Security

CSO

CISA director: US is 'not afraid' to shout about Big Tech's security failings

Jen Easterly hopes CSRB's Microsoft report won't impede future private sector collaboration


CISA director Jen Easterly says the US Cybersecurity Safety Review Board (CSRB) "is not afraid to say when something is amiss" in response to questions about the future of private sector collaboration following the board's scathing report on Microsoft.

Asked whether she believed companies would still cooperate with the CSRB if it wanted to probe a serious security mishap, in light of the criticism that faced Microsoft, Easterly said: "I would hope so."

Back in March, the CSRB published a lengthy report after it worked with Microsoft to understand how a break-in at Exchange Online that led to the compromise of senior US officials' email accounts at the hands of a Chinese state-sponsored group came to pass.

The 34-page report illustrated various security failings at Microsoft that allowed the attack to occur, including an inadequate security culture and failure to publicly 'fess up to the core issue at the heart of the exfiltration for months.

One of the main lines commentators took from it was that, ultimately, the major attack on Microsoft's hosted email services happened due to a "cascade of Microsoft's avoidable errors."

It was so damning that it raised the question of whether other companies at fault for such significant infosec blunders would offer the CSRB the same level of cooperation going forward as Microsoft.

The CSRB was established in 2022 following a Biden administration Executive Order in 2021 (EO14028) and serves multiple purposes. But, crucially in relation to this question, it has no legal authority to compel companies to work with it on reports like the one focused on Exchange Online.

Microsoft didn't have to cooperate as fully as it did, but did so voluntarily across a series of written and oral submissions, for which it received acknowledgment and gratitude from the CSRB, echoed by Easterly again this week.

"To Microsoft's credit, they were very transparent," she said in a conversation with Ciaran Martin, professor of practice in the management of public organizations at the University of Oxford, at the inaugural Oxford Cyber Forum last week.

"They sat there as partners, walked through the incident and what happened, and were extremely forward-leaning."

However, the CSRB doesn't yet have the congressional authority and subpoena power it has been pushing for, and the type of power the wider industry believes it should have. As such, future probes into whatever major gaffe may warrant this kind of attention would rely on the collaboration of the organization in question.

It's easy to see why companies may be reluctant to comply, given that the CSRB's report into Microsoft is still so often cited in all manner of security discussions today, months after the report was published.

Microsoft was described by Easterly as "the most important company out there" from a critical infrastructure perspective. While any robust report on such an organization will always be damaging to a degree, if one were to probe a company that was less crucial to modern society, perhaps the PR machine wouldn't be so kind to its long-term prospects.

Satya Nadella, Microsoft CEO, was also commended by Easterly for his reaction to the report and all the measures he implemented across the company that honored the CSRB's primary recommendations.

"I was really pleased with the CEO's reaction," she said. "He talked about security as a priority. If you have a choice between security and something else, do security. We are focusing on security over features, we are going to link security to compensation and hiring.

"I think, as jaw-dropping as the initial report was, I think that that reaction was surprising to many. And of course, the proof will be in the pudding but I think it really has catalyzed a major shift."

Secure by Design pledge plugged

While the CSRB continues to push for the congressional authority it wants, Easterly pointed to CISA's Secure by Design pledge, which was launched earlier this year for organizations to formally side with the whole secure-by-design ideal that's been espoused by the industry for years.

She said there are now more than 150 signups to the pledge, a big rise from the initial 68 when we last visited it, and if major vendors actually developed their products with SBD principles fully adhered to, the number of vulnerabilities that could cause major security events would plummet. It would essentially mean vendors wouldn't have to fear CSRB probes because their products would be secure from the outset, or at least as secure as they should be.

Pointing to Verizon's most recent Data Breach Investigations Report, Easterly said: "There's a line in there that basically said we are at the point where we cannot patch fast enough to prevent cyberattacks. So the only way to deal with this problem is to demand more from our vendors." ®

Send us news
12 Comments

Microsoft investigating 365 Office activation gremlin

Says it's not sure what the issue is but points at admins tweaking licensing options

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Microsoft Edge takes a victory lap with some high-looking usage stats for 2024

Lots of big numbers, but market share wasn't one of them

Microsoft coughs up yet more Windows 11 24H2 headaches

Users report the sound of silence from operating system update

AI's rising tide lifts all chips as AMD Instinct, cloudy silicon vie for a slice of Nvidia's pie

Analyst estimates show growing apetite for alternative infrastructure

When old Microsoft codenames crop up in curious places

Chicago is my kind of driver model

Suggested Actions fails to suggest its own survival as Windows 11 feature killed

Final curtain call for weird wingman

The winner of last year's Windows Ugly Sweater is ...

Register readers have spoken

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Windows 11 24H2 strikes again – Outlook might not start with Google Workspace Sync running

Meanwhile, 365 Enterprise users have a date for new Outlook rollout

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence