• Ten Immutable Laws Of Security (Version 2.0)

    You might have known the 10 Immutable Laws Of Security since quite a while. It is kind of the “collected non-technical wisdom” of what we see in security respeonse being it in Microsoft Security Response Center or in our Security Product Support.

    There is now a version 2, which is still as important as version 1 was. The 10 Laws are:

    Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore.
    Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
    Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
    Law #4: If you allow a bad guy to run active content in your website, it's not your website any more.
    Law #5: Weak passwords trump strong security.
    Law #6: A computer is only as secure as the administrator is trustworthy.
    Law #7: Encrypted data is only as secure as its decryption key.
    Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
    Law #9: Absolute anonymity isn't practically achievable, online or offline.
    Law #10: Technology is not a panacea.

    Just make sure that you keep them in mind – there is no “patch” for them Smile. The whole set of explanations can be found here: Ten Immutable Laws Of Security (Version 2.0)

    Roger

  • Who cares where your data is?

    Wow, I guess the reason for you clicking on the link is this statement – right? Well, “unfortunately” I cannot claim ownership of it. It was made by a Google representative during an interview in Australia: Google: Who cares where your data is?

    To me, the whole Cloud discussion sometimes drives into interesting directions. I often feel that Cloud providers develop a solution and tell the world that the policy decisions were on purpose to protect the customers. Like some providers told the world in the past that you should not care how your data is protected. They take care of your security and you should just trust them – like banks. Nonsense! If you have to prove compliance, you will definitely want to understand how your data is protected and what controls are enforced in the Cloud environment. But as the industry – including the regulators – is still trying to understand the impact of the Cloud, it is a good time to drive such messages and sell the setup as “best practice”.

    Things will change and outdated policies will be adopted to today’s reality but making a statement that you should not care where your data is, simply neglects some “minor” obligations you carry like protection of the privacy of the people you have data from… or the fact that you probably not want your state secrets in another country (even though I do not expect a country putting Top Secret material to the public cloud – yet).

    Just because the Cloud provider does not know, where your data is does not mean that you shouldn't care…

    Roger

  • Security Considerations in a Private Cloud

    I am talking a lot about Cloud Security. There are a few observations I made:

    • Even though a lot of people are talking about the Cloud, there is still not too much knowledge about it. What is a private Cloud versus a public Cloud? What is Infrastructure as a Service, Platform as a Service, Application as a Service? And where are the key differences when it comes to risks?
    • A lot of businesses look at it as an all or nothing. This is simply a massive mistake. There are workloads (like your identity management) you will wait a really long time until you move it to the Cloud and keep on premise. There are others, you might want to move immediately to the public Cloud and some of it will stay in a private Cloud.
    • There is a lot of fear out there and not a lot of frameworks, which can help with to bring the whole discussion to rational level. Actually, there is a lot of material out there but not a lot, which is simple to read and consume.

    That’s the reason, why Doug Cavit and me wrote the Cloud Computing Security Considerations about an year ago. We came up with 5 points to be considered, when looking at the Cloud from a security perspective:

    • Compliance and Risk Management: Organisations shifting part of their business to the cloud are still responsible for compliance, risk, and security management.
    • Identity and Access Management: Identities may come from different providers, and providers must be able to federate from on-premise to the cloud, as well as to enable collaboration across organisation and country borders.
    • Service Integrity: Cloud-based services should be engineered and operated with security in mind, and the operational processes should be integrated into the organisation’s security management.
    • Endpoint Integrity: As cloud-based services originate--and are then consumed--on-premise, the security, compliance, and integrity of the endpoint have to be part of any security consideration.
    • Information Protection: Cloud services require reliable processes for protecting information before, during, and after the transaction.

    These five considerations are very well received and seem to work well for the customers to address part of the points above. The number 1 question I got, however, was: How can apply this to the different scenarios?

    Therefore I am happy to announce, that we just released a paper to the web called: Addressing Cloud Computing Security Considerations with a Partner Private Cloud.

    We show you how to split responsibilities between the partner and the customer and what the considerations mean for both sides – as always, your feedback is more than welcome!

