no mitigation provided>
Possible Mitigation(s):Override the default ADAL token cache with a scalable alternative. Refer: <a href="https://aka.ms/tmtauthn#adal-scalable">https://aka.ms/tmtauthn#adal-scalable</a>
SDL Phase:Design

121. An adversary can bypass authentication due to non-standard Azure AD authentication schemes  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:An adversary can bypass authentication due to non-standard Azure AD authentication schemes
Justification:<no mitigation provided>
Possible Mitigation(s):Use standard authentication scenarios supported by Azure Active Directory. Refer: <a href="https://aka.ms/tmtauthn#authn-aad">https://aka.ms/tmtauthn#authn-aad</a>
SDL Phase:Implementation

122. An adversary can get access to a user's session by replaying authentication tokens   [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:An adversary can get access to a user's session by replaying authentication tokens
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that TokenReplayCache is used to prevent the replay of ADAL authentication tokens. Refer: <a href="https://aka.ms/tmtauthn#tokenreplaycache-adal">https://aka.ms/tmtauthn#tokenreplaycache-adal</a>
SDL Phase:Implementation

Interaction: Azure Function Metrics

Azure Function Metrics interaction screenshot

123. An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

124. An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

125. An adversary may gain unauthorized access to Shared Dashboard account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Shared Dashboard account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

126. An adversary can abuse poorly managed Shared Dashboard account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Shared Dashboard account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

127. An adversary can abuse an insecure communication channel between a client and Shared Dashboard  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Shared Dashboard
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

128. An adversary can deny actions on Shared Dashboard due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

129. An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Binary & Symbols Upload

Binary & Symbols Upload interaction screenshot

130. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

131. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

132. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

133. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

134. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

135. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Binary & Symbols Upload

Binary & Symbols Upload interaction screenshot

136. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

137. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

138. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

139. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

140. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

141. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Config & Logging Storage SAS

Config & Logging Storage SAS interaction screenshot

142. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

143. An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

144. An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

145. An adversary can abuse poorly managed Azure Storage (funcXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (funcXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

146. An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

147. An adversary can deny actions on Azure Storage (funcXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

148. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Config & Logging Storage

Config & Logging
Storage interaction screenshot

149. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

150. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

151. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

152. An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

153. An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

154. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

155. An adversary can abuse poorly managed Azure Storage (funcXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (funcXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

156. An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

157. An adversary can deny actions on Azure Storage (funcXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

158. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

159. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

160. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

161. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Crash & Coverage Storage SAS

Crash & Coverage Storage SAS interaction screenshot

162. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

163. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

164. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

165. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

166. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

167. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

168. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Crash & Coverage Storage

Crash & Coverage
Storage interaction screenshot

169. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

170. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

171. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

172. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

173. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

174. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

175. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

176. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

177. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

178. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

179. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

180. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

181. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Fuzzer & Private Symbols Upload (Unique SAS Token)

Fuzzer & Private Symbols Upload 
(Unique SAS Token) interaction screenshot

182. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

183. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

184. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

185. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

186. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

187. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

188. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Resource Deployment & Setup

Resource Deployment & Setup interaction screenshot

189. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

190. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

191. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

192. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

193. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

194. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Traces & Custom Events

Traces & Custom Events interaction screenshot

195. An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

196. An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

197. An adversary may gain unauthorized access to Shared Dashboard account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Shared Dashboard account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

198. An adversary can abuse poorly managed Shared Dashboard account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Shared Dashboard account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

199. An adversary can abuse an insecure communication channel between a client and Shared Dashboard  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Shared Dashboard
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

200. An adversary can deny actions on Shared Dashboard due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

201. An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Traffic Forward

Traffic Forward interaction screenshot

202. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

203. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

204. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

205. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

206. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

207. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design


Diagram: Diagram 1

Diagram 1 diagram screenshot

Diagram 1 Diagram Summary:

Not Started120
Not Applicable0
Needs Investigation0
Mitigation Implemented0
Total120
Total Migrated0

Interaction: AAD Auth Request

AAD Auth Request interaction screenshot

208. An adversary can leverage the weak scalability of token cache and cause DoS  [State: Not Started]  [Priority: High] 

Category:Denial of Service
Description:The default cache that ADAL (Active Directory Authentication Library) uses is an in-memory cache that relies on a static store, available process-wide. While this works for native applications, it does not scale for mid tier and backend applications. This can cause availability issues and result in denial of service either by the influence of an adversary or by the large scale of application's users.
Justification:<no mitigation provided>
Possible Mitigation(s):Override the default ADAL token cache with a scalable alternative. Refer: <a href="https://aka.ms/tmtauthn#adal-scalable">https://aka.ms/tmtauthn#adal-scalable</a>
SDL Phase:Design

