200 likes | 337 Views
Trustworthy Computing – One year on. Stuart Okin Chief Security Officer – Microsoft UK Microsoft Security Solutions, Feb 4 th , 2003. Agenda. Reminder – Set the scene & What is Trustworthy Computing? What have we done? What are we planning Call to Action Questions?. Leaving Messages.
E N D
Trustworthy Computing – One year on Stuart Okin Chief Security Officer – Microsoft UK Microsoft Security Solutions, Feb 4th, 2003
Agenda • Reminder – Set the scene & What is Trustworthy Computing? • What have we done? • What are we planning • Call to Action • Questions?
Leaving Messages • Microsoft is as committed to Trustworthy Computing = Security, Privacy, Reliability & Business Integrity • Trustworthy computing can only be achieved through partnership & teamwork • Trustworthy Computing is a journey, with a long term vision with highlights and obstacles along the road
Computer Crime and Security Survey 2002 CERT Threat Remains Real • 90% detected computer security breaches • 40% detected system penetration from the outside; up from 25% in 2000 • 85% detected computer viruses • 95% of all breaches due to misconfiguration Source: Computer Security Institute (CSI) Computer Crime and Security Survey 2002 Source: CERT, 2002
An Industry-Wide Problem • Why are Security breaches common? • Microsoft - Windows UPnP • Oracle – Oracle 9i Buffer Overrun • AOL AIM • CDE/Solaris • Apache – Open SSL Buffer • Viruses, Worms • Nimda, Code Red • Slammer • People will have to believe the in technologies, companies and services
Resilient to attack Protects confidentiality, integrity, availability and data Trustworthy ComputingCore Tenets Security • Individuals control personal data • Products and Online Services adhere to fair information principles Privacy • Dependable • Available when needed • Performs at expected levels Reliability • Help customers find appropriate solutions • Address issues with products and services • Open interaction with customers Business Integrity
Trustworthy Computing Security
SD3 + Communications • Secure architecture • Security aware features • Reduce vulnerabilities in the code Secure by Design • Reduce attack surface area • Unused features off by default • Only require minimum privilege Secure by Default • Protect, detect, defend, recover, manage • Process: How to’s, architecture guides • People: Training Secure in Deployment • Clear security commitment • Full member of the security community • Microsoft Security Response Center Communications Security Framework
SD3 + Communications • Security training for 11,000 engineers • Security code reviews of old source • Threat modeling • “Blackhat” test coverage • Buffer overrun detection in compile process Secure by Design • Office XP: Macros off by default • No sample code installed by default • IIS and SQL Server off by default in Visual Studio.NET Secure by Default • Deployment tools: MBSA, IIS Lockdown, SUS, WU, SMS Value Pack • Created STPP to respond to customers • PAG for Windows 2000 Security Ops Secure in Deployment • TAMs call Premier Customers proactively • MSRC severity rating system • Free virus hotline • MSDN security guidance for developers • www.microsoft.com/technet/security Communications Progress To Date
SQL Slammer January 2003
Summary • January 2002 Memo, follow up, vision • Steve Ballmer: Company Values of respect, customer focus, transparency • Windows XP SP1, Office XP SP1, Windows 2000 SP3, and 72 security fixes for various products. • AutoUpdate; SUS, SMS Feature Pack; MBSA • 10 week halt in release cycles • Training of 11,000 engineers • Security Pushes for Windows, SQL, Exchange, Visual Studio, ISA, Commerce Server and Office B • MS Internal Privacy tracking and measurement tools suite • MSN 8 Parental Controls and Spam Controls • Windows Media Player 9 privacy first-run experience • IE6 and Privacy Wizard implementations • Windows security - $100+ million • Win2K reliability – $162Million, 500 men year on reliability improvements • Software support: now offers 5 years, plus 2 years of extended service
Where are we planning? • Short to Medium Term • Improve Patch Management • Quality • Reduce Installers • Single Microsoft Update Service • Security Push / Engineering techniques “in a box” • Windows 2003 Server (Secure by default) • Longer term • Integration of Security Products (inc ISVs) into system • Next Generation Secure Computing Base • Self Healing & attack sensitive systems • Move applications to .Net Framewrok
Call to action1. Visit www.microsoft.com/security for current information on security2. Subscribe register.microsoft.com/subscription/subscribeMe.asp?lcid=1033&id=1553. Get the toolkitwww.microsoft.com/uk/security
Leaving Messages • Microsoft is as committed to Trustworthy Computing = Security, Privacy, Reliability & Business Integrity • Trustworthy computing can only be achieved through partnership & teamwork • Trustworthy Computing is a journey, with a long term vision with highlights and obstacles along the road