Pop-Up Thingie

Digital Distortion
  • Home
  • Forum
  • Files
  • Web Monitor
  • Log in

  1. Forum
  2. League10
  3. Microsoft Sec. Bulletin
  • Microsoft Security Newsletter - October 2014

    From Lord Time@TIME to All on Wed Oct 29 19:23:16 2014
    Microsoft Security Newsletter - October 2014



    Trustworthy Computing | October 2014
    Microsoft Security Newsletter



    Welcome to October’s Security Newsletter!

    This month’s newsletter focuses on security controls in cloud services. Having a rich set of security controls and a defense in-depth strategy helps ensure that should any one area fail, there are compensating controls in other areas to maintain security and privacy at all times. Security should be an ongoing effort that combines experienced and qualified personnel, software and hardware technologies, as well as robust processes to design, build, deploy, operate, and support a cloud service. Security must be vigilantly maintained, regularly enhanced, and routinely verified through testing.



    When it comes to the cloud, your cloud provider is an important partner in helping to protect your data. This chart provides a good visual on the shared responsibility of security controls between the cloud customer and cloud provider when it comes to data protection whether you are using Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and/or Software as a
    Service (SaaS).


    -
    Cloud provider controls – Cloud provider controls include technical capabilities, operational procedures, and policies that are enabled for customers using the service. Examples include security best practices like penetration testing and defense-in-depth to help protect against cyber
    threats, as well as physical and data security with access control,
    encryption, and strong authentication to help prevent unauthorized access.

    -
    Cloud customer controls – Cloud customer controls include features that enable customers to customize their environments based on the specific needs
    of their organizations. Examples include unique customer controls such as Rights Management Service and Data Loss Protection which can help empower customers to protect information.



    Of course, of these are just a few examples of security controls and how a cloud provider is an important partner in helping protect data. For more in-depth information on security controls for enterprises, I encourage you to check out the many great resources included in this month’s newsletter.



    Best regards,

    Tim Rains, Director

    Microsoft Trustworthy Computing



    Have feedback on how we can improve this newsletter? Email us at mailto:secnlfb@microsoft.com
    secnlfb@microsoft.com and share your ideas.



    Top Stories


    http://blogs.microsoft.com/cybertrust/2014/10/01/trustworthy-cloud-series-mana ging-secure-cloud-operations/

    Trustworthy Cloud Series: Managing Secure Cloud Operations

    When it comes to choosing a cloud provider, how do you decide who to trust
    with your most sensitive information? Learn how Microsoft utilizes the Operational Security Assurance (OSA) framework for its cloud services, which details the approach to security controls such as vulnerability scanning,
    patch management, encryption, and more.

    http://blogs.microsoft.com/cybertrust/2014/10/22/windows-10-continuing-to-rais e-the-security-bar-for-cybercriminals/

    Windows 10: Continuing to Raise the Security Bar for Cybercriminals

    Check out some of the highlights from Jim Alkove’s post about the important changes that are coming in Windows with regard to identity
    protection and access control, information protection, and threat resistance.

    http://blogs.office.com/2014/09/23/microsoft-online-services-bug-bounty-progra m-launches-office-365/

    Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization

    The Cybersecurity Framework issued earlier this year by the U.S. National Institute for Standards and Technology (NIST) offers the opportunity for international collaboration because it is rooted in widely-recognized international and national standards and practices. Read about Microsoft’s recently filed comments in response to NISTÆs Request for Information (RFI) about our experience with the Cybersecurity Framework.




    Security Guidance
    http://social.technet.microsoft.com/wiki/contents/articles/15530.the-four-pill ars-of-identity-identity-management-in-the-age-of-hybrid-it.aspx

    Security Tip of the Month: Identity Management in the Age of Hybrid IT

    Get detailed information on the four fundamental pillars of identity—administration, authentication, authorization, auditing—that can be useful in creating a strategic direction for an identity infrastructure in your organization.


    http://social.technet.microsoft.com/wiki/contents/articles/3794.cloud-computin g-security-architecture-it-pro-perspective.aspx

    Cloud Computing Security Architecture: The IT Pro Perspective

    Get comprehensive guidance on planning for security as part of your cloud infrastructure. Start with an http://social.technet.microsoft.com/wiki/contents/articles/3795.cloud-security- overview.aspx

    overview of cloud security then move on to:


    - http://social.technet.microsoft.com/wiki/contents/articles/security-issues-in-c loud-deployment-models.aspx

    Security Implications of Cloud Deployment Models
    - http://social.technet.microsoft.com/wiki/contents/articles/security-implication s-of-cloud-service-models.aspx

