INDIA │ 22-24 November 2010 virtual techdays Security @ Microsoft Anirudh Singh Rautela │ Technology Specialist - Security INDIA │ 22-24 November 2010 virtual techdays Agenda • The Microsoft TWC Initiative • Security & Privacy Progress • Windows Platform Security Predictable, consistent, responsive service Commitment Microsoft to customer-centric Security Response Microsoft Interoperability Center Privacy (MSRC) Guidelines for developing Software Maintainable, easy to configureMalware and manage Microsoft Automated Policy Protection based solutions Center (MMPC)and Services Resilient, works despite changes Microsoft Data Governance Recognized Microsoft industry Security leader, Engineering world-class Center partner (MSEC) Framework Recoverable, easily restored Open, transparentManaging and Protecting Proven, ready to operate Personal Information Secure Build solutions that protect privacy Microsoft Online Crash Analysis Interop Vendor Alliance SQL Server 2005 against attacks Engineering Excellence Training and GuidelinesOpen Source Software Lab Safe guard your corporateVisual data Studio 2005 Protects confidentiality, Services with high Protect Personal Privacy Transparent Practices WindowsMicrosoft Server Online Windows integrity and availability reliability in multiple data centers (SDL, Codeplex, etc.) Defender TWC Windows 2003 SP1 Windows Vista Windows of data and systems Vendor Engagement and Windows Hardware Quality Lab Windows Windows Announced XP SP2 Malicious SW Office 2007 Server 2008 Business designed Forefront Server 2003 Liveexplicitly OneCare Removal ToolContinuity SDL begins DSI Launched SQL Server 2008 in with prescriptive guidance 2002 2003 2004 2005 2006 2007 2008 TwC Security Protecting Microsoft customers throughout the entire life cycle (in development, deployment and operations) Microsoft Security Response Center (MSRC) Conception EcoStrat MSRC Ops SDL MSRC Engineering Microsoft Malware Protection Center (MMPC) Microsoft Security Engineering Center (MSEC) Security Assurance Security Science Release Conception Protect Microsoft customers by Reducing the of vulnerabilities Reducing the of vulnerabilities Release Prescriptive yet practical approach Proactive – not just “looking for bugs” Eliminate security problems early Secure by design At Microsoft, we believe that delivering secure software requires Executive commitment SDL a mandatory policy at Microsoft since 2004 Verification Response Release Training Core training Requirements Analyze Implementation Requirements Training Design Design Threat security and modeling Dynamic/ Response Response privacy risk Attack surface Define quality Fuzz testing analysis plan execution gates Verify threat Final security models/attack review surface Release archive Implementation Verification Specify tools Enforce banned functions Static analysis Dynamic/Fuzz testing Verify threat models/attack surface Release Response plan Response Response Specify Analyze Threat tools execution Final security Core training review security modeling and Release banned Enforce archive privacy risk functions Attack surface Define analysis quality Static analysis gates Ongoing Process Improvements 6 month cycle Infrastructure Optimization Microsoft Security Assessment Toolkit Microsoft Windows Vista Security Whitepapers Microsoft Security Intelligence Report Microsoft IT Showcase Security Tools & Papers Security Readiness Learning Paths for Security Professionals Education and Training Global Phishing Enforcement Initiative Digital PhishNet Global Infrastructure Alliance for Internet Safety Virus Information Alliance Threats & Counter measures Security Risk Management Guide Fundamental Computer Investigation Guide for Windows Microsoft Security Assessment Tool 4.0 MBSA Tool & Scripts Microsoft Security Compliance Manager Security Awareness Toolkit SysInternals Toolkit Security Literature to read Misc. Security Tools for Admins SDL and SD3 Defense in Depth Threat Mitigation Security Development Lifecycle process Engineered for security Design threat modeling SD3 Secure by Design Secure by Default Secure In Deployment Automated patching and update services Malware Example Consumer Education Laws Firewalls Antivirus Products Antispyware Products Malicious Software Removal Tool Memory Management (ASLR) Law Enforcement Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC) Windows Live OneCare and Forefront Client