Step 6: Use Windows Security Features

When possible, design the system to take advantage of Windows security. Windows has rich support for authentication, authorization, and encryption—which have already undergone threat modeling, security reviews, and a huge amount of testing. Where possible, try to use these built-in capabilities instead of creating your own.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.237.176