Microsoft focuses on transparency, control in move to cloud

Microsoft at RSA 2015

In the move to the cloud, trust has shifted, and Microsoft Trustworthy Computing corporate vice president Scott Charney says that there are now two more pillars to add to the three main ones for information security. With the cloud, users want transparency and control in addition to security, privacy and reliability.

Charney highlighted the fundamental differences in security between the pre-cloud era and today. Historically, vendors created the technology for the customer, and it is up to the customer to secure the data on-premise. Attackers would gain access to the network using four attack methods - supply chain, vulnerabilities and insecure code, social engineering and poor configurations. In response, customers, vendors and the government would try to defend the attack.

However, with the cloud, the relationship is multifaceted with multiple players. With cloud and big data, customers surrender control to the vendor.

Changing dynamics

"So you have customers asking their provider, how do you protect the fabric?" Charney said of the move to the cloud. "And also, how do we protect our stuff from your fabric? They want to be protected from the cloud as much as they want to leverage it."

Additionally, our view of the government has changed in a post-Snowden world. No longer viewed as purely good, governments also have access to lots of data and can run espionage programs.

Destruction

Cyber threats have also evolved from being opportunistic to advanced persistent threats. Charney says that the attacks are more destructive. One example of a destructive attack is the Sony hack, which propelled the IT-based conversation into the board room. Destructive attacks not only disrupt your day, but the effects can be felt for years to come.

To mitigate and prevent threats, Charney advocates moving away from the password approach to hardware-based authentication. Microsoft is rapidly moving in this direction with features like Device Guard and Passport in Windows Hello.

Because hardware is the root of trust, even if credentials get phished, they cannot be used in a different place.

Customer Lockbox

In terms of transparency between a customer and a vendor, Charney says that different levels of administration may be the key. Rather than giving someone persistent access, Charney says that tokens can be issued based on when access is needed or for specific types of access. Charney calls these just-in-time or just-enough privileges.

For Office 365, these privileges will be implemented in a feature called Customer Lockbox. This allows customers to require Microsoft engineers to request approval for access to service the cloud. Customers will be able to see how Microsoft accessed the content in activity logs.

Control

Similar to how per-file encryption is handled in SharePoint Online, Microsoft will also also bring content-level encryption to email. Additionally, Microsoft will allow customers to manage and generate their own encryption keys for Office 365 data . With customers able to generate their own keys, Microsoft is transferring control back to the customers. If a customer chooses to leave the service, they can revoke Microsoft's access.

Whitelisting applications and keeping software up to date are also useful in mitigating risks. Charney says that having a strategy is great, but " it only makes a difference if actually implemented and put in the hands of customers."

Latest in Pro
person at a computer
Many workers are overconfident at spotting phishing attacks
AI tools.
Laying the foundations for successful GenAI adoption
A person in a wheelchair working at a computer.
Why betting on Mac security could put your organization at risk
Zorin OS 17 main image
I tried the latest version of Zorin OS - here's what I thought of this Linux distro
WatchGuard Firebox T45-CW main image
I tried the WatchGuard Firebox - here's what I thought of this 5G appliance
Finger Presses Orange Button Domain Name Registration on Black Keyboard Background. Closeup View
I visited the world’s first registered .com domain – and you won’t believe what it’s offering today
Latest in News
A man getting angry with his laptop.
Windows 11 bug deletes Copilot from the OS – is this the first glitch ever some users will be happy to encounter?
An image of the Samsung Galaxy S25 Ultra from a hands-on event
Samsung's latest software upgrade could mean Galaxy phones beat iPhones for gaming – but you can't get it yet
God of War 20th Anniversary Graphic.
Sony has unveiled some goodies to celebrate God of War’s 20th anniversary, but it's not the remaster I was hoping for
person at a computer
Many workers are overconfident at spotting phishing attacks
Apple iPhone 16 Plus Review
The iPhone 17 Air could have an affordable price, and better battery life than you might have expected
Some of the Avengers standing in a room without their costumes on in Marvel's Avengers: Endgame movie
'It's a new beginning': Avengers 5 and 6 directors tease what Marvel fans can expect from Doomsday and Secret Wars' plot – and how they will set up the MCU's future