    Finally, stay tuned: In a few days, we will do the same with the public Cloud. This time, however focused on Office365. As soon as we go live with Office365, we will publish it.

    Roger

  • Windows Lifecycle and Support

    One of the things which surprises me often, when talking to customers is, that they do not know, when certain (key) products run out of support – and therefore no security updates will be shipped.

    You should include the following dates in your plans:

    • Windows XP Home: Mainstream support ended 4/14/2009
    • Windows XP Professional: Extended support ends 4/8/2014 (if you did not yet plan to migrate to Windows 7, you should probably start)
    • Windows Vista Ultimate and Windows Vista Home: Mainstream support ends 4/10/2012
    • Windows Vista Enterprise: Extended support ends 4/11/2017
    • Windows NT Server 4.0: Support ended 12/31/2004 (I guess you know that)
    • Windows Server 2003, Enterprise Edition: Extended support ends 7/14/2015
    • Windows Server 2003 R2 Enterprise Edition: Extended support ends 7/14/2015

    If you want to see the full lifecycle database, you will find it on our Lifecycle site.

    This is the general policy:

    Business and Developer products

    Microsoft will offer a minimum of 10 years of support for Business and Developer products. Mainstream Support for Business and Developer products will be provided for 5 years or for 2 years after the successor product (N+1) is released, whichever is longer. Microsoft will also provide Extended Support for the 5 years following Mainstream support or for 2 years after the second successor product (N+2) is released, whichever is longer. Finally, most Business and Developer products will receive at least 10 years of online self-help support.

    Consumer, Hardware, and Multimedia products

    Microsoft will offer Mainstream Support for either a minimum of 5 years from the date of a product’s general availability, or for 2 years after the successor product (N+1) is released, whichever is longer. Extended Support is not offered for Consumer, Hardware, and Multimedia products. Products that release new versions annually, such as Microsoft Money, Microsoft Encarta, Microsoft Picture It!, and Microsoft Streets & Trips, will receive a minimum of 3 years of Mainstream Support from the product's date of availability. Most products will also receive at least 8 years of online self-help support. Microsoft Xbox games are currently not included in the Support Lifecycle policy.

    Roger

  • How Microsoft Uses File Classification Infrastructure

    Quite a while ago, I blogged about the File Classification Infrastructure in Windows Server 2008 R2:

    In my opinion, this is an interesting tool, built in to your server platform.

    Now, we just published a paper about how we use this File Classification infrastructure to protect PII. This is an interesting read: Microsoft IT Uses File Classification Infrastructure to Help Secure Personally Identifiable Information

    Here is the summary:

    In today's high-tech world, collecting and storing data are business-critical processes that form an integral component of daily operations. However, the ever-increasing dependency on and use of electronic data also make data management more challenging—especially in light of government regulations for the appropriate use and storage of personally identifiable information (PII) and financial information. Improper storage of PII can also be a significant financial concern, as the cost of storage-related security breaches can be hundreds of dollars per record.

    Microsoft Information Technology (IT) had been using an internally built solution to help secure personally identifiable information (PII), financial information, and other types of sensitive data by classifying internal file shares and Microsoft® SharePoint® sites. However, this solution was limited to defining information sensitivity at a file-share level. It also required each user to specify the sensitivity level of his or her file shares manually, which frequently led to mislabeled information.

    This custom, internally developed solution also had a high total cost of ownership, requiring a significant amount of development and maintenance resources to fix identified issues and keep the system up to date, as each upgrade to the storage operating systems required upgrading the code.

    Microsoft IT needed a solution that would bring consistency to the file classification process across all teams, and be able to scan content automatically at the file level for key words, terms, and patterns. It then had to apply the correct rights management protection based upon predefined security policies. Cost of ownership and performance were also important drivers for developing a new solution. Microsoft IT needed a system built from off-the-shelf, standardized Microsoft technology, that could scale across terabytes of data. With such a large amount of information, the solution had to be efficient at scanning files while maintaining a high degree of accuracy when identifying sensitive PII.

    Roger