Microsoft Secure Future Initiative (SFI) Skill
Microsoft Secure Future Initiative (SFI) Skill
Security-first development practices aligned with Microsoft's SFI.
⚠️ Staleness Warning
Security practices evolve with new threats, vulnerabilities, and industry standards.
Refresh triggers:
- New CVEs affecting our stack
- Microsoft SFI updates
- Major security incidents (industry-wide)
- Dependency security advisories
- Compliance requirement changes
Last validated: February 2026
Check current state: Microsoft SFI, OWASP, CVE Database
SFI Core Principles
Three principles anchor Microsoft's approach to SFI:
| Principle | Focus |
|---|---|
| Secure by Design | Security comes first when designing any product or service |
| Secure by Default | Protections enabled/enforced by default, require no extra effort, not optional |
| Secure Operations | Security controls and monitoring continuously improved for current/future threats |
Satya's Mandate (May 2024): "If you're faced with the tradeoff between security and another priority, your answer is clear: Do security."
SFI Foundations
Four foundations that underpin successful security operations:
| Foundation | Description |
|---|---|
| Security-first Culture | Daily behaviors reinforced through regular meetings between engineering and SFI leaders |
| Security Governance | Framework led by CISO, partnering with engineering teams to oversee SFI and manage risks |
| Continuous Improvement | Growth mindset integrating feedback and learnings from incidents into standards |
| Paved Paths & Standards | Best practices that optimize productivity, compliance, and security at scale |
SFI Six Pillars
| Pillar | Focus |
|---|---|
| Protect Identities & Secrets | Best-in-class standards for identity/secrets infrastructure, phishing-resistant MFA |
| Protect Tenants & Isolate Systems | Tenant isolation and production system protection |
| Protect Networks | Network security and segmentation |
| Protect Engineering Systems | Secure development infrastructure and CI/CD |
| Monitor & Detect Cyberthreats | Continuous threat monitoring and detection |
| Accelerate Response & Remediation | Fast incident response and recovery |
Secure by Design
Threat Modeling (STRIDE)
| Threat | Question | Mitigation |
|---|---|---|
| Spoofing | Can someone pretend to be someone else? | Authentication |
| Tampering | Can data be modified? | Integrity checks |
| Repudiation | Can actions be denied? | Logging, audit trail |
| Information Disclosure | Can data leak? | Encryption, access control |
| Denial of Service | Can service be disrupted? | Rate limiting, redundancy |
| Elevation of Privilege | Can someone gain more access? | Least privilege |
Security Requirements Checklist
Before coding:
- Authentication method defined
- Authorization model designed
- Data classification done
- Encryption requirements clear
- Logging requirements defined
- Third-party dependencies reviewed
Secure by Default
Principle of Least Privilege
// Bad: Admin access by default
const user = { role: 'admin', permissions: ['*'] };
// Good: Minimum permissions
const user = { role: 'viewer', permissions: ['read:own'] };
Secure Defaults
// Bad: Optional security
createServer({ https: false, cors: '*' });
// Good: Secure by default
createServer({
https: true,
cors: ['https://trusted.com'],
helmet: true
});
Input Validation
// Validate and sanitize ALL input
function processInput(input: unknown) {
const validated = schema.parse(input); // Zod, Joi, etc.
const sanitized = sanitize(validated);
return sanitized;
}
OWASP Top 10 Quick Reference
| Risk | Prevention |
|---|---|
| Broken Access Control | Check permissions on every request |
| Cryptographic Failures | Use strong, modern crypto |
| Injection | Parameterized queries, no string concat |
| Insecure Design | Threat modeling, secure patterns |
| Security Misconfiguration | Secure defaults, remove unused features |
| Vulnerable Components | Dependency scanning, updates |
| Auth Failures | MFA, secure session management |
| Data Integrity | Signatures, checksums |
| Logging Failures | Comprehensive audit logging |
| SSRF | Allowlist URLs, validate requests |
Credential Management
Never Hardcode
// NEVER
const apiKey = 'sk-1234567890abcdef';
// ALWAYS
const apiKey = process.env.API_KEY;
// Or: Azure Key Vault, AWS Secrets Manager, etc.
Rotate Regularly
Credential Type | Rotation Period
--------------------|----------------
API Keys | 90 days
Service Passwords | 90 days
Certificates | 1 year
User Passwords | User discretion + breach response
Secrets in Git
If secrets accidentally committed:
- Revoke immediately — The secret is compromised
- Remove from history —
git filter-branchor BFG - Rotate — Generate new credentials
- Audit — Check for unauthorized use
Dependency Security
Regular Audits
# npm
npm audit
npm audit fix
# Check for outdated
npm outdated
Automated Scanning
- Dependabot (GitHub)
- Snyk
- npm audit in CI/CD
Update Strategy
| Severity | Response Time |
|---|---|
| Critical | 24-48 hours |
| High | 1 week |
| Medium | 2 weeks |
| Low | Next release |
Security Code Review
Checklist
- No hardcoded secrets
- Input validation present
- Output encoding for XSS
- SQL uses parameterized queries
- Auth checks on all endpoints
- Sensitive data encrypted
- Errors don't leak info
- Dependencies up to date
Red Flags
🚩 eval(), exec(), dangerouslySetInnerHTML
🚩 String concatenation in queries
🚩 Disabled security features
🚩 Overly permissive CORS
🚩 Secrets in code or config files
🚩 Missing rate limiting
🚩 Verbose error messages
Incident Response (Security)
- Contain — Limit blast radius
- Preserve — Don't destroy evidence
- Notify — Security team, legal if needed
- Investigate — What happened, how
- Remediate — Fix + prevent recurrence
- Report — Breach notification if required
Synapses
See synapses.json for connections.
More from fabioc-aloha/windowswidget
prompt engineering skill
Craft effective prompts that get the best results from language models.
3text-to-speech
Alex's voice synthesis capability for reading documents aloud
1socratic questioning skill
Help users discover answers, don't just deliver them.
1academic research skill
Patterns for thesis writing, dissertations, research papers, literature reviews, and scholarly work.
1work-life balance skill
Detect burnout signals and proactively support sustainable productivity.
1grant writing skill
Translate research vision into funded reality.
1