Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

// // //
7/19/2021
10:00 AM
Nat Kausik
Nat Kausik
Commentary

Breaking Down the Threat of Going All-In With Microsoft Security

Limit risk by dividing responsibility for infrastructure, tools, and security.

Did the SolarWinds attack set a precedent for hackers to target companies that rely on Microsoft security infrastructure? That question is top of mind for cybersecurity experts.

Related Content:

It's High Time for a Security Scoring System for Applications and Open Source Libraries

Special Report: Building the SOC of the Future

New From The Edge: 5 Mistakes That Impact a Security Team's Success

Ransomware attacks that halted operations at Colonial Pipeline and JBS are some of the latest examples of how hackers and cybercriminals exploit network security vulnerabilities to get inside organizations to steal information and disrupt operations. The rise of ransomware and malware attacks is terrible news for companies that rely on a single vendor security infrastructure, such as Microsoft.

Recent cyber events over the last several months have highlighted a critical need for enterprises to break free from depending on one vendor for security to limit risk.

Understanding the Risks
To fully comprehend the perils of this strategy, picture enterprises that rely on a single vendor for infrastructure, tools, and security as ships with one wide-open hull. Having an unsegmented body of the ship means it would be prone to sinking very quickly when damaged. On the other hand, companies that segment their security infrastructure with multiple vendors are like ships with several compartments. When one area is compromised, the whole ship isn't immediately exposed.

The SolarWinds attack is a prime example of what can happen when enterprises use only one vendor for infrastructure, tools, and security. In this case, the exclusively Microsoft architecture proved to be an uninterrupted connected surface that let cybercriminals move from a single compromised laptop to the Azure Active Directory and then Office 365. Once hackers have access to email, they can pretend to be anybody in the organization, ultimately gaining complete control.

Since Microsoft's business applications are widely used across enterprises, hackers can easily access the same set of products used by thousands of organizations. That means they can perfect their infiltration strategies at leisure and mount them on high-value targets after they're refined and proven highly effective.

Diversify Your Tech Stack
Microsoft is selling companies applications for their business and also offering the security to safeguard these tools. While it may seem wise to bundle these two entities, it actually puts enterprises at greater risk.

Organizations must split the application stack and the security stack. Inserting third-party security products creates a barrier to the flow of an attack and prevents cybercriminals from operating without restrictions.

Deploy Consistent Cloud Security
While it is important to separate the applications from the security, the security itself should be integrated and consistent. Individually, cloud access security brokers (CASBs), zero-trust network access (ZTNA), and secure Web gateways (SWGs) offer varying degrees of protection against threats. However, the weakest link will be compromised first.

Businesses cannot be adequately prepared to face today's sophisticated threat environment without consistent security across their various cloud and network security solutions. Fortunately, secure access service edge (SASE) can streamline security by substituting fragmented solutions that have to be managed and updated separately for one unified platform that delivers comprehensive security across every segment of your infrastructure. Key functionalities include:

  • A modern CASB that delivers end-to-end protection for data in any cloud service and any device
  • An on-device SWG that decrypts and inspects traffic directly on users' devices for content filtering and threat protection
  • A unique ZTNA approach that provides comprehensive and secure remote access to on-premises resources

Protecting the Distributed Workforce
Today's distributed work environment means data and users exist outside the corporate network. Legacy security investments and strategies cannot keep up, and enterprises that call themselves a "Microsoft shop" need to realize that this all but guarantees that the time from an initial compromise to impact can be very brief. 

By deploying the safeguards outlined above, security teams can develop a resilient IT infrastructure capable of ensuring business stability and minimize the spread of a cyberattack.

[Editor's note: The author's company is one of a number of companies that offer SASE, CASB, SWG, and ZTNA services.]

Nat is president and CEO of Bitglass and a co-founder of the company. Prior to Bitglass, Nat was CEO of Asterpix, Trubates, FineGround, and Arcot Systems, and held positions in research and academia. Nat earned a B.Tech from IIT, Madras, an MS from Princeton University, and a ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...