{"id":25840,"date":"2025-05-15T10:36:12","date_gmt":"2025-05-15T18:36:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2025\/05\/15\/news-19560\/"},"modified":"2025-05-15T10:36:12","modified_gmt":"2025-05-15T18:36:12","slug":"news-19560","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/05\/15\/news-19560\/","title":{"rendered":"14 secure coding tips: Learn from the experts at Microsoft Build"},"content":{"rendered":"<p><strong>Credit to Author: Joey Snow| Date: Wed, 30 Apr 2025 18:00:00 +0000<\/strong><\/p>\n<p class=\"wp-block-paragraph\">Hey friends! If you are a developer, you know that writing clean and efficient code is just the starting point. Now, with AI playing a bigger role, secure coding isn&#8217;t just a &#8216;nice-to-have&#8217;\u2014it&#8217;s a must. Whether you&#8217;re building web apps, working on cloud services, or adding AI to your projects, keeping your code safe is just as important as getting it out the door.<\/p>\n<p class=\"wp-block-paragraph\">At Microsoft Build 2025, we\u2019re bringing together some of the most influential security engineers, researchers, and developers to share practical tips and modern best practices to help you ship secure code \u2014 faster.<\/p>\n<p class=\"wp-block-paragraph\">Here are 14 quick secure coding tips that will make you a better, more security-savvy developer \u2014 and the security sessions @Build where you can learn more from the experts:<\/p>\n<p class=\"wp-block-paragraph\">\ud83c\udfaf 1. Secure AI from the start<br \/>Discover how to deliver intelligent apps without sacrificing security. This session covers how to protect against threats across code, secrets, dependencies, and even LLMs. Learn how to use Threat Modeling early in the product lifecycle to identify, assess and address security risks. You\u2019ll learn about developer-focused security tools to deploy with confidence without context switching.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cShift Left: Secure Your Code and AI from the Start\u201d<br \/>With Mark Russinovich, CTO, Deputy CISO and Technical Fellow, Microsoft Azure; Marcelo Oliveira, VP, Product Management, GitHub; Neil Coles, Principal Security Engineer<br \/>\ud83e\uddea 2. Use the Wisdom from the Past<br \/>Michael Howard &#8211; author of the original secure coding book back in 2003 and now a senior director in the Microsoft Red Team &#8211; reflects on 25 years of secure code, how the practice has developed and current challenges in secure development. Get ready for an end-to-end secure coding journey from Bill Gates anecdotes and tips for how you in 2025 can code securely to meet today&#8217;s security threats.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cReflections on 25 years of writing secure code\u201d<br \/>With Michael Howard, Senior Director, Red Team<br \/>\ud83d\udccf3. Lock down the data<br \/>Microsoft is releasing a set of Purview APIs (+SDK) that will allow partners and customers to integrate their custom AI apps with the Microsoft Purview ecosystem for enterprise grade Data Security and Compliance outcomes. Join this demo session to get the latest.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cBuild secure and compliant AI applications with Microsoft Purview\u201d<br \/>With Arpitha Dhanapathi, Principal Product Manager<br \/>\ud83d\udd1a4. Think about security from start to finish<br \/>Security can be challenging at the best of times, especially when it\u2019s not your full-time job. In this session, we walk you through the end-to-end deployment of a secure AI application, all the way from identities, VNETS, NSGs, key vault through to prompt shields and data labelling. If you\u2019ve ever felt overwhelmed by trying to do the right thing by security but didn\u2019t know where to start, this session is for you!<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cDeploying an end-to-end secure AI application\u201d<br \/>With Sarah Young, Principal Security Advocate &amp; Pamela Fox, Principal Cloud Advocate<br \/>\ud83e\udd16 5. Play dev-ils advocate<br \/>To keep pace with evolving AI risks, organizations need tools to effectively test their AI systems, simulate adversarial attacks, and uncover weaknesses before bad actors can exploit them. Learn how the AI Red Teaming Agent in Azure AI Foundry can help your organization run automated scans for safety risks so you can leverage Microsoft&#8217;s deep expertise to scale and accelerate your AI development with Trustworthy AI at the forefront.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cAccelerate AI red teaming for your GenAI apps with Azure AI Foundry\u201d<br \/>With Minsoo Thigpen, Senior Product Manager &amp; Nagkumar Arkalgud, Senior Software Engineer<br \/>\ud83e\udd776. Skill up on agents<br \/>Agents\u2014they\u2019re all anyone is talking about. Join this demo session to learn how to extend security copilot to facilitate security and IT workflows across your environment. In this demo you will see how to build an agent with supporting components &#8211; plugins and KQL queries &#8211; and architect it with triggers to automatically run.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cBuilding Agents with Security Copilot\u201d<br \/>With Vinod Jagannathan, Principal Product Manager<br \/>\ud83d\udd107. Get the inside scoop first<br \/>One of the pillars of SFI is securing the engineering system. We will explore changes made to Azure DevOps to enable enhanced engineering system security at Microsoft and how customers can use them to better secure their own engineering systems as well.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cLearn How Microsoft secured the Engineering System\u201d<br \/>With Karl Piteira, Principal Group Program Manager &amp; Rajesh Ramamurthy, Senior Director, Principal Group Product Management<br \/>\ud83d\udea98. Automate what you can<br \/>You don\u2019t have to wait to identify risks. The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and engineers to proactively identify risks in generative AI systems. In this hands-on lab, you will learn how to deploy PyRIT and test it against a variety of AI applications.