Daniel Grabski | Microsofts cybersecurity story

26

Transcript of Daniel Grabski | Microsofts cybersecurity story

“Businesses and users are going to embrace technology only if they can trust it.”

Satya Nadella

Chief Executive OfficerMicrosoft Corporation

~35% of IaaS VMs in Azure Run Linux

Top contributor to GitHub in 2016

Board Membership

Security Trends

Microsoft Security Philosophy

Attacks by hobbyists and enthusiasts

+ Monetization of attacks + Attack industrialization and integration into warfare

Security Controls + Platform Security + Integrated security experience

Virus and Worm EpidemicWaves of

Targeted Attacks

Trustworthy Computing

Initiative (2002)

Cybersecurity Initiative

(2015)

Security Hesitation

on Cloud

Committed to Securing your Modern Enterprise

Recommended Strategies & capabilities• Security Management• Threat Protection• Information Protection• Identity & Access Management• …and more

Integrated Security ExperienceIntegrate trillions of diverse threat signals, TPM hardware isolation, machine learning, and human analysis into platform and tools

We manage attacks 24x7

• Continuous attacks on Microsoft environments

• Attacks on enterprise customers

We Run on Cloud7+ Years of Azure and Office 365

Security is in our DNA• 15 years of investment into trustworthy and secure computing• More than $1 billion per year in security research and development

We Run Cloud Services22 years of Online Experience

Cybersecurity Reference Architecture

Engage your customers

Empower your employees

Optimize your operations

Transform your products

Information Security is in Transformation

Increasingly Hostile Environment• Increased attack surface with new technologies creates new blind spots• Attacks rising in volume and sophistication to capture illicit opportunities

Note: Attackers generally invest in technical sophistication only as needed

Enterprise IT is Cloud Hybrid• Cloud adoption is inevitable (Digital Transformation + industry momentum)• Legacy systems will take years to migrate or retire

Technology Mobility and Volume is Exploding• Increasing demand for first class experience on mobile devices• Variance in trustworthiness of mobile devices

Pervasive Digital Transformation and IoT• IoT adoption driving a wave of app development and cloud usage• Enterprise PC Security strategies applying poorly to IoT devices

IoT

Infrastructure as a Service

Platform as a Service

Internet of Things 1st class mobile experience

Cloud Technology

SaaS adoption

Perimeter of a Modern Enterprise

Apps and Data

SaaS

Building an Integrated Security Experience

Malware Protection Center Cyber Hunting Teams Security Response Center

DeviceInfrastructure

CERTs

Identity

INTELLIGENT SECURITY GRAPH

Cyber Defense

Operations Center

Digital Crimes Unit

Antivirus NetworkIndustry Partners

PaaS IaaS

Unique insights, informed by trillions of

signals.

450B monthly

authentications

18+BBing web pages

scanned750M+Azure useraccounts

Enterprisesecurity for

90%of Fortune 500

Malware datafrom Windows

Defender

Shared threatdata from partners,researchers and law

Enforcementworldwide

Botnet data fromMicrosoft Digital

Crimes Unit

1.2Bdevices scanned

each month

400Bemails analyzed

200+global cloud

consumer andCommercial services

Intelligent Security Graph

Microsoft Trust Center

[ Privacy/Compliance boundary ]

{ }

PRODUCT & SERVICE TELEMETRY

Measuring Security Successby measuring cost of attack

Defender Investment:

Defender Return:

• Ruin Attacker ROI• Deters opportunistic

attacks

• Slows or stops determined attacks

Investment: Cost of Attack

Return: Successful Attacks

Security Return on Investment (SROI)

Rapidly Raising Attacker Cost

RUIN ATTACKER’S ECONOMIC MODEL

BREAK THE KNOWN ATTACK PLAYBOOK

ELIMINATE OTHER ATTACK VECTORS

AGILE RESPONSE AND RECOVERY

Cost of Attack Examples

• Zero day vulnerabilities in common software/protocols

Low Cost / High Likelihood of use

High Cost / Low Likelihood of use

• Attack Techniques observed in your environment

• Freely available tools/Techniques (Credential Theft, exploits in Metasploit)

• Zero day vulnerabilities in unusual/custom protocols/devices

• Attack kits and Malware as a Service

SECURITY

THE NEW IMPERATIVE:

OR PRODUCTIVITY

COMMON INITIATIVES • Biometric and Virtual Smart Card Authentication

• Mobile Application Management

• Self Service Password Reset

• Conditional Access to Resources

• …and More

Designing for failure – the mindshift

Resilience: Designed to recover quickly

THEN NOWReliability:Designed not to fail

!

