Chapters
Introduction
Introduction
0:00
Introduction
0:00
Misconceptions
Misconceptions
3:06
Misconceptions
3:06
Unprotected public endpoints
Unprotected public endpoints
5:04
What can we do
What can we do
8:07
What can we do
8:07
Broken Authorization
Broken Authorization
12:26
Broken Authorization
12:26
Separating Duties
Separating Duties
15:03
Separating Duties
15:03
Contributor Role
Contributor Role
16:50
Contributor Role
16:50
Scope
Scope
18:27
Scope
18:27
Missing Audit Logging
Missing Audit Logging
19:58
Missing Audit Logging
19:58
Automatic Alerts
Automatic Alerts
23:34
Automatic Alerts
23:34
Legacy Access
Legacy Access
25:25
Legacy Access
25:25
Demo
Demo
29:41
Demo
29:41
What else can I do
What else can I do
30:16
What else can I do
30:16
Security tools
Security tools
31:04
Security tools
31:04
Selfpromotion
Selfpromotion
34:48
Selfpromotion
34:48
Worst customer scenario
Worst customer scenario
35:15
Worst customer scenario
35:15
World Password Day
World Password Day
36:37
World Password Day
36:37
Mindset Change
Mindset Change
42:25
Mindset Change
42:25
Security Teams
Security Teams
44:17
Security Teams
44:17
Security vs Technology
Security vs Technology
46:46
Security vs Technology
46:46
Resources
Resources
50:18
Resources
50:18
Security and Azure
Security and Azure
52:57
Security and Azure
52:57
Sync to video time
Description
30Likes
879Views
2022Jun 21
Transcript
Follow along using the transcript.
Show transcript
Microsoft Developer
588K subscribers
Transcript
NaN / NaN
Show more