Security

CSO

CISA director: US is 'not afraid' to shout about Big Tech's security failings

Jen Easterly hopes CSRB's Microsoft report won't impede future private sector collaboration


CISA director Jen Easterly says the US Cybersecurity Safety Review Board (CSRB) "is not afraid to say when something is amiss" in response to questions about the future of private sector collaboration following the board's scathing report on Microsoft.

Asked whether she believed companies would still cooperate with the CSRB if it wanted to probe a serious security mishap, in light of the criticism that faced Microsoft, Easterly said: "I would hope so."

Back in March, the CSRB published a lengthy report after it worked with Microsoft to understand how a break-in at Exchange Online that led to the compromise of senior US officials' email accounts at the hands of a Chinese state-sponsored group came to pass.

The 34-page report illustrated various security failings at Microsoft that allowed the attack to occur, including an inadequate security culture and failure to publicly 'fess up to the core issue at the heart of the exfiltration for months.

One of the main lines commentators took from it was that, ultimately, the major attack on Microsoft's hosted email services happened due to a "cascade of Microsoft's avoidable errors."

It was so damning that it raised the question of whether other companies at fault for such significant infosec blunders would offer the CSRB the same level of cooperation going forward as Microsoft.

The CSRB was established in 2022 following a Biden administration Executive Order in 2021 (EO14028) and serves multiple purposes. But, crucially in relation to this question, it has no legal authority to compel companies to work with it on reports like the one focused on Exchange Online.

Microsoft didn't have to cooperate as fully as it did, but did so voluntarily across a series of written and oral submissions, for which it received acknowledgment and gratitude from the CSRB, echoed by Easterly again this week.

"To Microsoft's credit, they were very transparent," she said in a conversation with Ciaran Martin, professor of practice in the management of public organizations at the University of Oxford, at the inaugural Oxford Cyber Forum last week.

"They sat there as partners, walked through the incident and what happened, and were extremely forward-leaning."

However, the CSRB doesn't yet have the congressional authority and subpoena power it has been pushing for, and the type of power the wider industry believes it should have. As such, future probes into whatever major gaffe may warrant this kind of attention would rely on the collaboration of the organization in question.

It's easy to see why companies may be reluctant to comply, given that the CSRB's report into Microsoft is still so often cited in all manner of security discussions today, months after the report was published.

Microsoft was described by Easterly as "the most important company out there" from a critical infrastructure perspective. While any robust report on such an organization will always be damaging to a degree, if one were to probe a company that was less crucial to modern society, perhaps the PR machine wouldn't be so kind to its long-term prospects.

Satya Nadella, Microsoft CEO, was also commended by Easterly for his reaction to the report and all the measures he implemented across the company that honored the CSRB's primary recommendations.

"I was really pleased with the CEO's reaction," she said. "He talked about security as a priority. If you have a choice between security and something else, do security. We are focusing on security over features, we are going to link security to compensation and hiring.

"I think, as jaw-dropping as the initial report was, I think that that reaction was surprising to many. And of course, the proof will be in the pudding but I think it really has catalyzed a major shift."

Secure by Design pledge plugged

While the CSRB continues to push for the congressional authority it wants, Easterly pointed to CISA's Secure by Design pledge, which was launched earlier this year for organizations to formally side with the whole secure-by-design ideal that's been espoused by the industry for years.

She said there are now more than 150 signups to the pledge, a big rise from the initial 68 when we last visited it, and if major vendors actually developed their products with SBD principles fully adhered to, the number of vulnerabilities that could cause major security events would plummet. It would essentially mean vendors wouldn't have to fear CSRB probes because their products would be secure from the outset, or at least as secure as they should be.

Pointing to Verizon's most recent Data Breach Investigations Report, Easterly said: "There's a line in there that basically said we are at the point where we cannot patch fast enough to prevent cyberattacks. So the only way to deal with this problem is to demand more from our vendors." ®

Send us news
12 Comments

Japanese space agency spotted zero-day attacks while cleaning up attack on M365

Multiple malware attack saw personal data acessed, but rocket science remained safe

Microsoft tells yet more customers their emails have been stolen

Plus: US auto dealers still offline; Conti coders sanction; Rabbit R1 hardcoded API keys; and more

Google: We're still working to defeat Microsoft's 'anticompetitive' cloud policy

Yesterday's settlement between MS and Euro cloud providers shouldn't 'fool' you, says Alphabet arm's cloud boss

CISA broke into a US federal agency, and no one noticed for a full 5 months

Red team exercise revealed a score of security fails

Microsoft avoids formal antitrust EC probe over abusive licensing claims by settling case with CISPE

Pays 'lump sum,' setting up new Azure Stack for hosters and more but some concerned about the private deal

Microsoft exits OpenAI's boardroom to sidestep regulatory scrutiny

Redmond 'confident in the company's direction' says withdrawal letter

Critical Windows licensing bugs – plus two others under attack – top Patch Tuesday

Citrix, SAP also deserve your attention – because miscreants are already thinking about Exploit Wednesday

Microsoft China staff can't log on with an Android, so Redmond buys them iThings

Google's absence creates software distribution issues not even mighty Microsoft can handle

Coders' Copilot code-copying copyright claims crumble against GitHub, Microsoft

A few devs versus the powerful forces of Redmond – who did you think was going to win?

Microsoft tries to clear the air with mountains of CO<sub>2</sub> credits

'Supply chains still powered by coal and gas' scoffs Greenpeace

Microsoft blamed for million-plus patient record theft at US hospital giant

Probe: Worker at speech-recog outfit Nuance wasn't locked out after firing

Hey Microsoft – what ever happened to 'Developers, developers, developers'?

Hey, here’s an idea… create a point system for every time Microsoft hurts us