Microsoft Security Newsletter - October 2014
Trustworthy Computing | October 2014
Microsoft Security Newsletter
Welcome to October’s Security Newsletter!
This month’s newsletter focuses on security controls in cloud services. Having a rich set of security controls and a defense in-depth strategy helps ensure that should any one area fail, there are compensating controls in other areas to maintain security and privacy at all times. Security should be an ongoing effort that combines experienced and qualified personnel, software and hardware technologies, as well as robust processes to design, build, deploy, operate, and support a cloud service. Security must be vigilantly maintained, regularly enhanced, and routinely verified through testing.
When it comes to the cloud, your cloud provider is an important partner in helping to protect your data. This chart provides a good visual on the shared responsibility of security controls between the cloud customer and cloud provider when it comes to data protection whether you are using Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and/or Software as a
Service (SaaS).
-
Cloud provider controls – Cloud provider controls include technical capabilities, operational procedures, and policies that are enabled for customers using the service. Examples include security best practices like penetration testing and defense-in-depth to help protect against cyber
threats, as well as physical and data security with access control,
encryption, and strong authentication to help prevent unauthorized access.
-
Cloud customer controls – Cloud customer controls include features that enable customers to customize their environments based on the specific needs
of their organizations. Examples include unique customer controls such as Rights Management Service and Data Loss Protection which can help empower customers to protect information.
Of course, of these are just a few examples of security controls and how a cloud provider is an important partner in helping protect data. For more in-depth information on security controls for enterprises, I encourage you to check out the many great resources included in this month’s newsletter.
Best regards,
Tim Rains, Director
Microsoft Trustworthy Computing
Have feedback on how we can improve this newsletter? Email us at mailto:
secnlfb@microsoft.com
secnlfb@microsoft.com and share your ideas.
Top Stories
http://blogs.microsoft.com/cybertrust/2014/10/01/trustworthy-cloud-series-mana ging-secure-cloud-operations/
Trustworthy Cloud Series: Managing Secure Cloud Operations
When it comes to choosing a cloud provider, how do you decide who to trust
with your most sensitive information? Learn how Microsoft utilizes the Operational Security Assurance (OSA) framework for its cloud services, which details the approach to security controls such as vulnerability scanning,
patch management, encryption, and more.
http://blogs.microsoft.com/cybertrust/2014/10/22/windows-10-continuing-to-rais e-the-security-bar-for-cybercriminals/
Windows 10: Continuing to Raise the Security Bar for Cybercriminals
Check out some of the highlights from Jim Alkove’s post about the important changes that are coming in Windows with regard to identity
protection and access control, information protection, and threat resistance.
http://blogs.office.com/2014/09/23/microsoft-online-services-bug-bounty-progra m-launches-office-365/
Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization
The Cybersecurity Framework issued earlier this year by the U.S. National Institute for Standards and Technology (NIST) offers the opportunity for international collaboration because it is rooted in widely-recognized international and national standards and practices. Read about Microsoft’s recently filed comments in response to NISTÆs Request for Information (RFI) about our experience with the Cybersecurity Framework.
Security Guidance
http://social.technet.microsoft.com/wiki/contents/articles/15530.the-four-pill ars-of-identity-identity-management-in-the-age-of-hybrid-it.aspx
Security Tip of the Month: Identity Management in the Age of Hybrid IT
Get detailed information on the four fundamental pillars of identity—administration, authentication, authorization, auditing—that can be useful in creating a strategic direction for an identity infrastructure in your organization.