    Security Considerations for Cloud Service Models
    -
    http://social.technet.microsoft.com/wiki/contents/articles/3798.aspx Identity and Access Management
    - http://social.technet.microsoft.com/wiki/contents/articles/security-management- and-monitoring.aspx

    Security Management and Monitoring
    - http://social.technet.microsoft.com/wiki/contents/articles/compliance-issues-in -the-cloud.aspx

    Compliance Issues in the Cloud

    https://gallery.technet.microsoft.com/A-Solution-for-Private-67209ab1
    A Solution for Private Cloud Security

    Download a comprehensive explanation of the process for designing and running security for a private cloud environment. This solution includes a blueprint guide, design guide, and operations guide.

    http://social.technet.microsoft.com/wiki/contents/articles/3819.reference-arch itecture-for-private-cloud.aspx

    Private Cloud Reference Guide

    Find an overview of private cloud architecture and information the principles, patterns, and concepts as well as planning guides for IaaS, service delivery, operations, and systems management.


    http://azure.microsoft.com/en-us/support/trust-center/security/
    Microsoft Azure Trust Center

    Explore the security controls and capabilities delivered by Microsoft Azure, and find information on how to carry out authorized penetration testing for your applications hosted in Azure.




    Community Update
    http://blogs.microsoft.com/cybertrust/2014/10/22/you-asked-we-answered-askpth- questions-and-answers/

    You Asked, We Answered: #AskPtH Questions and Answers

    Pass-the-Hash (PtH) refers to a technique that allows an attacker to capture account logon credentials on one compromised computer, and then use those captured credentials to authenticate to other computers across the network. Many organizations who want to protect their networks are particularly interested in this technique so we opened the conversation to @msftsecurity Twitter followers and asked what questions you had about PtH. Check out the first set of short video segments answering some of the questions we’ve received to date.

    http://blogs.microsoft.com/cybertrust/2014/10/23/vuln-hunt-find-the-security-v ulnerability-challenge-3/

    Vuln Hunt: Find the Security Vulnerability Challenge #3

    This particular type of vulnerability is used to attack data-driven applications found across the web.It has been around for over a decade and is one of the top threats today.Do you know what it is?




    This Month's Security Bulletins


    October 2014 Security Bulletins


    Critical

    -MS14-056:2987107
    https://technet.microsoft.com/library/security/ms14-056

    Cumulative Security Update for Internet Explorer

    -MS14-057:3000414
    https://technet.microsoft.com/library/security/ms14-057

    Vulnerabilities in .NET Framework Could Allow Remote Code Execution

    -MS14-058:3000061
    https://technet.microsoft.com/library/security/ms14-058

    Vulnerability in Kernel-Mode Driver Could Allow Remote Code Execution



    Important

    -MS14-059:2990942
    https://technet.microsoft.com/library/security/ms14-059

    Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass

    -MS14-060:3000869
    https://technet.microsoft.com/library/security/ms14-060

    Vulnerability in Windows OLE Could Allow Remote Code Execution

    -MS14-061:3000434
    https://technet.microsoft.com/library/security/ms14-061

    Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution

    -MS14-062:2993254
    https://technet.microsoft.com/library/security/ms14-062

    Vulnerability in Message Queuing Service Could Allow Elevation of Privilege

    -MS14-063:2998579
    https://technet.microsoft.com/library/security/ms14-063

    Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of
    Privilege


    October 2014 Security Bulletin Resources:

    - http://blogs.technet.com/b/msrc/archive/2014/10/14/october-2014-updates.aspx

    October 2014 Bulletin Release Blog Post "October 2014 Security Updates"
    -
    https://www.youtube.com/watch?v=qXtDMxgnN50
    October 2014 Security Bulletin Webcast
    - http://www.microsoft.com/en-us/download/malicious-software-removal-tool-details .aspx

    Malicious Software Removal Tool: October 2014 Update



    Security Events and Training



    http://www.microsoftvirtualacademy.com/training-topics/hybrid-cloud Microsoft Virtual Academy (MVA): Hybrid Cloud

    Explore the advantages and flexibility of the hybrid cloud, where you can keep your critical data on-premises and get greater scale for your day-to-day operations. Learn how to optimize your organization’s IT infrastructure with Microsoft hybrid cloud technologies with best practices and detailed implementation guidance.

    http://www.microsoftvirtualacademy.com/training-topics/private_cloud_topic_pag e_en MVA: Private Cloud

    Learn how to build, deploy, and maintain a private cloud. In these courses,
    you will learn about core Windows Server products, and how to use them to
    build and support the virtualized and physical resources that are part of your private cloud infrastructure. You will also hear about common cloud computing configuration and management practices, as well as technical details to help you be successful in building a private cloud for your business.


