Source URL: https://it.slashdot.org/story/24/09/23/1841218/microsoft-tightens-digital-defenses-with-sweeping-security-overhaul?utm_source=rss1.0mainlinkanon&utm_medium=feed
Source: Slashdot
Title: Microsoft Tightens Digital Defenses with Sweeping Security Overhaul
Feedly Summary:
AI Summary and Description: Yes
Summary: Microsoft has introduced a comprehensive set of security reforms and enhancements through its Secure Future Initiative, addressing previous criticisms regarding its security practices and infrastructure. Significant upgrades to its security systems and protocols have been initiated to bolster protection against future threats.
Detailed Description: The text outlines Microsoft’s proactive approach to improving its cybersecurity framework following major breaches and negative evaluations of its security culture. The key points of the initiative are:
– **Initiative Overview**:
– The Secure Future Initiative report was launched in response to the Cyber Safety Review Board’s findings that Microsoft’s security culture was lacking.
– It includes a commitment to enhance technical and governance measures over cybersecurity.
– **Security Upgrades**:
– **Entra ID and Microsoft Account**: Microsoft has made significant upgrades to its identity management systems, which are critical for authentication and access control.
– **Azure-Managed Hardware Security Modules**: These are being used to secure access token signing keys, providing an additional layer of protection against data breaches.
– **Tenant Management**:
– Purging of 5.75 million inactive tenants is intended to reduce potential attack vectors, making it harder for malicious actors to exploit dormant accounts.
– **Testing System Enhancements**:
– A new testing system with secure defaults has been implemented to prevent security issues stemming from legacy systems, thus mitigating risks associated with outdated technology.
– **Network Monitoring and Compliance**:
– Microsoft has enhanced its network tracking capabilities and now monitors over 99% of its physical network through a centralized inventory, improving firmware compliance and logging practices.
– **Internal Access Controls**:
– Stricter access controls have been established, such as:
– Limiting personal access tokens to a duration of seven days.
– Disabling SSH access to internal engineering repositories, increasing security around sensitive data and systems.
– Restricting access to critical engineering systems to smaller groups, thereby reducing insider threat potential.
– **Audit Log Retention**:
– The audit log retention period has been extended to a minimum of two years, which enhances the company’s ability to investigate and respond to incidents effectively.
These reforms align with broader trends in cybersecurity, focusing on proactive governance, identity management, and strict access controls, which are crucial for safeguarding sensitive data and maintaining compliance in today’s threat landscape.