210 likes | 403 Views
Security @ Microsoft. Anirudh Singh Rautela │ Technology Specialist - Security. Agenda. The Microsoft TWC Initiative Security & Privacy Progress Windows Platform Security. Trustworthy Computing. Predictable , consistent, responsive service Maintainable , easy to configure and manage
E N D
Security @ Microsoft Anirudh Singh Rautela │ Technology Specialist - Security
Agenda • The Microsoft TWC Initiative • Security & Privacy Progress • Windows Platform Security
Trustworthy Computing Predictable, consistent, responsive service Maintainable, easy to configure and manage Resilient, works despite changes Recoverable, easily restored Proven, ready to operate Commitment to customer-centric Interoperability Automated Policy based solutions Recognized industry leader, world-class partner Open, transparent Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC) Microsoft Security Engineering Center (MSEC) Microsoft Privacy Guidelines for developing Software and Services Microsoft Data Governance Framework Managing and Protecting Personal Information Secure against attacks Protects confidentiality, integrity and availability of data and systems Build solutions that protect privacy Safe guard your corporate data Protect Personal Privacy Microsoft Online Crash Analysis Engineering Excellence Training and Guidelines Microsoft Online Services with high reliability in multiple data centers Vendor Engagement and Windows Hardware Quality Lab Business Continuity explicitly designed in with prescriptive guidance Interop Vendor Alliance Open Source Software Lab Transparent Practices (SDL, Codeplex, etc.) SQL Server 2005 Visual Studio 2005 Windows Server 2003 SP1 Malicious SW Removal Tool Windows Defender Windows Live OneCare TWC Announced SDL begins Windows XP SP2 DSI Launched Windows Vista Office 2007 Forefront Windows Server 2008 SQL Server 2008 Windows Server 2003 2002 2003 2004 2005 2006 2007 2008
Centers Supporting TwC Security TwC Security Protecting Microsoft customers throughout the entire life cycle (in development, deployment and operations) Microsoft Security Response Center (MSRC) Conception Microsoft Security Engineering Center (MSEC) EcoStrat Product Life Cycle MSRC Ops SDL MSRC Engineering Security Assurance Microsoft Malware Protection Center (MMPC) Security Science Release
The Microsoft Security Development Lifecycle Goals • Protect Microsoft customers by • Reducing the numberof vulnerabilities • Reducing the severityof vulnerabilities Key Principles • Prescriptive yet practical approach • Proactive – not just “looking for bugs” • Eliminate security problems early • Secure by design Microsoft SecurityResponse Center Conception Best Practicesand Learning ProductDevelopment Incident Response Secure Design Final Security Review Secure Implementation Release Internal Testing Beta Testing Verification
Embedding Security Into Software And Culture At Microsoft, we believe that delivering secure software requires Executive commitment SDL a mandatory policy at Microsoft since 2004 Training Training Requirements Requirements Design Design Implementation Implementation Verification Verification Release Release Response Response • Core training • Core training • Analyze security and privacy risk • Define quality gates • Analyze security and privacy risk • Define quality gates • Threat modeling • Attack surface analysis • Threat modeling • Attack surface analysis • Specify tools • Enforce banned functions • Static analysis • Specify tools • Enforce banned functions • Static analysis • Dynamic/Fuzz testing • Verify threat models/attack surface • Dynamic/Fuzz testing • Verify threat models/attack surface • Response plan • Final security review • Release archive • Response plan • Final security review • Release archive • Response execution • Response execution Technology and Process Education Accountability Ongoing Process Improvements 6 month cycle
Microsoft Security Strategy Infrastructure Optimization Microsoft Windows VistaSecurity Whitepapers Learning Paths forSecurity Professionals Microsoft SecurityAssessment Toolkit Microsoft SecurityIntelligence Report Microsoft IT Showcase SecurityReadiness Security Tools & Papers Educationand Training Prescriptive Guidance
Security and Privacy Industry Partnerships Public Policy Law Enforcement Consumer Awareness Industry Partnership Global Infrastructure Alliance for Internet Safety Global Phishing Enforcement Initiative Digital PhishNet Virus Information Alliance
Handy Admin tools & resources • Threats & Counter measures • Security Risk Management Guide • Fundamental Computer Investigation Guide for Windows • Microsoft Security Assessment Tool 4.0 • MBSA Tool & Scripts • Microsoft Security Compliance Manager • Security Awareness Toolkit • SysInternals Toolkit • Security Literature to read • Misc. Security Tools for Admins
