Last month, Microsoft published helpful guidance for IT Professionals looking to maximize the protection of their data using the tools and technologies available in the Azure platform and related services for encryption, access control and other aspects of data security. This paper, entitled “Protecting Data in Microsoft Azure” explores key areas that should be considered when using either the platform (PaaS), infrastructure (IaaS) or a hybrid database solution. Read more >>
In July, we published a blog post which talked about the advancements Microsoft had made in encryption for Outlook.com and OneDrive to further increase the security of our customers data. Today, Microsoft Azure has taken additional steps toward our commitment to protecting customer data with the announcement of encryption improvements for Microsoft Azure guest OS.
The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, provide customers with enhanced protection when connecting and transmitting data. For example, the enhancements to the default Transport Layer Security (TLS)/Secure Socket Layer (SSL) cipher suites helps ensure that connections are better encrypted during transmission. In addition, enabling Perfect Forward Secrecy (PFS) helps ensure a different encryption key is used for every connection, making it more difficult for attackers to decrypt connections. See more >>
Today, at the RSA Conference Europe in Amsterdam, I gave a presentation on an important update to Microsoft’s security efforts – Operational Security Assurance (OSA). The design of a secure operations methodology is part of our ongoing commitment to enable trustworthy computing in all aspects of our online services, and OSA represents the next evolution of these efforts.
Since 2004, the Microsoft Security Development Lifecycle (SDL) has helped developers to build more secure software from the ground up. But the job doesn’t end there. Attacks do not necessarily target weaknesses in software. Some attacks are operational in nature, while others, like the Flame malware, target both software vulnerabilities and operational weaknesses. Defending cloud services against network attacks requires both strong development practices, like SDL, and a strong operational security regime. The following list includes a number of ways that OSA adds considerable value to the focus on infrastructure issues and operational security.. Read more
Tomorrow I will have the opportunity to keynote at the RSA Conference Europe and discuss the work I’ve been involved with overseeing Operational Security for Microsoft Online Services. This is a topic that I am deeply passionate about and as Microsoft’s investment in the OneMicrosoft initiative becomes a primary focus of my work in the coming years. Read more