Advancing Security Progress and Commitment John Wylder CISSP, CHS Strategic Security Advisor

Slides:



Advertisements
Similar presentations
Network Access Protection & Network Admission Control March 10, 2005 Teerapol Tuanpusa Network Consultant Cisco Systems Thailand Jirat Boomuang Technology.
Advertisements

Desktop Value - Introducing Windows XP Service Pack 2 with Advanced Security Technologies Presenter: James K. Murray Title: Information Technologies Consultant.
(n)Code Solutions Presentation on the importance of a Secure Technology Infrastructure.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Network Security In Education A Balancing Act Doug Klein CTO Vernier Networks, Inc.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
SAGE-AU Adelaide Windows Update Services Michael Kleef IT Pro Evangelist Microsoft Corporation Level 200.
The State of Security Management By Jim Reavis January 2003.
Information for Developers Windows XP Service Pack 2 Information for Developers.
Controls for Information Security
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Norman SecureSurf Protect your users when surfing the Internet.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Empower your workers and boost productivity Microsoft ® Windows ® Vista Business and Office Small Business 2007 on HP desktops, notebooks and workstations.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Preparing your Fabric & Apps for Windows Server 2003 End of Support Jeff Woolsey Principal Program Manager.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
HP and Microsoft Solutions for Microsoft Exchange Server 2007 with HP Servers and Storage Presented by: Plaza Dynamics.
Paul Butterworth Management Technology Architect
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Network security Product Group 2 McAfee Network Security Platform.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Microsoft Management Seminar Series SMS 2003 Change Management.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
Benjamin Naden Windows Client Group Manager, Microsoft Singapore.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Advancing Security Progress and Commitment Stuart Okin Chief Security Advisor – Microsoft UK Delivering on security (an update on progress)
Advancing Security Progress and Commitment. Individual control of personal data Products, online services adhere to fair information principles Protects.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
Importance of Physical Security Common Security Mistakes 1.Security Awareness 2.Incident Response 3.Poor Password Management 4.Bad administrative.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Customer Guide to Limited-Time Offer
Forefront Security ISA
Threat Management Gateway
Microsoft’s Security Strategy
Check Point Connectra NGX R60
Implementing Client Security on Windows 2000 and Windows XP Level 150
Microsoft’s evolving view of Project Management
Agenda The current Windows XP and Windows XP Desktop situation
Security in the Real World – Plenary Day One
In the attack index…what number is your Company?
Mark Quirk Head of Technology Developer & Platform Group
Using Software Restriction Policies
Microsoft Virtual Academy
Presentation transcript:

Advancing Security Progress and Commitment John Wylder CISSP, CHS Strategic Security Advisor

Advancing Security Progress and Commitment Agenda Update on current security Issues Comments on threats and vulnerabilities Microsoft’s response Suggestions and guidance Questions and (hopefully) answers

Breaking news…. Microsoft update full of tests “The biggest Windows security upgrade walks a fine line between making things safe and making things work” The Oregonian Monday, July 19, 2004

Breaking news part 2…. Mobile device virus Antivirus researchers have discovered the first bug to target Microsoft's Pocket PC Russian-based antivirus firm Kaspersky Labs said Duts was created by Ratter, the pseudonym of a virus writer who is an active member of the international group 29A. The group is famous for its proof-of-concept viruses, like the mobile phone-targeting Cabir and Rugrat, the first known virus capable of attacking 64-bit Windows files. search security.com July 19, 2004

System Security Security Ecosystem Host Application Account Trust Network External Influences (people, bugs, etc.) Exploit of misconfiguration, buffer overflows, open shares, NetBIOS attacks Unauthenticated access to applications, unchecked memory allocations Compromise of integrity or privacy of accounts Data sniffing on the wire, network fingerprinting Unmanaged trusts enable movement among environments

The Typical Security Environment Today …hard to manage, to support and ever increasingly complex

Exploit Timeline Days From Patch to Exploit The average is now nine days for a patch to be reverse- engineered As this cycle keeps getting shorter, patching is a less effective defense in large organizations Why does this gap exist? Blaster Welchia/ Nachi Nimda 25 SQL Slammer exploit code patch Days between patch and exploit

Top information security issues for 2004 Viruses and worms remain biggest worry Patch management The patch management issue relates directly to the concern over viruses and worms. “Hybrid threats will drive the need for hybrid solutions” Ed Yakabovicz ISO for Bank One’s Corporate Internet group. “2004 might just be the year that the next big worm carries a destructive payload.” Kevin Beaver, CISSP. Principle Logic.

