<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Has Microsoft cut security corners once too often? in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61519#M346</link>
    <description>&lt;P&gt;&lt;SPAN&gt;The article stated “Had they stored and managed in an HSM, this whole (China) thing would not have been possible [said Oberlaender]”.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is the crux of the problem.&amp;nbsp; No, not the lack of an HSM, but rather the focus on the "one" root cause.&amp;nbsp; Bullet proof does not exist. Security should come in multiple bullet-resistant layers. S&lt;/SPAN&gt;&lt;SPAN&gt;ee &lt;A href="https://en.wikipedia.org/wiki/Swiss_cheese_model" target="_blank" rel="noopener"&gt;Swiss cheese model&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;An encryption key was compromised.&amp;nbsp; That happens and over time as technology improves (looking at you SSL)&amp;nbsp; That is one layer that failed.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Somebody apparently failed to check an expiration date. Bugs are a known factor in computing. That is another layer that fails on a seemingly daily basis.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The bigger goal needs to be multiple security layers (identity, encryption, validating pedigree of data, routing, physical cabling, guards-with-guns, etc.) all working together to protect the target, each designed to fail loudly and leaving the other layers intact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Aug 2023 02:26:25 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2023-08-08T02:26:25Z</dc:date>
    <item>
      <title>Has Microsoft cut security corners once too often?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61511#M345</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Computerworld has a very interesting article on Microsoft, well worth reading:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.computerworld.com/article/3704132/has-microsoft-cut-security-corners-once-too-often.html" target="_blank"&gt;https://www.computerworld.com/article/3704132/has-microsoft-cut-security-corners-once-too-often.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you agree or disagree?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:41:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61511#M345</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Has Microsoft cut security corners once too often?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61519#M346</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The article stated “Had they stored and managed in an HSM, this whole (China) thing would not have been possible [said Oberlaender]”.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is the crux of the problem.&amp;nbsp; No, not the lack of an HSM, but rather the focus on the "one" root cause.&amp;nbsp; Bullet proof does not exist. Security should come in multiple bullet-resistant layers. S&lt;/SPAN&gt;&lt;SPAN&gt;ee &lt;A href="https://en.wikipedia.org/wiki/Swiss_cheese_model" target="_blank" rel="noopener"&gt;Swiss cheese model&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;An encryption key was compromised.&amp;nbsp; That happens and over time as technology improves (looking at you SSL)&amp;nbsp; That is one layer that failed.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Somebody apparently failed to check an expiration date. Bugs are a known factor in computing. That is another layer that fails on a seemingly daily basis.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The bigger goal needs to be multiple security layers (identity, encryption, validating pedigree of data, routing, physical cabling, guards-with-guns, etc.) all working together to protect the target, each designed to fail loudly and leaving the other layers intact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2023 02:26:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61519#M346</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2023-08-08T02:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Has Microsoft cut security corners once too often?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61541#M347</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;As we all know, it only takes one break in the layers for it to be exploited.&amp;nbsp; Given the organisation, this simply should not have happened had they have correct compliance checks in place.&amp;nbsp; For instance, they have to report to their CEO every 90 days based on the SOX Act.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It appears to me, that they are not doing their due diligence rigorously - simply mistakes like this normally result in financial penalties against the organisation.&amp;nbsp; The issue with Microsoft is they have grown so big, they have forgotten the basics, and many of those checks should be automated and validated to reduce the likelihood of these issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is not good enough - discounts to client&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2023 00:56:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61541#M347</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-08-09T00:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: Has Microsoft cut security corners once too often?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61544#M348</link>
      <description>&lt;P&gt;An encryption key was compromised. That happens and over time as technology improves (looking at you SSL) That is one layer that failed. Somebody apparently failed to check an expiration date. Bugs are a known factor in computing. That is another layer that fails on a seemingly daily basis.&lt;/P&gt;&lt;P&gt;&lt;A href="http://spotiflyer.net" target="_self"&gt;&lt;SPAN&gt;Spotiflyer&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Aug 2023 05:08:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61544#M348</guid>
      <dc:creator>charlie323a</dc:creator>
      <dc:date>2023-08-14T05:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: Has Microsoft cut security corners once too often?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61578#M349</link>
      <description>&lt;P&gt;Another critic from Crowdstrike has come out swinging about Microsoft and security:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.forbes.com/sites/tonybradley/2023/08/10/crowdstrike-microsoft-is-failing-at-security/?sh=602a040a10fe" target="_blank"&gt;https://www.forbes.com/sites/tonybradley/2023/08/10/crowdstrike-microsoft-is-failing-at-security/?sh=602a040a10fe&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Fri, 11 Aug 2023 05:07:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61578#M349</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-08-11T05:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Has Microsoft cut security corners once too often?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61596#M350</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;it only takes one break in the layers for it to be exploited.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;But hopefully a break in one layer only affects that layer.&amp;nbsp; In Azure IAAS, we do not assign public IPs directly to hosts.&amp;nbsp; Instead, we assign the public IP to a 3rd party firewall which NATs to the&amp;nbsp;internal host. This means that for someone to breach our host, it is necessary to both exploit a firewall vulnerability and an Azure vulnerability.&amp;nbsp; This is what I mean by layers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, Azure fights 3rd party firewalls every step of the way by breaking deployment templates if one administratively disables public IPs; by enabling public IPs by default on their PAAS stuff, requiring SAAS be visible over internet (one cannot deny access to the login prompt).&amp;nbsp; And, if we were to host the firewall in Azure, their "routing" [sic] has no concept of a firewall with interfaces in two different routing domains, so routing-around-the firewall is a constant risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Aug 2023 17:30:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/61596#M350</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2023-08-11T17:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: Has Microsoft cut security corners once too often?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/62358#M354</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a follow up to this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/articles/lessons-learned-from-the-microsoft-cloud-breach/" target="_blank"&gt;https://securityintelligence.com/articles/lessons-learned-from-the-microsoft-cloud-breach/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 03:46:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/62358#M354</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-08-30T03:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: Has Microsoft cut security corners once too often?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/62638#M356</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A follow up to the original reports:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/attacks-breaches/microsoft-ids-security-gaps-that-let-threat-actor-steal-signing-key" target="_blank"&gt;https://www.darkreading.com/attacks-breaches/microsoft-ids-security-gaps-that-let-threat-actor-steal-signing-key&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sat, 09 Sep 2023 06:19:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Has-Microsoft-cut-security-corners-once-too-often/m-p/62638#M356</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-09-09T06:19:47Z</dc:date>
    </item>
  </channel>
</rss>