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cAI security testing with PyRIT\u201d<br \/>With Roman Lutz, Responsible AI Engineer &amp; Richard Lundeen, Principal Software Engineering Lead &#8211; AI Red Team<br \/>\u2699\ufe0f 9. Secure APIs<br \/>Join us for an engaging and informative session where we delve into the intricacies of API security in the context of AI. We&#8217;ll examine the unique challenges posed by AI-driven applications and the sophisticated threats that target their APIs. From unauthorized access and data breaches to injection attacks and exploitation of vulnerabilities, the risks are manifold. However, with the right approach, these risks can be effectively mitigated.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cFortifying AI Frontiers &#8211; Securing APIs the path to your AI app\u201d<br \/>With Abhi Singh, Director, Global Black Belt &#8211; Security\u202f&amp; Preetham Anand Naik, Senior Product Manager<br \/>\ud83c\udd94 10. Verify explicitly, and automatically<br \/>We all know the saying, but we\u2019ve got to put it into practice. Join this session to learn how to enable automated processes to securely onboard and grant resource access for high-privilege users with the Microsoft Entra Suite and MS Graph. Verify the identities of admins, C-level employees, or others who need access to sensitive internet or on-premises resources, and automatically reverify them at regular intervals. Work with a chosen identity verification partner for government ID-based verification that ensures your organization onboards and grants access to the right person.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cSecure onboarding and access with the Microsoft Entra Suite\u201d<br \/>With Sri Ponnada, Senior Product Manager<br \/>\u270511. Apply best practices<br \/>Join us for an insightful session on best practices and enablement topics for developing and deploying secure solutions within Business Applications, as part of the Secure Future Initiative (SFI). We will look holistically at Power Platform features for Security under SFI pillars and explore Responsible AI with Purview and Copilot. We will further explore demos, design review checklists on product features under Secure by Design, Secure by Default, and Secure Operations for BizApps Solutions.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cBuilding Secure Business Apps: Best Practices for Design to Deployment\u201d<br \/>With Muhammad Aurangzeb, Senior Partner Solution Architect<br \/>\ud83d\udd76\ufe0f 12. Use agents for Zero Trust<br \/>In this session, you will learn how to build AI Agents using the OpenAI SDK with Assistants and Function Calling for APIs secured by Microsoft Entra ID. This ensures adherence to Zero Trust principles. We will cover the essential steps to set up and configure the OpenAI SDK in a C# environment and demonstrate how to leverage Microsoft Entra ID for secure authentication and authorization.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cBuilding Secure AI Agents with Microsoft Entra ID\u201d<br \/>With Fabian Alves, Senior Product Manager<br \/>\ud83d\ude36\u200d\ud83c\udf2b\ufe0f 13. Secure your apps, secure your people<br \/>Learn how to enable automated processes to securely onboard and grant resource access for high-privilege users with the Microsoft Entra Suite and MS Graph. Verify the identities of admins, C-level employees, or others who need access to sensitive internet or on-premises resources, and automatically reverify them at regular intervals. Work with a chosen identity verification partner for government ID-based verification that ensures your organization onboards and grants access to the right person.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cSecuring Applications with Microsoft Entra ID\u201d<br \/>With Robert Stewart, Senior Specialist<br \/>\ud83d\udcf2 14. Keep it user-friendly for the best results<br \/>In the rapidly evolving landscape of mobile application development, achieving pixel-perfect design and robust security is paramount. This lab focuses on the creation of mobile applications integrated via Native Authentication in Microsoft Entra External ID. Participants will explore the intricacies of designing visually precise user interfaces that align seamlessly with their brand while implementing native authentication methods, ensuring secure and efficient user verification processes.<\/p>\n<p class=\"wp-block-paragraph\">Learn more:<\/p>\n<p class=\"wp-block-paragraph\">Session: \u201cCreating pixel-perfect mobile apps with Native Authentication\u201d<br \/>With Joylynn Kirui, Senior Cloud Security Advocate<br \/>\ud83d\udcac Come Learn from the People Building the Future<br \/>Join these sessions and more at Microsoft Build 2025. Whether you&#8217;re a junior dev or a senior architect, you&#8217;ll walk away with real-world tactics to help you build apps that are secure, scalable, and resilient \u2014 by design.<\/p>\n<p class=\"wp-block-paragraph\">\ud83d\udc49 Register for Microsoft Build Security Sessions Now \u00bb<\/p>\n<p>The post <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/14-secure-coding-tips-learn-from-the-experts-at-build\/4407147\">14 secure coding tips: Learn from the experts at Microsoft Build<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/14-secure-coding-tips-learn-from-the-experts-at-build\/4407147\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Joey Snow| Date: Wed, 30 Apr 2025 18:00:00 +0000<\/strong><\/p>\n<p>At Microsoft Build 2025, we\u2019re bringing together security engineers, researchers, and developers to share practical tips and modern best practices to help you ship secure code faster.<\/p>\n<p>The post <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/14-secure-coding-tips-learn-from-the-experts-at-build\/4407147\">14 secure coding tips: Learn from the experts at Microsoft Build<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-25840","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25840"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25840\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}