0,3658,s%253D908%2526a%253D20127,00.asp
Microsoft: Secure out of the Box?
Search    in           Ziff Davis Media
The Net Economy

Already a Member? Sign In Not a member? Join Now
Home My Account Sign In
Saturday, February 2, 2002 

advertisement

Views

News

Industry Q&A

Finance

Markets

Networks

Revolutionaries

Services

Strategies

Free Subscription



The Net Economy: January 21, 2002
Check out the current issue

Past Issues
  • Free Subscription
  • Subscriber Services





  • Newsletters
    Get The Net Economy’s
    FREE online newsletters!
    The Net Economy Update
    HTML Text

    Network Services From Paul Coe Clark III
    HTML Text

    Joe McGarvey�s Optical Networking Letter
    HTML Text

    The Carol Wilson Report: The Business and Technology of Communications
    HTML Text

    Enter your e-mail:

    Submit
    View All Newsletters




    Industry Q&A Section Header
    Howard Schmidt Click to Enlarge  
    December 14, 2001
    Microsoft: Secure out of the Box?


    Howard Schmidt is chief security officer at Microsoft. He recently testified before the House Subcommittee on Commerce Trade and Consumer Protection about the state of Internet and computer security. We tracked him down later to ask him about, among other things, cyberterrorism and the Microsoft’s level of responsibility for the success of large virus attacks.

    Schmidt served in the US. Air Force, the F.B.I, and local law enforcement. After Sept. 11, he was called back to active duty with the Joint Task Force for Computer Network Operations, the Department of Justice and the FBI’s National Infrastructure Protection Center.

    Q: In your testimony the other day, you listed a series of industries at risk for cyberterrorism or electronic intrusion. One of those you listed was telecom. What weaknesses are there in the telecom industry that haven’t been addressed.

    A: I think it all revolves around the people and the process. I don’t know that there’s a specific weakness. I think, generally, that the concern we have as the industry partnerships, are, are we all prepared, as the owners and operators of the critical infrastructure, to be able to respond to three major areas of concern for the value of the country. There’s the national-security piece, which we saw, responded in 9/11. There’s the law enforcement/public-safety piece, which has some relation to 9/11, but also we’ve seen in other venues, even simple things like when an ice storm knocks down the ability to communicate. The third thing is the economic viability of the nation. And that’s our ability, because so much has been built, from an economic standpoint, around the technology piece.

    I’ll cite a telecom component during 9/11. I was in D.C. You’re based in D.C., aren’t you?

    Q: Yes, I am, right off K Street, three blocks from the White House.

    A: So you know what it was like. I don’t know if you tried to use a mobile phone, or you saw people lining up at the payphones, only to be able to get no signal. Those are the sort of things that we probably need to have more redundancy issues and have some resiliency on…

    Q: Capacity issues…

    A: Right.

    Q: Oddly enough, I worked the whole afternoon. I think I was the only person in downtown Washington, and I had no problem getting people on the phone. I was just blessed, I think.

    A: I was up at the Capitol, and I tried my darndest to get my cell phone working, and had no success. Interestingly enough, when I got down to Northern Virginia, outside some of the towers, I was able to call around the company with little or no problems.

    Q: How big a cyberterrorism threat is there? Let me define that a little better, because it’s a meaningless question in some ways. How severe a threat is there of an Internet-based attack that does widespread economic or functional damage by a state-sponsored group or an independent group of terrorists, as opposed to the normal intrusion, denial-of-service attacks and virus problems we usually see?

    A: That’s a tough question to answer, because I don’t know if that question’s been asked in all the appropriate circles. If you look at everything from Sen. Nunn’s hearing, back in 1997, to the report of the President’s Commission on Critical Infrastructure Protection, one of the things that they look at is the availability of being able to do harm relative to the cost. So when you talk about the actual threat piece of it, the cost is relatively insignificant. It’s a piece of code that you write to go do something bad, and now the availability of those sort of things is very widespread. People have computers in their homes, connected to DSL and cable modems, so the cost of the ability to do damage is down. The availability, by having a lot of systems out there to attack, is up, so that puts a threat picture out there that’s more viable than it was a few years ago.

    Q: Like leveraging box cutters to take out buildings.

    A: That’s correct. That was a relatively inexpensive way to create havoc. And if you do that on the electronic piece of it, some of the threats that out there, we really don’t have a handle on how viable they are, but we can do some modeling, and building of threat scenarios, to see, given what tools we know are available to be applied with malicious intent, how much damage can be done.

    Q: But do we know of any states or groups that have cyberterrorism efforts underway?

    A: I think, publicly, what we know is that there have been a number of nations that have created information-warfare groups, and they’ve been fairly public about it. But as far as anything beyond the cyberhacktivism we’ve seen, I don’t know if there’s been anything publicly discussed about state-sponsored cyberterrorism cells out there, if you would.

    Q: Give us the Reader’s Digest one-paragraph description of IT-ASAC.