Top information security issues for 2004,part 2. Compliance with regulations (HIPPA, GLB) is a growing concern Is regulation the principal driver for security in your enterprise? Yes (45%). How will compliance impact your security spending? 15% say “compliance is a big chunk of our budget. source searchsecurity.com 1/14/2004 “A combination of laws and regulations will push companies and organizations towards more security, but it will still take longer than you would like.” Jonathan Callas, CTO PGP.

Why businesses continue to get attacked by viruses, worms, and frauds? Failure to recognize that security is a process issue, not an object, requiring risk management & responsiveness No 100% perfect security Security is only as strong as the weakest link When nothing happens, well, nothing happens No attention translates to zero or limited security budget and investment No provision equals no security readiness Feel-safe syndrome – we have not been attacked in the past

Why businesses continue to get attacked by viruses, worms, and frauds? There are no magic beans, no silver bullets Fraudsters and attackers exploits the weakest links – it could be your technology, process, and/or people (including employees, partners, and customers)

Awareness alone is not enough “The organizers of the conference Infosecurity Europe 2004 announced that they surveyed office workers at Liverpool Street Station in England, and found that 71 percent were willing to part with their password for a chocolate bar.” Security pipeline April 20, 2004

Usage of Firewalls Source: Microsoft Customer Risk Assessments

Mapping Worms to “User” Days of Risk Reaction time is critical in preventing viruses and worms, which can cost organizations billions. Forrester Research said that customers typically required more than 300 days to fully deploy patches for many of these issues after the fix appeared. The race begins when the technical details of an issue are made public. Worm Number of days from release of exploit to worm appearance Scalper (2002, FreeBSD) (*early disclosure) 11 days Blaster (2003, Windows) 16 days Code Red (2001, Windows) 24 days Lion (2001, Linux) 53 days Slapper (2002, Linux) 58 days Melissa (1999, Windows) 64 days Nimda (2001, Windows) 172 days Slammer (2003, Windows) 180 days Ramen (2001, Linux) 208 days Source: Microsoft, Forrester

Security Enabled Business Reduce Security Risk Assess the environment Improve isolation and resiliency Develop and implement controls Increase Business Value Connect with customers Integrate with partners Empower employees Risk Level Impact to Business Probability of Attack ROI Connected Productive

Give us better access control” “ Give us better access control” ” Develop reliable and secure software “ Develop reliable and secure software ” Simplify critical maintenance “ Simplify critical maintenance ” “Reduce impact of malware” Improve Updating Engineering Excellence Authentication, Authorization, Access Control Isolation and Resiliency Provide better guidance “ Provide better guidance ” Deliver Security Guidance, Tools, Responsiveness

Isolation And Resiliency Mitigating risk through innovation Reduce attack surface and vectors Proactively deflect and contain threats A computing platform that is more resilient in the presence of security threats

Isolation and Resiliency reducing the modes of attack Communicate and collaborate in a more secure manner without sacrificing information worker productivity Protection Against Buffer Overruns Network Protection Safer and IM Safer Web Browsing

Isolation and Resiliency Future: Active Protection Application-aware firewalls Application-aware firewalls Intrusion prevention Intrusion prevention Dynamic system protection Dynamic system protection Behavior blocking Behavior blocking

Advanced Isolation Clients who do not pass can be blocked and isolated Isolated clients can be given access to updates to get healthy Isolation And Resiliency Client Inspection Health Checkup Check update level, antivirus, and other plug in and scriptable criteria