http://social.technet.microsoft.com/wiki/contents/articles/3794.cloud-computin g-security-architecture-it-pro-perspective.aspx
Cloud Computing Security Architecture: The IT Pro Perspective
Get comprehensive guidance on planning for security as part of your cloud infrastructure. Start with an
http://social.technet.microsoft.com/wiki/contents/articles/3795.cloud-security- overview.aspx
overview of cloud security then move on to:
-
http://social.technet.microsoft.com/wiki/contents/articles/security-issues-in-c loud-deployment-models.aspx
Security Implications of Cloud Deployment Models
-
http://social.technet.microsoft.com/wiki/contents/articles/security-implication s-of-cloud-service-models.aspx
Security Considerations for Cloud Service Models
-
http://social.technet.microsoft.com/wiki/contents/articles/3798.aspx Identity and Access Management
-
http://social.technet.microsoft.com/wiki/contents/articles/security-management- and-monitoring.aspx
Security Management and Monitoring
-
http://social.technet.microsoft.com/wiki/contents/articles/compliance-issues-in -the-cloud.aspx
Compliance Issues in the Cloud
https://gallery.technet.microsoft.com/A-Solution-for-Private-67209ab1
A Solution for Private Cloud Security
Download a comprehensive explanation of the process for designing and running security for a private cloud environment. This solution includes a blueprint guide, design guide, and operations guide.
http://social.technet.microsoft.com/wiki/contents/articles/3819.reference-arch itecture-for-private-cloud.aspx
Private Cloud Reference Guide
Find an overview of private cloud architecture and information the principles, patterns, and concepts as well as planning guides for IaaS, service delivery, operations, and systems management.
http://azure.microsoft.com/en-us/support/trust-center/security/
Microsoft Azure Trust Center
Explore the security controls and capabilities delivered by Microsoft Azure, and find information on how to carry out authorized penetration testing for your applications hosted in Azure.
Community Update
http://blogs.microsoft.com/cybertrust/2014/10/22/you-asked-we-answered-askpth- questions-and-answers/
You Asked, We Answered: #AskPtH Questions and Answers
Pass-the-Hash (PtH) refers to a technique that allows an attacker to capture account logon credentials on one compromised computer, and then use those captured credentials to authenticate to other computers across the network. Many organizations who want to protect their networks are particularly interested in this technique so we opened the conversation to @msftsecurity Twitter followers and asked what questions you had about PtH. Check out the first set of short video segments answering some of the questions we’ve received to date.
http://blogs.microsoft.com/cybertrust/2014/10/23/vuln-hunt-find-the-security-v ulnerability-challenge-3/
Vuln Hunt: Find the Security Vulnerability Challenge #3
This particular type of vulnerability is used to attack data-driven applications found across the web.It has been around for over a decade and is one of the top threats today.Do you know what it is?
This Month's Security Bulletins
October 2014 Security Bulletins
Critical
-MS14-056:2987107
https://technet.microsoft.com/library/security/ms14-056
Cumulative Security Update for Internet Explorer
-MS14-057:3000414
https://technet.microsoft.com/library/security/ms14-057
Vulnerabilities in .NET Framework Could Allow Remote Code Execution
-MS14-058:3000061
https://technet.microsoft.com/library/security/ms14-058
Vulnerability in Kernel-Mode Driver Could Allow Remote Code Execution
Important
-MS14-059:2990942
https://technet.microsoft.com/library/security/ms14-059
Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass
-MS14-060:3000869
https://technet.microsoft.com/library/security/ms14-060
Vulnerability in Windows OLE Could Allow Remote Code Execution
-MS14-061:3000434
https://technet.microsoft.com/library/security/ms14-061
Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution
-MS14-062:2993254
https://technet.microsoft.com/library/security/ms14-062
Vulnerability in Message Queuing Service Could Allow Elevation of Privilege
-MS14-063:2998579
https://technet.microsoft.com/library/security/ms14-063
Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of
Privilege
October 2014 Security Bulletin Resources:
-
http://blogs.technet.com/b/msrc/archive/2014/10/14/october-2014-updates.aspx
October 2014 Bulletin Release Blog Post "October 2014 Security Updates"
-
https://www.youtube.com/watch?v=qXtDMxgnN50
October 2014 Security Bulletin Webcast
-
http://www.microsoft.com/en-us/download/malicious-software-removal-tool-details .aspx
Malicious Software Removal Tool: October 2014 Update
Security Events and Training
http://www.microsoftvirtualacademy.com/training-topics/hybrid-cloud Microsoft Virtual Academy (MVA): Hybrid Cloud
Explore the advantages and flexibility of the hybrid cloud, where you can keep your critical data on-premises and get greater scale for your day-to-day operations. Learn how to optimize your organization’s IT infrastructure with Microsoft hybrid cloud technologies with best practices and detailed implementation guidance.