Security And Privacy Progress SDL and SD3 Defense in Depth Threat Mitigation • Microsoft Security Response Center (MSRC) • Microsoft Malware Protection Center (MMPC) • Windows Live OneCare and Forefront Client Security, powered by the Microsoft Malware Protection Center • SPAM (Sender ID, Phishing Filters) • Network Access Protection (NAP/NAC) • Security Development Lifecycle process • Engineered for security • Design threat modeling • SD3 • Secure by Design • Secure by Default • Secure In Deployment • Automated patching and update services • Malware Example • Consumer Education • Laws • Firewalls • Antivirus Products • Antispyware Products • Malicious Software Removal Tool • Memory Management (ASLR) • Law Enforcement
Comparing Incidents BlasterAugust 2003 SasserApril 2004 ZotobAugust 2005 MS08-067October 2008 Before publicly known (MAPP) Alert and prescriptive guidance Within 1 day Within 2 hours 2 days prior Online guidance/ Webcast Within 10 days Within 2 days 3 times, 2x Same day Same day Free worm removal tool Within 38 days Within 3 days Within 3 days Didn’t need one* Days after the patch we knew of 1st exploit +11 days +4 days +2 days -11 days Products not affected by attacks Vista, Win7 Server 2008 none none XPSP2 *at the time of the security update release and the immediate aftermath
Software Vulnerability DisclosuresBy half year – industry wide • Vulnerability disclosures in 2H08 down 3% from 1H08 • 2008 as a whole down 12% from 2H07 • Microsoft proportion only 5% of industry total Industry-wide vulnerabilitydisclosures by half-year, 2H03-2H08 Vulnerability disclosures for Microsoft products, by full year, 2004-2008
What Are Experts Saying? “Why try to chase a difficult overflow out of Vista when you have Acrobat Reader installed, some antivirus software with shoddy file parsing, and the latest iTunes?” Given this situation, Microsoft deserves high praise for creating, formalizing, and improving SDL as it has led to better software for the masses.” Halvar Flake Security Researcher Microsoft BlueHatConference September 2007 Jon Oltsik Enterprise Strategy Group September 2008
WINDOWS PLATFORM SECURITY Core improvements to the Operating Systems Security by Design, by Default and by Deployment
Internet Explorer 8 Security Building on IE7 and addressing the evolving threat landscape • Social Engineering & Exploits • Reduce unwanted communications • Freedom from intrusion • International Domain Names • Pop-up Blocker • Increased usability • Browser & Web Server Exploits • Protection from deceptive websites, malicious code, online fraud, identity theft • Protection from harm • Secure Development Lifecycle • Extended Validation (EV) SSL certs • SmartScreen® Filter • Domain Highlighting • XSS Filter/ DEP/NX • ActiveX® Controls • Choice and control • Clear notice of information use • Provide only what is needed • Control of information • User-friendly, discoverable notices • P3P-enabled cookie controls • Delete Browsing History • InPrivate™ Browsing & Filtering
SecurePlatform • Security Development Lifecycle (SDL) • Kernel Patch Protection • Kernel-mode Driver Signing • Secure Startup • Windows Service Hardening • x64 Hardware Integration Data Protection • Rights Management Services (RMS) • SharePoint, Exchange, Windows Mobile integration • Encrypting File System (EFS) • Bitlocker & Bitlocker To Go • Native smart card support • GINA Re-architecture • Certificate Services • Credential roaming • AppLockerTM • DirectAccess • User Account Control • Network Access Protection (NAP) • IPv6 • IPsec • Windows CardSpace SecureAccess • Windows Defender • IE Protected Mode • Address Space Layout Randomization (ASLR) • Data Execution Prevention (DEP) Malware Protection • Bi-directional Firewall / multi profile Support • Windows Security Center
Security Development Lifecycle (SDL) • Windows Server Virtualization (Hypervisor) • Role Management Tool • OS File Integrity SecurePlatform Data Protection • Network Access Protection (NAP) • Server and Domain Isolation with IPsec • End-to-end Network Authentication • Windows Firewall With Advanced Security • On By Default • DirectAccess Network Protection • Rights Management Services (RMS) • Full volume encryption (Bitlocker) • USB Device-connection rules with Group Policy • Improved Auditing • Windows Server Backup • EFS Identity Access • Read-only Domain Controller (RODC) • Active Directory Federation Services (ADFS) • Administrative Role Separation • PKI Management Console • Online CertificateStatus Protocol
Windows Server Core Server, Server Roles(for example only) • Minimal installation option • Low surface area more secure • Command line interface • Less patching/Less downtime TS IAS WebServer SharePoint Etc… Server With WinFx, Shell, Tools, etc. Server Core Server Roles DNS DHCP File/ Print AD Hyper-V BasicWeb Server Core Security, TCP/IP, File Systems, RPC,plus other Core Server Sub-Systems GUI, CLR, Shell, IE, Media, OE, etc.
Services Encrypting File System (EFS) BitLocker™ Information Protection Identity & AccessManagement SystemsManagement Microsoft Security: Defense In Depth A well Managed Secure Infrastructure is the key! Edge Edge Server Applications Server Applications Network Access Protection (NAP) Client and Server OS Client and Server OS Certificate Lifecycle Management Active Directory Federation Services (ADFS) Mobile Device Manager 2008 TWC Data Protection Manager Configuration Manager 2007 SDL Operations Manager 2007