This project is read-only.

Security Guide User Scenarios

- J.D. Meier, Prashant Bansode, Paul Enfield.

User scenarios are used to help us determine how the provide content in the most useable manner. By mapping out how a typical user might interact with the guidance, we can tailor the experience to better meet their needs.

Search

  • Search for Windows Azure Security / Cloud Security, and lands on MSDN project pages or Codeplex pages.
  • Search for Windows Azure services platform capabilities / products, such as ACS, Geneva Framework etc, and lands on MSDN project pagesor Codeplex pages.
  • Search for Windows Azure Security Guidelines using Key words, for examples ‘Guidelines for using ACS’, and lands on MSDN project pages or Codeplex page.
  • Search for Windows Azure Security Practices using keywords, for example ‘Practices for using ACS’, and land on MSDN project pages or Codeplex page.
  • Search for Windows Azure Security Explained using key words, for example ‘ACS Explained’, and land on MSDN project pages or Codeplex page.
  • Search for Windows Azure actionable guidance using key words such “How to use ACS”, and land on MSDN project pages or Codeplex page.
  • Search for Windows Azure security code samples using key words such as “Demand Claims in Claims enabled web application”, and land on MSDN project pages or Codeplex page.
  • Search using Windows Azure security technology key words, and land on MSDN project pages or Codeplex page.
  • Search for patterns & practices security guidance, and land on MSDN project pages or Codeplex page.
  • Search for videos using key words like Windows Azure Security, and land on projects videos page.

MSDN

  • Browses project tree-view, to look-up Solution-at-a-glance to easily navigate and find solutions to your specific problems.
  • Browses project tree-view, to look-up Fast Track to understand basic approach taken by the guide to help you design, and develop.
  • Browses project tree-view, to look-up chapters for understanding security fundamentals.
  • Browses project tree-view, to look-up chapters for understanding cloud fundamentals.
  • Browses project tree-view, to look-up chapters to understand security aspects while designing cloud based applications.
  • Browses project tree-view, to look-up chapters to understand threats, vulnerabilities and countermeasures for cloud based applications.
  • Browses project tree-view, to look-up chapters to get overview of Azure services platform.
  • Browses project tree-view, to look-up chapters to understand azure security guidelines.
  • Browses project tree-view, to look-up chapters for getting azure security guidance for particular application type.
  • Browses project tree-view, to look-up resources such as checklists, how tos, code samples etc.
  • .

Codeplex

  • Download the e-book for “Windows Azure Security Guide”.
  • Browses and look-up application scenarios addressed by the guide.
  • Browse and look-up Security Frames, for understanding the approach used for creating the guide.
  • Browse and look-up personas targeted by the guide.
  • Browse and look-up capability matrix to understand Windows Azure Services Platform security capabilities.
  • Browse and look-up actionable and modular guidance like guidelines, checklists, how tos, practices etc for doing specific security task at hand.
  • Browse and look-up explained guidance items to get better understanding of Windows Azure Services Platform.
  • Browse and look-up FAQ’s to quickly get an understanding of key security issues related to cloud application.
  • Visits site and wants overview of available resources.
  • Visits site and wants structured and navigate-able view of information.
  • Accidently arrives at site and browses for overview of Windows Azure.
  • Visits site and wants to browse application scenarios in search of closest implementation of current task.
  • Visits site and wants list of threats to specific application type.
  • Visits site and wants roadmap on a particular architecture.
  • Visits site and wants a list of architecture options to address a specific problem.
  • Visits site and wants a high level understanding of topics related to a particular security challenge.
  • Visits site and wants a detailed understanding of a specific technology.
  • Visits site and wants a heat-map of high risk issues for the platform as a whole.
  • Visits site and knows a solution, but wants technology options.
  • Visits site and wants to learn about similar scenarios to a specific solution so they can compare/contrast options.

Visual Studio

  • Presses F1 while coding in Windows Azure framework, finds context sensitive info in p&p Windows Azure doc related off of keywords.
  • Accesses MSDN forums from inside VS, sees link to p&p site.
  • Accesses support KB while coding in Windows Azure Framework, sees Windows Azure project in KB results.

Top Scenarios by User Type

Administrator
Solutions Architect * Search for Windows Azure Security Guide, finds project MSDN link or Codeplex page.
* Visits Codeplex site and wants structured and navigate-able view of information.
* Browses treeview for Azure information, finds node linking to p&p Azure page.
Developer * Wants to browse application scenarios in search of closest implementation of current task.
* Presses F1 while coding in Windows Azure framework, finds context sensitive info in p&p Windows Azure doc related off of keywords.
* Accesses support KB while coding in Windows Azure Framework, sees Windows Azure project in KB results.
Tester * Search Windows Azure security guidance for identifying checklists.
* Search Windows Azure security guidance for guidelines and practices which can be used for verifications.
Security Specialist * Search security guidance for understanding the platform
* Search security guidance to understand common security threats, vulnerabilities and countermeasures.
* Search Security guidance for identifying secure coding best practices and checklists.
Enterprise Architect *
Database Administrator *
Partner / Vendor *
Systems Owner *

Last edited Nov 6, 2009 at 6:32 PM by paulenfield, version 3

Comments

No comments yet.