http://www.microsoftvirtualacademy.com/training-topics/private_cloud_topic_pag e_en MVA: Private Cloud
Learn how to build, deploy, and maintain a private cloud. In these courses,
you will learn about core Windows Server products, and how to use them to
build and support the virtualized and physical resources that are part of your private cloud infrastructure. You will also hear about common cloud computing configuration and management practices, as well as technical details to help you be successful in building a private cloud for your business.
https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032598914 Dimension Data Series – The Hybrid Cloud: A Balancing Act Between Benefits and Security
Thursday, December 4, 2014 – 10:00 AM Pacific Time
Learn how to extend your datacenter to the cloud in a secure and automated
way, how to secure your information in the cloud, how to manage security in a mix of private and public clouds, why a hosted private cloud can be the best solution for sensitive data and mission critical workloads.
https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032602816 Windows 10 for Enterprise
Thursday, November 20, 2014 – 9:00 AM Pacific Time
Be one of the first to take an early look at some of the features and functionality for business users in the next version of Windows including
those that protect against modern security threats.
Essential Tools
-
http://technet.microsoft.com/security/bulletin
Microsoft Security Bulletins
-
http://technet.microsoft.com/security/advisory
Microsoft Security Advisories
-
http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
Security Compliance Manager
-
http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
Microsoft Security Development Lifecycle Starter Kit
-
http://support.microsoft.com/kb/2458544
Enhanced Mitigation Experience Toolkit
-
http://www.microsoft.com/security/pc-security/malware-removal.aspx
Malicious Software Removal Tool
-
http://technet.microsoft.com/security/cc184924.aspx
Microsoft Baseline Security Analyzer
Security Centers
-
http://technet.microsoft.com/security
Security TechCenter
-
http://msdn.microsoft.com/security
Security Developer Center
-
http://www.microsoft.com/security/msrc/default.aspx
Microsoft Security Response Center
-
http://www.microsoft.com/security/portal/
Microsoft Malware Protection Center
-
http://www.microsoft.com/privacy
Microsoft Privacy
-
http://support.microsoft.com/select/default.aspx?target=hub&c1=10750 Microsoft Security Product Solution Centers
Additional Resources
-
http://www.microsoft.com/about/twc/en/us/blogs.aspx
Trustworthy Computing Security and Privacy Blogs
-
http://www.microsoft.com/security/sir
Microsoft Security Intelligence Report
-
http://www.microsoft.com/security/sdl
Microsoft Security Development Lifecycle
-
http://technet.microsoft.com/library/cc162838.aspx
Malware Response Guide
-
http://technet.microsoft.com/security/bb980617.aspx
Security Troubleshooting and Support Resources
-
http://www.microsoft-careers.com/go/Trustworthy-Computing-Jobs/194701/ Trustworthy Computing Careers
microsoft.com/about/twcTrustworthy Computing
This is a monthly newsletter for IT professionals and
developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.
(c) 2014 Microsoft Corporation
http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Copyright/defa ult.aspx
Terms of Use |
http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Trademarks/EN- US.aspx
Trademarks
Microsoft respects your privacy. To learn more please read our online
http://go.microsoft.com/fwlink/?LinkId=248681
Privacy Statement .
If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies please
http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc80446620fed943942df3ddc0089cb6135b394171347645a317d5b16af3a18bde3&oneClick =newsletter
click here . These settings will not affect any other newsletters youÆve requested or any mandatory service communications that are considered part of certain Microsoft services.
To set your contact preferences for other Microsoft communications
http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc80446620fed943942df3ddc0089cb6135b394171347645a317d5b16af3a18bde3
click here .
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA
---
■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games