    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032598914 Dimension Data Series – The Hybrid Cloud: A Balancing Act Between Benefits and Security
    Thursday, December 4, 2014 – 10:00 AM Pacific Time

    Learn how to extend your datacenter to the cloud in a secure and automated
    way, how to secure your information in the cloud, how to manage security in a mix of private and public clouds, why a hosted private cloud can be the best solution for sensitive data and mission critical workloads.


    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032602816 Windows 10 for Enterprise
    Thursday, November 20, 2014 – 9:00 AM Pacific Time

    Be one of the first to take an early look at some of the features and functionality for business users in the next version of Windows including
    those that protect against modern security threats.






    Essential Tools


    -
    http://technet.microsoft.com/security/bulletin
    Microsoft Security Bulletins

    -
    http://technet.microsoft.com/security/advisory
    Microsoft Security Advisories

    -
    http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
    Security Compliance Manager

    -
    http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
    Microsoft Security Development Lifecycle Starter Kit

    -
    http://support.microsoft.com/kb/2458544
    Enhanced Mitigation Experience Toolkit

    -
    http://www.microsoft.com/security/pc-security/malware-removal.aspx
    Malicious Software Removal Tool

    -
    http://technet.microsoft.com/security/cc184924.aspx
    Microsoft Baseline Security Analyzer


    Security Centers


    -
    http://technet.microsoft.com/security
    Security TechCenter

    -
    http://msdn.microsoft.com/security
    Security Developer Center

    -
    http://www.microsoft.com/security/msrc/default.aspx
    Microsoft Security Response Center

    -
    http://www.microsoft.com/security/portal/
    Microsoft Malware Protection Center

    -
    http://www.microsoft.com/privacy
    Microsoft Privacy

    -
    http://support.microsoft.com/select/default.aspx?target=hub&c1=10750 Microsoft Security Product Solution Centers


    Additional Resources


    -
    http://www.microsoft.com/about/twc/en/us/blogs.aspx
    Trustworthy Computing Security and Privacy Blogs

    -
    http://www.microsoft.com/security/sir
    Microsoft Security Intelligence Report

    -
    http://www.microsoft.com/security/sdl
    Microsoft Security Development Lifecycle

    -
    http://technet.microsoft.com/library/cc162838.aspx
    Malware Response Guide

    -
    http://technet.microsoft.com/security/bb980617.aspx
    Security Troubleshooting and Support Resources

    -
    http://www.microsoft-careers.com/go/Trustworthy-Computing-Jobs/194701/ Trustworthy Computing Careers




    microsoft.com/about/twcTrustworthy Computing




    This is a monthly newsletter for IT professionals and
    developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.



    (c) 2014 Microsoft Corporation
    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Copyright/defa ult.aspx

    Terms of Use |
    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Trademarks/EN- US.aspx

    Trademarks


    Microsoft respects your privacy. To learn more please read our online http://go.microsoft.com/fwlink/?LinkId=248681
    Privacy Statement .



    If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies please http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc80446620fed943942df3ddc0089cb6135b394171347645a317d5b16af3a18bde3&oneClick =newsletter

    click here . These settings will not affect any other newsletters youÆve requested or any mandatory service communications that are considered part of certain Microsoft services.



    To set your contact preferences for other Microsoft communications http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc80446620fed943942df3ddc0089cb6135b394171347645a317d5b16af3a18bde3

    click here .



    Microsoft Corporation

    One Microsoft Way

    Redmond, WA 98052 USA
    ---
    ■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games
  • Web-based telnet client

    Other Links
    What is a BBS?
    Doors installed on this BBS
    Digital Distortion Doors & Tools
    Door stats
    Trivia scores
    Message networks
    Terminal software
    Synchronet archiver setup
    Ready.gov anti-terrorist guidelines as of 2003

    Other services
    Telnet
    RLogin
    IRC
    Email & news access

    Feel free to send me an email.

    BBS UPS stats
  • Who's Online

  • Recent Visitors

    • Merlin
      Mon Apr 14 06:31:48 2025
      from Milton, WV via HTTP
    • Merlin
      Sun Apr 6 09:19:55 2025
      from Milton, WV via HTTP
    • xbit
      Sat Feb 22 04:36:09 2025
      from Portland, Or via HTTP
    • Wilmaxs
      Wed Aug 16 04:20:48 2023
      via HTTP
  • System Info

    Sysop: Eric Oulashin
    Location: Beaverton, Oregon, USA
    Users: 100
    Nodes: 16 (0 / 16)
    Uptime: 04:10:32
    Calls: 6,165
    Calls today: 1
    Files: 8,500
    D/L today: 159 files
    (50,026K bytes)
    Messages: 348,957

© Digital Distortion, 2025