Microsoft focuses on transparency, control in move to cloud

Microsoft at RSA 2015

In the move to the cloud, trust has shifted, and Microsoft Trustworthy Computing corporate vice president Scott Charney says that there are now two more pillars to add to the three main ones for information security. With the cloud, users want transparency and control in addition to security, privacy and reliability.

Charney highlighted the fundamental differences in security between the pre-cloud era and today. Historically, vendors created the technology for the customer, and it is up to the customer to secure the data on-premise. Attackers would gain access to the network using four attack methods - supply chain, vulnerabilities and insecure code, social engineering and poor configurations. In response, customers, vendors and the government would try to defend the attack.

However, with the cloud, the relationship is multifaceted with multiple players. With cloud and big data, customers surrender control to the vendor.

Changing dynamics

"So you have customers asking their provider, how do you protect the fabric?" Charney said of the move to the cloud. "And also, how do we protect our stuff from your fabric? They want to be protected from the cloud as much as they want to leverage it."

Additionally, our view of the government has changed in a post-Snowden world. No longer viewed as purely good, governments also have access to lots of data and can run espionage programs.

Destruction

Cyber threats have also evolved from being opportunistic to advanced persistent threats. Charney says that the attacks are more destructive. One example of a destructive attack is the Sony hack, which propelled the IT-based conversation into the board room. Destructive attacks not only disrupt your day, but the effects can be felt for years to come.

To mitigate and prevent threats, Charney advocates moving away from the password approach to hardware-based authentication. Microsoft is rapidly moving in this direction with features like Device Guard and Passport in Windows Hello.

Because hardware is the root of trust, even if credentials get phished, they cannot be used in a different place.

Customer Lockbox

In terms of transparency between a customer and a vendor, Charney says that different levels of administration may be the key. Rather than giving someone persistent access, Charney says that tokens can be issued based on when access is needed or for specific types of access. Charney calls these just-in-time or just-enough privileges.

For Office 365, these privileges will be implemented in a feature called Customer Lockbox. This allows customers to require Microsoft engineers to request approval for access to service the cloud. Customers will be able to see how Microsoft accessed the content in activity logs.

Control

Similar to how per-file encryption is handled in SharePoint Online, Microsoft will also also bring content-level encryption to email. Additionally, Microsoft will allow customers to manage and generate their own encryption keys for Office 365 data . With customers able to generate their own keys, Microsoft is transferring control back to the customers. If a customer chooses to leave the service, they can revoke Microsoft's access.

Whitelisting applications and keeping software up to date are also useful in mitigating risks. Charney says that having a strategy is great, but " it only makes a difference if actually implemented and put in the hands of customers."

Latest in Pro
An abstract image of a lock against a digital background, denoting cybersecurity.
Cyber resilience under DORA – are you prepared for the challenge?
Sam Altman and OpenAI
UK regulator clears Microsoft’s $13bn deal with OpenAI after lengthy delay
A person holding out their hand with a digital AI symbol.
The decision-maker's playbook: integrating Generative AI for optimal results
AMD Ryzen 9950X
Ryzen CPUs are the cheapest Zen 5 cores you can buy, but I was surprised to see this AMD 192-core CPUs on the value leaderboard
The socket interface of the Intel Core Ultra processor
Intel unveils its most powerful AI PCs yet - new Intel Core Ultra Series 2 processors pack in vPro for lightweight laptops and high-performance workstations alike
Webex by Cisco banner on a Chromebook
Cisco warns some Webex users of worrying security flaw, so patch now
Latest in News
A screenshot showing Naoe looking at the hidden blade in Assassin's Creed Shadows
Prep 107GB of space as Assassin's Creed Shadows preload and expected global release times are shared by Ubisoft
Sam Altman and OpenAI
UK regulator clears Microsoft’s $13bn deal with OpenAI after lengthy delay
the last of us 2 gate codes
The Last of Us director Neil Druckmann speaks on the possibility of The Last of Us Part 3: 'I guess the only thing I would say is don’t bet on there being more'
Google AI Mode
Google previews AI Mode for search, taking on the likes of ChatGPT search and Perplexity
AMD Ryzen 9950X
Ryzen CPUs are the cheapest Zen 5 cores you can buy, but I was surprised to see this AMD 192-core CPUs on the value leaderboard
A hand holding a phone showing the Android Find My Device network
Android's Find My Device can now let you track your friends – and I can't decide if that's cool or creepy