In a scathing indictment of Microsoft corporate security and transparency, a Biden administration-appointed review board issued a report Tuesday saying “a cascade of errors” by the tech giant let state-backed Chinese cyber operators break into email accounts of senior U.S. officials including Commerce Secretary Gina Raimondo.

The Cyber Safety Review Board, created in 2021 by executive order, describes shoddy cybersecurity practices, a lax corporate culture and a lack of sincerity about the company’s knowledge of the targeted breach, which affected multiple U.S. agencies that deal with China.

It concluded that “Microsoft’s security culture was inadequate and requires an overhaul” given the company’s ubiquity and critical role in the global technology ecosystem. Microsoft products “underpin essential services that support national security, the foundations of our economy, and public health and safety.”

  • Odin@lemmy.world
    link
    fedilink
    arrow-up
    8
    ·
    8 months ago

    I thought US Gov had their own email systems. When did they start moving officials’ mailboxes to Microsoft?

    • sylver_dragon@lemmy.world
      link
      fedilink
      English
      arrow-up
      17
      ·
      8 months ago

      During my time contracting in the FedGov, they went “all in” on Microsoft products. From email to Teams to other products, they were becoming a Microsoft shop top to bottom. This was fine for products which were fully mature. For all the jokes about it, Microsoft email is actually pretty good. Azure AD is fine, as long as you have a team of sysadmins to unfuck permissions issues. Permissions will get fucked, as there is a dearth of tools for mapping them. But, that’s been a perennial problem with AD permissions well back to the NT 4.0 days (maybe longer, I was dealing with Novell before that). And there isn’t much better for centralized user management than AD, though third party PAM tools do help here, a lot. Their security tools were (and still are) shit on toast from a usage perspective. Seriously, the only reason people choose MS Defender anything is because “no one ever got fired for choosing IBM Microsoft”.

      The main problem is that Microsoft is a “for profit” company. This means that there will always be tension between Security and Profit. So, it’s unsurprising that they have a lax security culture. Security isn’t profitable. The appearance of security is, and I have little doubt Microsoft will be able to roll out all kinds of documentation showing that they were “compliant” with all the required security controls. This means exactly dick, as it’s easy to have insecure systems be “fully compliant” and then do exactly fuck all to actually secure the systems. “Compliant” is a baseline and only proves that you’re not going to get hacked within the first ten minutes of plugging a network cable in. Actually securing the system means a lot of people, processes and efforts finding and fixing holes not covered by the baselines and watching the network for anomalies. That’s really expensive and makes ITs job a pain a lot of times. It also makes no money, as it doesn’t do much to enhance the appearance of security, so it tends to get ignored and eventually cut. The end result is exactly what we have here today, a major hack which didn’t get picked up on for weeks.