    A: The IT-ASAC is a group of some of the key owners and operators of the infrastructure that belong to the IT community. It’s a group of us that put aside any competitive differences to share information on best practices and vulnerabilities anonymously among each other to maintain the viability of the critical infrastructure. We also develop mechanisms to share that with the government as a sort of early-warning system, using our collective 24-by-7 information centers and the collective knowledge and expertise of our companies.

    Q: You’re the chief security officer of Microsoft. Explain for us a little bit how security fits into the Microsoft corporate structure.

    A: I think security is recognized as the number-one priority across the company. That goes not only to operational security and securing our assets, but also to product development. In my role, I report to the CTO, and I have Advanced Security Strategy Group, which works on security architecture, security auditing, incubation of security-related tools and security policy across the company that transcends the operational groups as well as the development groups.

    Q: One of the things that you took a position on in your testimony was on openness and security, in terms of being against people publishing exploit codes to point out weaknesses — which in some sectors of the software-development community is considered a good thing.

    A: What we’re relating to is responsible reporting, and there’s a difference. In some cases, it’s tantamount to screaming “fire!” in a crowded movie theater. Responsible reporting means if you find a vulnerability, you contact the person in the best position to fix it, normally the vendor of whatever the product is, give them all the information possible so that they can create a fix, and then go out and get the fix installed — as opposed to going out and telling everyone that everybody in this one apartment complex doesn’t lock their doors or leaves their keys in their cars, which then opens them up to malicious attacks.

    Q: I was at a cybersecurity event last night. I don’t know if you know Richard Forno, CTO of Shadowlogic?

    A: Yes, I do know Richard.

    Q: He said his theory was “D3” — “declassify, demystify and diversify (software).” All three of those things are not things associated with Microsoft. Is that a policy you’d take issue with?

    A: I think any time we find any security vulnerability, we’re one of the best in the industry to notify people of the details of them and give them the details to get it fixed.

    Q: Microsoft, traditionally, though, although less so of late, has been known for having a relatively closed security-reporting and bug-reporting system compared to the *NIX and open-source communities. Has that changed, and how much?

    A: Well, for one I think it’s a misperception or an undeserved reputation. One of the things I hear most often is that people responsible for these things at their companies say they’re seeing too many of these things. I don’t think it’s an issue about open-source, I think it’s an issue about responsibly, once somebody reports something, we have to replicate what they’ve reported to make sure it’s a product-security issue and not some hardware problem they’ve got, or some incompatibility with some other application they’ve got, to replicate that, analyze that, and put the patch out. I don’t know of any time in the four years I’ve been here that that hasn’t been a priority. It’s probably a misperception and mischaracterization of our reputation.

    Q: Today, some of the states came back with a proposal for opening up Microsoft code. What effect would that have about security.

    A: [Explains that he is not involved in antitrust issues] I think the position has always been that you check the final product for vulnerabilities. Because there’s a whole lot of open source out there that, day after day after day, there’s more reports of vulnerabilities. I think it doesn’t make any difference whether it is open source or closed source, it’s a matter of identifying them once the product is released.

    Q: How much of computer and network security should be handled by technology and how much by law enforcement?

    A: Law enforcement’s role is very much a reactive role. After something bad happens, then they come in, and I think they have an extremely vital part to help investigating these things to deter people from attacking these systems. But the idea on the front end is to use the people, the processes and the technologies to prevent these things from happening as much as we can, and if there’s something we can’t handle, law enforcement comes in and identifies those that have.

    Q: I assume from your testimony that you guys supported the language in the USA PATRIOT Act on cyberterrorism and intrusion. Are we in danger of over-broadening the standard for calling something cyberterrorism to include routine exploratory intrusions and port scans and other minor events, in the heat of the moment after Sept. 11?

    A: I have met with a number of attorneys both in the corporate world as well as the justice world, and I don’t see that’s the case. I think all the changes that were made in the USA-PATRIOT Act relative to online surveillance, relative to any cyber-related investigative capability, have revolved around not changing the thresholds of what it takes to get a search warrant, not changing the threshold of what it takes to get a wiretap, but streamlining the process; you have to prove with probable cause that something has occurred to get most of the court orders .

    If I’m tracking somebody that’s, say, involved in terrorist activity, and they’re using a cell phone, and they can put the cell phone down from having a voice call to use the same cell phone to do an Internet message because they’ve got a Web-enabled phone, and then they go home and they use an online account to communicate further, rather than go get five warrants for the same thing, they don’t have to chase the technology, they chase the criminal activity.

    Q: One of the things you opposed in your testimony was federal security mandates for the industry. But there’s a strong push for strong industry best-practices policies or government mandates. Christopher Painter (Department of Justice, Deputy Chief of the Computer Crime and Intellectual Property Section] says the industries needs bet practices; he says, too often the industry has no plan for dealing with intrusions at all. Is there going to be pressure for government standards?

    A: I hope not. What we’ve seen from time immemorial, market forces drive a lot of what happens in the development efforts. Standards don’t drive it, because what happens, you wind in a situation where standards may turn around and inhibit the ability to innovate and the ability to build more secure products.

