Security Series #4: The Threat Landscape – Targeted Attacks explained- Top 3 Mitigations – Top 5 aspects of incident preparation

Targeted attacks are an evolution of espionage to target a specific organization in order to steal information, modify information, or destroy information or systems. On the other hand, opportunistic attacks (see previous post) target a specific technology without caring about who uses it. Targeted attacks are technology agnostic as the attackers have the resources and…

0

Security Series #3: the threat landscape – opportunistic attacks from Microsoft Security Intelligence Report v14

Microsoft has recently published the latest version of the Security Intelligence Report v14 (http://microsoft.com/sir) focusing on software vulnerabilities, software vulnerability exploits, and malicious and potentially unwanted software during the third and fourth quarter of 2012. Please allow me to share a few highlights from the report. Use an up-to-date antimalware Computers with a real-time antimalware…

0

Security Series #2: How to Bake Security in Products and Services? SDL.

Engineering more secure software with the Microsoft Security Lifecycle (SDL) In January 2002, Bill Gates launched the Microsoft Trustworthy Computing Initiative which focused on security as one of its four pillars. One of the big achievements of this initiative was the creation and evolution of the Microsoft Security Development Lifecycle or SDL, a comprehensive approach…

0

Security Series #1: Principles of Cyber Security

Today I’m starting a series of blog posts on cyber security. Before getting to various topics, I thought it could be useful to remind everyone some of the security principles that are the most useful to help you achieve a higher level of security, whichever technology you’re going to use. Core attributes of cyber security:…

0

Linux-Windows Vista dual boot with BitLocker and a TPM

Based on my earlier posts, I’ve recently written a whitepaper for Microsoft France on how to build a machine that is capable of dual booting either Linux or Windows Vista when the latter is protected by BitLocker leveraging a TPM chip. If you understand French, you’ ll find the whitepaper, a webcast where I describe…

1

Network restrictions for service hardening

(This is part 5 of our series of posts on service hardening.) Last but not least a service can be (and should be) configured to have network restrictions with what is called the “Windows Service Hardening” rules in the Windows SDK (we’ll call those WSH rules for short). As a service developer, it is your…

3

Write-restricted token

(This is part 4 of our series of posts on service hardening.) A service can be configured to be write-restricted, in addition to having a per-service SID. To do so, you specify a SID type of “Restricted” when configuring your service (see our previous post “Per-service SID”). In that case the process hosting your service…

1

Per-service SID

(This is part 3 of our series of posts on service hardening.)  Under Windows Vista/Longhorn Server, your service can now have its own SID (Security Identifier), which you can then use in ACLs to protect your service resources. You configure your service to be assigned a per-service SID during its installation with the ChangeServiceConfig2 API (dwInfoLevel=…

2

Least privilege for services

This is part 2 of our series of posts on service hardening. “Need to have” and least privilege principle Executing with least privilege is a good practice of computer security.  As with the “need to know” principle for information access, there should be a “need to have” principle for privileges. If your code does not…

2

Services isolation in Session 0 of Windows Vista and Longhorn Server

You may have heard that built-in services in Windows Vista were specifically hardened by Microsoft engineers during its development process. You might be wondering what that really means, how it works and, if you are a developer, how to harden your own services the Vista way.  Jean-Yves Poublan, a Principal Security Consultant at Microsoft, and…

2