Advanced Updating Simplify the security update process with predictability, reduced downtime and advanced management tools Lower update costs while increasing efficiency Fewer installers and smaller update size Enhanced tools for desktops and servers Extended across Microsoft technologies

One update experience Windows Update > Microsoft Update SUS > Windows Update Services SMS 2003 Delta updating for 30-80% smaller update packages Better quality updates Rollback capability for all updates 10-30% fewer reboots Updating Windows Generation

Engineering Excellence Raising the bar for software security Improved development process New tools designed to help developers Guidance and training focused on secure coding Advance the state of the art of secure software development

Quality & Engineering Excellence Improved Development Process Threat modeling Code inspection Penetration testing Unused features off by default Reduce attack surface area Least Privilege Prescriptive Guidance Security Tools Training and Education Community Engagement Transparency Clear policy

42 13

Quality & Engineering Excellence Helping Developers Write More Secure Code.NET Framework 1.1 Cryptographic APIs Integrated PKI Visual Studio.NET 2003 Security Tools Web Services Enhancements Microsoft Security Developer Center Writing Secure Code v2 Developer webcasts Helping Developers Write More Secure Code

Authentication, Authorization And Access Control Embracing identity and access management Integrated secure single sign-on experience New factors of authentication Seamless data protection across layers Enable business solutions with integrated platform security technologies

Authentication, Authorization and Access Control Enabling Security Critical Scenarios Windows IPSec integration SSL, RPC over HTTP ISA Server 2004 Deep Windows integration WPA, 802.1x, PEAP Single sign-on, smartcards, biometrics Provision for multiple credential types Rights Management Services Comprehensive Authorization Infrastructure (AD, EFS, ACLs…)

Guidance, Tools & Response Customer Education and Partnerships Seminars and publications Alliances and information exchanges Corporation with law enforcement Help customers through prescriptive guidance, training, partnership and policy

Law #1: Security Patches are a Fact of Life. Law #2: It Does No Good to Patch a System That Was Never Secure to Begin With. Law #3: There is No Patch for Bad Judgment. Law #4: You Can’t Patch What You Don’t Know You Have. Law #5: The Most Effective Patch is The One You Don’t Have to Apply. Law #6: A Service Pack Covers a Multitude of Patches. Law #7: All Patches Are Not Created Equal. Law #8: Never Base Your Patching Decision on Whether You’ve Seen Exploit Code… Unless You’ve Seen Exploit Code. Law #9: Everyone Has a Patch Strategy, Whether They Know It or Not. Law #10: Patch Management is Really Risk Management. The Ten Immutable Laws of Security Patch Management

Security is not easy... Security is a journey where you attempt to secure a complex system of many entities: People (culture, knowledge, skills) Process (policy, procedures, guidelines) Product/Technology (hardware, software, networks) These entities interact in rich and often-times unpredictable ways to cause problems Security will fall down if you continue to focus on one part of the problem Products/Technology is not the whole problem nor is it the whole solution If it were easy, anybody could do it...

Summary A computing platform that is more resilient in the presence of security threats Advanced Updating Expanded Authentication, Authorization, Access Control Security Guidance, Tools, Responsiveness Engineering Excellence Enable business solutions with integrated platform security technologies Advance the state of the art of secure software development Help customers through prescriptive guidance, training, partnership and policy Simplify the security update process with predictability, reduced downtime and advanced management tools Isolation and Resiliency

Extended support Monthly patch releases SMS 2003 Baseline guidance Community investments Windows XP Service Pack 2 Broad training ISA Server 2004 Windows Server 2003 Service Pack 1 Updating enhancements Active protection technology Visual Studio “Whidbey” Next generation inspection Future

Learn: Take training, read guidance, help educate users Connect: Participate in community. Subscribe to security newsletters. Manage Risk: Implement a security plan and security risk management process. Upgrade laptops & remote systems to Windows XP Standardize edge servers on Windows Server 2003 Defense in depth: Implement multiple countermeasures.

Resources General Consumers Security Guidance Center Tools How Microsoft IT Secures Microsoft E-Learning Clinics Events and Webcasts

© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.