Microsoft has once again come under blistering criticism for the security practices of Azure and its other cloud offerings, with the CEO of security firm Tenable saying Microsoft is "grossly irresponsible" and mired in a "culture of toxic obfuscation."
The comments from Amit Yoran, chairman and CEO of Tenable, come six days after Sen. Ron Wyden (D-Ore.) blasted Microsoft for what he said were "negligent cybersecurity practices" that enabled hackers backed by the Chinese government to steal hundreds of thousands of emails from cloud customers, including officials in the US Departments of State and Commerce. Microsoft has yet to provide key details about the mysterious breach, which involved the hackers obtaining an extraordinarily powerful encryption key granting access to a variety of its other cloud services. The company has taken pains ever since to obscure its infrastructure's role in the mass breach.
Arthur T Knackerbracket has processed the following story:
Yoran has more to add to the senator’s arguments, writing in his post that Microsoft has demonstrated a “repeated pattern of negligent cybersecurity practices,” enabling Chinese hackers to spy on the US government. He also revealed Tenable’s discovery of an additional cybersecurity flaw in Microsoft Azure and says the company took too long to address it.
Tenable initially discovered the flaw in March and found that it could give bad actors access to a company’s sensitive data, including a bank. Yoran claims Microsoft took “more than 90 days to implement a partial fix” after Tenable notified the company, adding that the fix only applies to “new applications loaded in the service.” According to Yoran, the bank and all the other organizations “that had launched the service prior to the fix” are still affected by the flaw — and are likely unaware of that risk.
Yoran says Microsoft plans to fix the issue by the end of September but calls the delayed response “grossly irresponsible, if not blatantly negligent.” He also points to data from Google’s Project Zero, which indicates that Microsoft products have made up 42.5 percent of all discovered zero-day vulnerabilities since 2014.
“What you hear from Microsoft is ‘just trust us,’ but what you get back is very little transparency and a culture of toxic obfuscation,” Yoran writes. “How can a CISO, board of directors or executive team believe that Microsoft will do the right thing given the fact patterns and current behaviors?”
(Score: 2) by RamiK on Sunday August 06 2023, @11:22AM (1 child)
Industry standards are only guaranteed contractually where armies of lawyers do away with them. GDPR and the various other EU regs proved that for any of this to work, it has to come from the regulator and involve heavy fines.
Again, the fundamental issue here isn't the identity of the companies. The problem is that major American corporation can afford to out-litigate everyone else. It's not a novel problem as we've been there with automakers so we should already know better than saying nonsense like "Don't be evil".
The only fix is to get the regulator on board and to make sure that door isn't rotating. There never has been a market solution to this problem and there never will be since it's the unavoidable outcome of scale-of-production and how the legal system works.
compiling...
(Score: 2) by GloomMower on Monday August 07 2023, @04:52AM
By clicking "Accept all security flaws", you agree Microsoft can have a security flaw on your device or remote service in accordance with our Security Policy.