Security, powered by the Microsoft Malware Protection Center SPAM (Sender ID, Phishing Filters) Network Access Protection (NAP/NAC) Blaster Sasser Zotob MS08-067 August 2003 April 2004 August 2005 October 2008 Alert and prescriptive guidance Within 1 day Within 2 hours 2 days prior Before publicly known (MAPP) Online guidance/ Webcast Within 10 days Within 2 days Same day 3 times, 2x Same day Free worm removal tool Within 38 days Within 3 days Within 3 days Didn’t need one* Days after the patch we knew of 1st exploit +11 days +4 days +2 days -11 days Products not affected by attacks none none XPSP2 Vista, Win7 Server 2008 By half year – industry wide Vulnerability disclosures in 2H08 down 3% from 1H08 2008 as a whole down 12% from 2H07 Microsoft proportion only 5% of industry total Industry-wide vulnerability disclosures by half-year, 2H03-2H08 Vulnerability disclosures for Microsoft products, by full year, 2004-2008 300 3500 3000 250 2500 200 2000 150 1500 1000 100 500 50 0 0 2004 2005 2006 2007 2008 “Why try to chase a difficult overflow out of Vista when you have Acrobat Reader installed, some antivirus software with shoddy file parsing, and the latest iTunes?” Halvar Flake Security Researcher Microsoft BlueHat Conference September 2007 Given this situation, Microsoft deserves high praise for creating, formalizing, and improving SDL as it has led to better software for the masses.” Jon Oltsik Enterprise Strategy Group September 2008 Core improvements to the Operating Systems Security by Design, by Default and by Deployment Freedom from intrusion Social Engineering & Exploits Reduce unwanted communications Protection from harm Browser & Web Server Exploits Protection from deceptive websites, malicious code, online fraud, identity theft Control of information Choice and control Clear notice of information use Provide only what is needed International Domain Names Pop-up Blocker Increased usability Secure Development Lifecycle Extended Validation (EV) SSL certs SmartScreen® Filter Domain Highlighting XSS Filter/ DEP/NX ActiveX® Controls User-friendly, discoverable notices P3P-enabled cookie controls Delete Browsing History InPrivate™ Browsing & Filtering Secure Platform Security Development Lifecycle (SDL) Kernel Patch Protection Kernel-mode Driver Signing Secure Startup Windows Service Hardening x64 Hardware Integration Rights Management Services (RMS) Data Protection SharePoint, Exchange, Windows Mobile integration Encrypting File System (EFS) Bitlocker & Bitlocker To Go Secure Access User Account Control Network Access Protection (NAP) IPv6 IPsec Windows CardSpace Malware Protection Windows Defender IE Protected Mode Address Space Layout Randomization (ASLR) Data Execution Prevention (DEP) Native smart card support GINA Re-architecture Certificate Services Credential roaming AppLockerTM DirectAccess Bi-directional Firewall / multi profile Support Windows Security Center Secure Platform Security Development Lifecycle (SDL) Windows Server Virtualization (Hypervisor) Role Management Tool OS File Integrity Data Protection Rights Management Services (RMS) Full volume encryption (Bitlocker) USB Device-connection rules with Group Policy Improved Auditing Windows Server Backup EFS DirectAccess Network Protection Network Access Protection (NAP) Server and Domain Isolation with IPsec End-to-end Network Authentication Windows Firewall With Advanced Security On By Default Identity Access Read-only Domain Controller (RODC) Active Directory Federation Services (ADFS) Administrative Role Separation PKI Management Console Online Certificate Status Protocol Minimal installation option Low surface area more secure Command line interface Less patching/Less downtime DHCP File/ Print AD (for example only) TS IAS Web Server Share Point Etc… Server Server Core Server Roles DNS Server, Server Roles Hyper -V Server Core Security, TCP/IP, File Systems, RPC, plus other Core Server Sub-Systems Basic Web With WinFx, Shell, Tools, etc. GUI, CLR, Shell, IE, Media, OE, etc. A well Managed Secure Infrastructure is the key! Services Edge Server Applications Information Protection Client and Server OS Active Directory Federation Services (ADFS) Identity & Access Management Certificate Lifecycle Management Mobile Device Data Manager 2008 Protection Configuration Manager Operations Manager 2007 Manager 2007 Systems Management TWC SDL INDIA │ 22-24 November 2010 virtual techdays THANK YOU!