209. An adversary can bypass authentication due to non-standard Azure AD authentication schemes  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:An adversary can bypass authentication due to non-standard Azure AD authentication schemes
Justification:<no mitigation provided>
Possible Mitigation(s):Use standard authentication scenarios supported by Azure Active Directory. Refer: <a href="https://aka.ms/tmtauthn#authn-aad">https://aka.ms/tmtauthn#authn-aad</a>
SDL Phase:Implementation

210. An adversary can get access to a user's session by replaying authentication tokens   [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:An adversary can get access to a user's session by replaying authentication tokens
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that TokenReplayCache is used to prevent the replay of ADAL authentication tokens. Refer: <a href="https://aka.ms/tmtauthn#tokenreplaycache-adal">https://aka.ms/tmtauthn#tokenreplaycache-adal</a>
SDL Phase:Implementation

Interaction: Azure Function Metrics

Azure Function Metrics interaction screenshot

211. An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

212. An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

213. An adversary may gain unauthorized access to Shared Dashboard account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Shared Dashboard account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

214. An adversary can abuse poorly managed Shared Dashboard account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Shared Dashboard account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

215. An adversary can abuse an insecure communication channel between a client and Shared Dashboard  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Shared Dashboard
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

216. An adversary can deny actions on Shared Dashboard due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

217. An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Binary & Symbols Upload

Binary & Symbols Upload interaction screenshot

218. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

219. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

220. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

221. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

222. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

223. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Binary & Symbols Upload

Binary & Symbols Upload interaction screenshot

224. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

225. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

226. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

227. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

228. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

229. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Config & Logging Storage SAS

Config & Logging Storage SAS interaction screenshot

230. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

231. An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

232. An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

233. An adversary can abuse poorly managed Azure Storage (funcXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (funcXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

234. An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

235. An adversary can deny actions on Azure Storage (funcXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

236. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Config & Logging Storage

Config & Logging
Storage interaction screenshot

237. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

238. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

239. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

240. An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

241. An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (funcXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

242. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

243. An adversary can abuse poorly managed Azure Storage (funcXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (funcXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

244. An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (funcXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

245. An adversary can deny actions on Azure Storage (funcXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

246. An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (funcXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

247. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

248. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

249. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Crash & Coverage Storage SAS

Crash & Coverage Storage SAS interaction screenshot

250. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

251. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

252. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

253. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

254. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

255. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

256. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Crash & Coverage Storage

Crash & Coverage
Storage interaction screenshot

257. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

258. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

259. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

260. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

261. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

262. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

263. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

264. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

265. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

266. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

267. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

268. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

269. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Fuzzer & Private Symbols Upload (Unique SAS Token)

Fuzzer & Private Symbols Upload 
(Unique SAS Token) interaction screenshot

270. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

271. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

272. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

273. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

274. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

275. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

276. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Repro Command (SSH/RDP)

Repro Command (SSH/RDP) interaction screenshot

277. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

278. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

279. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

280. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

281. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

282. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Resource Deployment & Setup

Resource Deployment & Setup interaction screenshot

283. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

284. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

285. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

286. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

287. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

288. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Retrieve Binaries

Retrieve Binaries interaction screenshot

289. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

290. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

291. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

292. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

293. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

294. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

295. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

296. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

297. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

298. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

299. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

300. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

301. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Retrieve Binaries

Retrieve Binaries interaction screenshot

302. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

303. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

304. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

305. An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

306. An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Azure Storage (fuzzXX) account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

307. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

308. An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Azure Storage (fuzzXX) account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

309. An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Azure Storage (fuzzXX)
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

310. An adversary can deny actions on Azure Storage (fuzzXX) due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

311. An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Azure Storage (fuzzXX) due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

312. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

313. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

314. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design

Interaction: Traces & Custom Events

Traces & Custom Events interaction screenshot

315. An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak access control restrictions
Justification:<no mitigation provided>
Possible Mitigation(s):Grant limited access to objects in Azure Storage using SAS or SAP. It is recommended to scope SAS and SAP to permit only the necessary permissions over a short period of time. Refer: <a href="https://aka.ms/tmt-th17a">https://aka.ms/tmt-th17a</a> and <a href="https://aka.ms/tmt-th17b">https://aka.ms/tmt-th17b</a>
SDL Phase:Implementation

316. An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard instances due to weak network configuration
Justification:<no mitigation provided>
Possible Mitigation(s):It is recommended to restrict access to Azure Storage instances to selected networks where possible. <a href="https://aka.ms/tmt-th140">https://aka.ms/tmt-th140</a>
SDL Phase:Implementation

317. An adversary may gain unauthorized access to Shared Dashboard account in a subscription  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to Shared Dashboard account in a subscription
Justification:<no mitigation provided>
Possible Mitigation(s):Assign the appropriate Role-Based Access Control (RBAC) role to users, groups and applications at the right scope for the Azure Storage instance. Refer: <a href="https://aka.ms/tmt-th67">https://aka.ms/tmt-th67</a>
SDL Phase:Implementation