    Q: In your testimony, you listed several attacks, virus attacks and others, some of them against Microsoft weaknesses, and some of them against Linux and other operating systems. But how much responsibility does Microsoft have because of its market share for security.

    A: I think Microsoft has recognized that, because we are the market leader, we have a special obligation to improve security. This is an industry issue we’re all working on, but because of that special role out obligation is increased. Which is why we created programs like the strategic technology protection program — helping people get secure with a number of free tools, then getting them to stay secure by changing, fundamentally, some of our internal processes, to further strengthen the security that we’ve been working on internally.

    Q: Some of the security problems with Microsoft products are things like buffer overflows. That happens in programming, and you fix it. But others seem like boneheaded decisions based on marketing. Things like enabling Windows Scripting Host by default on millions of consumer machines and making e-mail attachments executable. In these big virus attacks, doesn’t Microsoft bear some responsibility for those choices?

    A: I think that picture has changed. Once again, we’ve been developing stuff based on ease-of-use for the customer and what the customer requirements are. I think what happens now is that we’ve seen the threat picture change. I think it goes back to a physical analogy. If I leave my keys in my car because it’s convenient for me, and somebody steals my car, is that my fault? Ten or 15 years ago, the likelihood of that happening was very, very low. But the threat picture has changed dramatically in most places.

    That’s the same thing that’s happened with software. Those things were designed to make it easy for people to do the stuff that they were doing. It turns out that criminals and others with malicious intents have turned those good things into bad things. Which is why we’ve had to fundamentally … the way we ship products. They will be shipped secure out of the box now. It may be a little more difficult to get some of the features turned on, but it’s going to be more secure, because that’s what the new picture warrants for us.

    Q: But that kind of begs the question, because it wasn’t completely unthinkable, like someone flying a plane into a building. At the time when all these features were being rolled out, programmers online were screaming left and right that this was inevitably going to result in these massive incidents, and, sure enough, they did.

    A: If you look at the development process, and how long it takes to develop these things and get them out the door, this is not something that people started working on six months ago, and the developer community is saying this is a bad thing. This is stuff that has been in progress for years, which is why we’ve had to effectively retool the way we do things internally, to meet that new threat environment.

    Q: I’ll give you a cheerful quote from Rick Forno. He said one of our major security problems is “our continuing blind dependence on Microsoft operating systems.”

    A: Richard’s entitled to his opinion, but I ask Richard or anyone else to look at the security vulnerabilities that have been identified in anything else that’s out there, and the response mechanism. Until some time as we develop a society that’s perfect in writing code, as you actually pointed out; until some time as we have perfect processes, then we have to do some level of maintenance, some level of fixing things. I agree that we all continue to do more work on it.

         



    Get The Net Economy Free
    Fill in the form below to apply for a free subscription to the print edition:
    Company: Address: Zip:
    First Name: City: Email:
    Last Name: State:  
    Email this Article
    Printer-Friendly Version

    RELATED ARTICLES  
    .NET: The Most Secure Microsoft Yet?
     

    NEWS  
    2.1.2002
    McLeod Charts a Losing Course
     
    2.1.2002
    Profit, but No New Customers, for Tellium
     
    2.1.2002
    EU Approves HP-Compaq Merger
     
    2.1.2002
    Solving the ‘mlife’ Mystery
     
    1.31.2002
    Don’t Touch that Dial
     
    MORE

    THE TNE 100 
    The index for the networked world
     

    COMMENTARY 
    Carol Wilson: Can’t Get No Satisfaction
     
    Paul Coe Clark III: Powell’s ‘Slightly Bitter’ NextWave Deal
     
    Sarah Schmelling: Family Matters
     
    Tim Kridel: Time to Get Paid
     
    Dawn Bushaus: Good News from Qwest?
     
    MORE

    POLL 
    What is the future of energy companies in telecom in the post-Enron era?
    Players like Dynegy still have a good shot at cracking the market.
    Some energy companies, needing to diversify and leveraging their rights of way, will make it.
    Chances are poor – shareholders will see telecom as an oversaturated market.
    Nil — The Enron scandal has tainted the pool.
    VIEW ALL POLLS


     SHOP NOW
    Find the products and prices you're looking for:
     
    Pick a Category:
    Shop by Keyword:

    Shop by Price Range:
    Powered by Nextag.com


     
    Sponsored Links
    advertisement
    Shop Now! - Dell Home Solutions Center

    The Net Economy:
    Customer Service | Contact Us | About | Advertise

    Ziff Davis Media:
    About | Advertise | Newsletters | Magazine Subscriptions | eSeminars | Feedback
    Baseline | CIO Insight | Computer Gaming World | Electronic Gaming Monthly | eWEEK | ExtremeTech | GameNOW | Interactive Week | Official US PlayStation Magazine | PC Magazine | Ziff Davis Smart Business | The Net Economy | Yahoo! Internet Life
    Copyright © 2002 Ziff Davis Media Inc. All Rights Reserved.
    Reproduction in whole or in part in any form or medium without express written permission of Ziff Davis Media Inc. is prohibited.
    For reprint information: click here.
    Search this website