{"id":897,"date":"2024-11-19T13:30:00","date_gmt":"2024-11-19T13:30:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=897"},"modified":"2024-11-19T13:30:00","modified_gmt":"2024-11-19T13:30:00","slug":"from-mfa-mandates-to-locked-down-devices-microsoft-posts-a-year-of-sfi-milestones-at-ignite","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=897","title":{"rendered":"From MFA mandates to locked-down devices, Microsoft posts a year of SFI milestones at Ignite"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>During its Ignite conference on Tuesday, Microsoft shared a progress update on its <a href=\"https:\/\/www.csoonline.com\/article\/657928\/microsoft-pledges-cybersecurity-overhaul-to-protect-products-and-services.html\" target=\"_blank\" rel=\"noopener\">Secure Future Initiative (SFI)<\/a>, introduced a year ago, which included significant measures such as enforcing multi-factor authentication (MFA) by default for new tenants, isolating close to 100,000 work devices under conditional access policies, and blocking GitHub secrets from exposure.<\/p>\n<p>The progress report, structured around Microsoft\u2019s customary six engineering pillars used to assess its advancements, presents a more promising outlook compared to a previous, <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-brand\/documents\/SFI_September_2024_progress_report.pdf\" target=\"_blank\" rel=\"noopener\">September update<\/a> that themed around credentials rotation, JIT\/JEA access controls, and threat monitoring.<\/p>\n<p><strong>[ Related: <a href=\"https:\/\/www.computerworld.com\/article\/3601006\/microsoft-ignite-2024-get-the-latest-news-and-insights.html\">Microsoft Ignite 2024 news and insights<\/a> ]<\/strong><\/p>\n<p>\u201cIn May 2024, Microsoft CEO Satya Nadella made security the company\u2019s top priority,\u201d Microsoft said in the report. \u201cSince that time, we have dedicated the equivalent of 34,000 engineers to advance the objectives laid out in SFI, making it the largest cybersecurity engineering project in history.\u201d<\/p>\n<p>Microsoft also highlighted efforts to embed security into its culture, completing several learning and governance initiatives, including mandatory workforce security trainings through the Microsoft Security Academy, and committing to the CISA <a href=\"https:\/\/www.csoonline.com\/article\/3599118\/oktas-secure-by-design-pledge-suffers-a-buggy-setback.html\" target=\"_blank\" rel=\"noopener\">\u201csecure by design\u201d pledge<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">Microsoft commits to protecting identities, secrets, and systems<\/h2>\n<p>Microsoft emphasized its commitment to security by integrating a series of \u201csecure by design\u201d frameworks into its processes. The company outlined four key SFI engineering pillars supporting this effort: protecting identities and secrets, isolating production systems to safeguard tenants, protecting networks, and securing engineering systems.<\/p>\n<p>To this end, the cloud leader with identity tools like Azure AD, Entra, Defender, and Authenticator has enforced MFA by default for all new tenants. Additionally, it is enforcing phishing-resistant MFA across its productivity environments.<\/p>\n<p>\u201cTo help secure customers, multifactor authentication (MFA) is now on by default for new tenants and will be enforced for the Microsoft Azure Portal, Microsoft Entra admin center, Intune admin center, and Microsoft 365 admin center,\u201d Microsoft said in the report.<\/p>\n<p>Azure Managed Identity for service-to-service (S2S) has also been implemented on a large scale for Entra ID apps and Azure resources, to help protect secrets such as passwords, storage access keys, and storage SAS tokens from leaks, Microsoft added.<\/p>\n<p>To mitigate device-based compromises, Microsoft reported having deployed 98,000 production-ready, locked-down devices (operating only secure, limited functionalities), in addition to moving 28,000 \u201chigh-risks users\u201d to a customized and locked down Virtual Desktop Infrastructure (VDI) solution.<\/p>\n<p>\u201cTo help secure customers, we have introduced a Microsoft Entra Conditional Access template, currently in public preview, which requires device compliance,\u201d Microsoft said.<\/p>\n<p>Within the \u201cprotect Engineering systems\u201d pillar, which refers to the practices towards reducing the risk of secrets and credentials in Microsoft code, the company has deployed GitHub Advanced Security to block new secrets from being exposed at push within GitHub and Azure DevOps Git repositories.<\/p>\n<p>To help further tackle secrets leak, Microsoft is working \u201cto remove secrets from code and other unsecured storage and transmission methods and has implemented standards of strong authentication protocols that do not rely on weak mechanisms such as plaintext credentials and that actively detect, block, and remove exposed secrets and credentials.\u201d<\/p>\n<p>Under network protection, it is making Azure Virtual Network Encryption generally available in all regions and Domain Name System Security Extensions support available in public preview.<\/p>\n<p>Additionally, to foster \u201cisolation and segmentation\u201d of management as well as services, over 99.3% of physical assets have been inventoried and applied mandatory access control lists (ACLs) on, to isolate their management, Microsoft revealed.<\/p>\n<h2 class=\"wp-block-heading\">Intensified focus on threat management<\/h2>\n<p>Microsoft attributed a handful of other upgrades to the remaining SFI pillars: monitor and detect threats, and accelerate response and remediation.<\/p>\n<p>To facilitate improved system monitoring for threat detection, Microsoft said it has expanded cloud logging capabilities which include detailed logs of more than 30 types of data and standard log retention for 180 days.\u00a0These capabilities are available to Microsoft 365 customers by default at no additional cost, Microsoft added.<\/p>\n<p>Additionally, the company reported establishing central management and a two-year retention period for identity infrastructure security audit logs.<\/p>\n<p>Under threat management initiatives, the company said it addressed 90% of vulnerabilities within the \u201creduced time to mitigate\u201d window for the high-severity cloud vulnerabilities. It also reported publishing close to 800 Common Vulnerabilities and Exposures (CVEs) as part of a transparent communication effort.<\/p>\n<p>\u201cMicrosoft is continuing to make progress on our targets for SFI,\u201d said Vasu Jakkal, CVP Security, Microsoft. \u201c(In this report), we highlight the investments we are making across the company to identify, prioritize, and address cybersecurity risk across the company.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>During its Ignite conference on Tuesday, Microsoft shared a progress update on its Secure Future Initiative (SFI), introduced a year ago, which included significant measures such as enforcing multi-factor authentication (MFA) by default for new tenants, isolating close to 100,000 work devices under conditional access policies, and blocking GitHub secrets from exposure. The progress report, [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":891,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/897"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=897"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/897\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/891"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}