318. An adversary can abuse poorly managed Shared Dashboard account access keys  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can abuse poorly managed Shared Dashboard account access keys and gain unauthorized access to storage.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure secure management and storage of Azure storage access keys. It is recommended to rotate storage access keys regularly, in accordance with organizational policies. Refer: <a href="https://aka.ms/tmt-th63">https://aka.ms/tmt-th63</a>
SDL Phase:Implementation

319. An adversary can abuse an insecure communication channel between a client and Shared Dashboard  [State: Not Started]  [Priority: Medium] 

Category:Information Disclosure
Description:An adversary can abuse an insecure communication channel between a client and Shared Dashboard
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that communication to Azure Storage is over HTTPS. It is recommended to enable the secure transfer required option to force communication with Azure Storage to be over HTTPS. Use Client-Side Encryption to store sensitive data in Azure Storage. Refer: <a href="https://aka.ms/tmt-th65">https://aka.ms/tmt-th65</a>
SDL Phase:Implementation

320. An adversary can deny actions on Shared Dashboard due to lack of auditing   [State: Not Started]  [Priority: Medium] 

Category:Repudiation
Description:Proper logging of all security events and user actions builds traceability in a system and denies any possible repudiation issues. In the absence of proper auditing and logging controls, it would become impossible to implement any accountability in a system.
Justification:<no mitigation provided>
Possible Mitigation(s):Use Azure Storage Analytics to audit access of Azure Storage. If possible, audit the calls to the Azure Storage instance at the source of the call. Refer: <a href="https://aka.ms/tmt-th20">https://aka.ms/tmt-th20</a>
SDL Phase:Implementation

321. An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary can gain unauthorized access to Shared Dashboard due to weak CORS configuration
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that only specific, trusted origins are allowed. Refer: <a href="https://aka.ms/tmt-th21">https://aka.ms/tmt-th21</a>
SDL Phase:Implementation

Interaction: Traffic Forward

Traffic Forward interaction screenshot

322. An adversary may gain unauthorized access to data on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:An adversary may gain unauthorized access to data on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that proper ACLs are configured to restrict unauthorized access to data on the device. Refer: <a href="https://aka.ms/tmtauthz#acl-restricted-access">https://aka.ms/tmtauthz#acl-restricted-access</a> Ensure that sensitive user-specific application content is stored in user-profile directory. Refer: <a href="https://aka.ms/tmtauthz#sensitive-directory">https://aka.ms/tmtauthz#sensitive-directory</a>
SDL Phase:Implementation

323. An adversary may gain elevated privileges and execute malicious code on host machines  [State: Not Started]  [Priority: High] 

Category:Elevation of Privileges
Description:If an application runs under a high-privileged account, it may provide an opportunity for an adversary to gain elevated privileges and execute malicious code on host machines. E.g., If the developed executable runs under the logged-in user's identity and the user has admin rights on the machine, the executable will be running with administrator privileges. Any unnoticed vulnerability in the application could be used by adversaries to execute malicious code on the host machines that run the application.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that the deployed applications are run with least privileges. . Refer: <a href="https://aka.ms/tmtauthz#deployed-privileges">https://aka.ms/tmtauthz#deployed-privileges</a>
SDL Phase:Implementation

324. An adversary may gain access to sensitive data stored on host machines  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:An adversary may gain access to sensitive data stored on host machines
Justification:<no mitigation provided>
Possible Mitigation(s):Consider using Encrypted File System (EFS) is used to protect confidential user-specific data. Refer: <a href="https://aka.ms/tmtdata#efs-user">https://aka.ms/tmtdata#efs-user</a> Ensure that sensitive data stored by the application on the file system is encrypted. Refer: <a href="https://aka.ms/tmtdata#filesystem">https://aka.ms/tmtdata#filesystem</a>
SDL Phase:Design

325. An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may spread malware, steal or tamper data due to lack of endpoint protection on devices. Scenarios such as stealing a user's laptop and extracting data from hard disk, luring users to install malware, exploit unpatched OS etc.
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that devices have end point security controls configured as per organizational policies. Refer: <a href="https://aka.ms/tmtconfigmgmt#controls-policies">https://aka.ms/tmtconfigmgmt#controls-policies</a>
SDL Phase:Design

326. An adversary may reverse engineer deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may reverse engineer deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that binaries are obfuscated if they contain sensitive information. Refer: <a href="https://aka.ms/tmtdata#binaries-info">https://aka.ms/tmtdata#binaries-info</a>
SDL Phase:Implementation

327. An adversary may tamper deployed binaries  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:An adversary may tamper deployed binaries
Justification:<no mitigation provided>
Possible Mitigation(s):Ensure that deployed application's binaries are digitally signed. Refer: <a href="https://aka.ms/tmtauthn#binaries-signed">https://aka.ms/tmtauthn#binaries-signed</a>
SDL Phase:Design