!

!

!

Prevent:Every possible attack Protect, Detect, & Respond along attack phases

!

!

!

!!

!

Assume Compromise:

Internet of ThingsUnmanaged & Mobile Clients

Sensitive Workloads

Cybersecurity Reference Architecture

Extranet

Azure Key Vault

Microsoft Azure

On Premises Datacenter(s)

NGFW

Nearly all customer breaches that Microsoft’s Incident Response team investigates involve credential theft 63% of confirmed data breaches involve weak, default, or stolen passwords (Verizon 2016 DBR)

Colocation

$

MacOS

Multi-Factor Authentication

MIM PAM

Network Security Groups

Azure AD PIM

Windows Info Protection

Enterprise Servers

VPN

VPN

VMs VMs

Certification Authority (PKI)

Security Operations Center (SOC)

WEF

SIEM Integration

IoT

Identity &

Access

Windows 10Managed Clients

Software as a Service

ATA

Azure Information

Protection (AIP)• Classify• Label• Protect• Report

Endpoint DLP

Cla

ssif

icat

ion

Lab

els

Office 365

Information

Protection

Legacy Windows

Hold Your Own Key (HYOK)

80% + of employees admit using non-approved SaaS apps for work (Stratecast, December 2013)

IPS

Edge DLP

SSL Proxy

Azure AD Identity Protection

Security Appliances

Last updated July 2017 – latest at http://aka.ms/MCRA

EPP - Windows Defender AV

EDR - Windows ATP

Azure SQL Threat Detection

Windows Server 2016 SecurityShielded VMs, Device Guard, Credential Guard, Just Enough Admin, Hyper-V Containers, Nano server, Defender AV, Defender ATP (Roadmap), and more…

Azure App Gateway

Azure Antimalware

SQL Encryption & Data Masking

SQL Firewall

Disk & Storage Encryption

Conditional Access

Office 365 ATP• Email Gateway• Anti-malware • Threat Protection

• Threat Detection

Azure Security Center (ASC)

Analytics / UEBA

MSSPWindows Security Center

AzureSecurity

Center

Vulnerability Management

SIEM

Office 365• Security & Compliance• Threat Intelligence

Hello for Business

Windows 10 Security• Secure Boot• Device Guard• Exploit Guard• Application Guard• Credential Guard

• Windows Hello• Remote

Credential Guard• Device Health

Attestation

Security Development Lifecycle (SDL)Cybersecurity Operations Service (COS) Incident Response and

Recovery Services

Office 365 DLP

Cloud App Security

Lockbox

ASM

Intune MDM/MAM

DDoS attack mitigation

Backup & Site RecoverySystem Center Configuration Manager + Intune

Privileged Access Workstations (PAWs)

Shielded VMs

ESAEAdmin Forest

Domain Controllers

3 Access DataThreat Actors exfiltrate PII and

other sensitive business data

Phishing EmailThreat Actor targets employee(s)

via phishing campaign

1

Credential Theft & AbuseGathers credentials stolen credentials to

move laterally

2a

Compromise Device/Account Employee opens attachment/link or types credentials into fake web page

Office 365 Advanced Threat

Protection (ATP)

(requires E5)

EMS Technology

• Azure Information Protection (requires E5)

• Cloud App Security (CASB) (requires E5)

Office 365 Data Loss Prevention features

Windows Information Protection

Azure Technology

• Multi-Factor Authentication

• Azure Identity Protection

• Disk, Storage, SQL Encryption

• Key Vault

• …

2

EMS Technology

• Intune conditional access

Windows 10 Technology

• Device Guard

• Application Guard

• Defender Advanced Threat Protection (requires E5)

• SmartScreen URL and App reputation

Securing Privileged Access

(http://aka.ms/SPAroadmap) Roadmap

Professional Services

•Incident Response

•Security Foundation (Major Breach Protections)

Credential Guard

Advanced Threat Analytics (in EMS E3)

Azure Security Center

Operations Management Suite (OMS)

…and more

Access same data as employee

Increase access to your environment