https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2023 MSP 501 Application
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2023 MSP 501 Application
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Security


Shutterstock

Word conclusion on paper

Microsoft Conclusion on SolarWinds Hack ‘Conflicts’ with Other Messages

  • Written by Edward Gately
  • February 19, 2021
A concerning aspect of this attack is that security companies were a clear target.

Some cybersecurity experts are questioning the conclusion and advice from Microsoft regarding the internal impact of the massive SolarWinds hack.

Microsoft said none of its systems was used to attack others during the SolarWinds hack. Furthermore, there’s no evidence of access to its production services or customer data.

Vasu Jakkal is Microsoft’s corporate vice president of security, compliance and identity. She said security companies were a clear target.

Microsoft's Vasu Jakkal

Microsoft’s Vasu Jakkal

“Microsoft, given the expansive use of our productivity tools and leadership in security, of course was an early target,” she said.

The espionage campaign has heavily impacted the federal government and cybersecurity industry. Russian hackers reportedly carried out the attack.

Limiting the Scope

This highly sophisticated nation-state actor was able to “breach the gate” at Microsoft, Jakkal said. However, a “unified team of human and digital defenders” met the attacker.

“There are several reasons why we were able to limit the scope and impact of this incident for our company, customers and partners,” she said. “But ultimately, they all boil down to a few fundamental ways we approach security. We believe these approaches represent an opportunity for all IT and security teams as we collectively navigate a rapidly evolving and sophisticated threat landscape.”

A key action is adopting a zero-trust architecture, Jakkal said. It’s also important to embrace cloud and “layer up, no matter who your security vendors are.”

Moreover, Microsoft encourages every company, of every size, to work with the community to share information, strengthen defenses and respond to attacks.

Brandon Hoffman, Netenrich‘s CISO, said Microsoft’s conclusion comes as a surprise and seems to conflict with other messages it has shared.

NetEnrich's Brandon Hoffman

NetEnrich’s Brandon Hoffman

“As the incident response has continued, it seems they were finding more and more areas affected by the SolarWinds issue,” he said. “The fact that the investigation has concluded rather suddenly is an interesting move.”

Earlier, Microsoft reported the hacker group accessed Microsoft source code, the instructions written when developing programs.

“Likewise, interesting is the advice on zero trust,” Hoffman said. “From a certain perspective, it’s not clear that taking a zero-trust stance would have prevented this issue. It would have potentially avoided some of the damage. However, it’s not clear that zero trust would have prevented the initial attack vector.”

The call to embrace cloud and strengthen community sharing feels a bit short, Hoffman said. That’s because these are platitudes the security industry has been evangelizing for many years.

Zero Trust ‘Misleading’

Dirk Schrader is global vice president of New Net Technologies.

NNT's Dick Schrader

NNT’s Dirk Schrader

“Microsoft is right in stating that security companies are a clear target for upstream attacks where malicious code is embedded into the products deployed across a large number of customers,” he said. “A clean source approach, validating the steps from development to delivery, covering feeds like those in antivirus or threat intelligence solution, is the way to go for vendors.”

A zero-trust plan seems like a good idea at first sight, but is misleading here, Schrader said.

“The Solorigate incident isn’t about a user who should not be trusted; it is about the sourcing itself,” he said. “The same is valid for the recommended embracing of cloud and IaaS, which again is about trust. Nevertheless, strengthening the community of defenders is a good thing. And joining Microsoft’s community is one place of many to do so.”

‘A Bit Self-Serving’

Oliver Tavakoli, Vectra‘s CTO, said Microsoft’s advice to embrace the cloud can appear “a bit self-serving” because it makes a lot of money delivering cloud services.

“The better advice would be that if you are using the cloud, you should embrace security tools which understand the attack surface inherent in such a cloud deployment,” he said.

The advice of moving from on-premises identity to cloud identity is good, Tavakoli said.

“Too many organizations have straddled these two worlds with their identity strategy for far too long,” he said. “And it has recently become evident that attackers are taking advantage of such hybrid identity models.”

Greenlight's Kevin Dunne

Greenlight’s Kevin Dunne

Kevin Dunne is president of Greenlight Technologies. He said Microsoft’s conclusion marks the first step in the process of the security community recovering from the SolarWinds hack.

“This attack highlighted the need to reconsider trust at all levels of the security supply chain – even in terms of trusting updates from long-tenured, legitimate suppliers,” he said. “Microsoft’s recommendations are tangible, appropriate actions that all organizations can take to move their infrastructure to the cloud and implement a zero trust security policy.”

More time investigating means reduced time to detecting and remediating breaches, Dunne said.

Tags: MSPs Cloud Security Technologies

Most Recent


  • Making Waves
    8 Channel People Making Waves This Week at Lumen, Accenture, Amazon, Canalys, More
    Cisco led a “crowded” secure access service edge (SASE) market in terms of revenue in 2022, experts said.
  • network in the cloud
    Fortinet, Huawei, Palo Alto, VMware Lauded in Gartner Peer Insights SD-WAN Study
    Thousands of customers have weighed in on how their SD-WAN vendors have performed.
  • Do AWS, Azure, Google, Oracle, Others, Have Too Much Market Power?
    The FTC, concerned about cloud vendors’ sway over customers, is seeking public comment.
  • Unemployed, layoffs
    Veeam Layoffs Impact 200 Workers, Company Remains 'Strong, Profitable'
    Veeam continues to hire for roles in R&D.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • White House
    White House to Private Sector SMEs: Get Serious About Cybersecurity
  • Stressed young people
    More Partner Pain Points: MSPs On Lack of End-to-End Security, 'New Normal'
  • Benefit, Plus Sign
    TBI, Avant Add New Cloud, Security Suppliers to Lineups
  • CIO
    ScanSource Hires New CIO to Lead Global IT Strategy

Upcoming Events

View all

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Galleries

View all

8 Channel People Making Waves This Week at Lumen, Accenture, Amazon, Canalys, More

March 24, 2023

National Women’s History Month: Channel Women Have Stories to Tell

March 24, 2023

VEC Attack Tries to Steal $36 Million, Ferrari, Dole Hit with Ransomware Attacks

March 23, 2023

Industry Perspectives

View all

Selling Your MSP: Strategic vs. Financial Buyers

March 22, 2023

10 Strategic Smart Enterprise Drivers for 2023

March 16, 2023

Does Your Company Have a Virtual Water Cooler?

March 13, 2023

Webinars

View all

Equipping the Hybrid Workforce: What It Takes to Execute

March 28, 2023

Give Customers the Power: How MSPs Can Leverage Cloud Choice

April 4, 2023

DE&I Dialogue: How the Right DE&I Initiatives Can Propel Your Business

April 5, 2023

White Papers

View all

6 UCaaS Reseller Challenges and How Real World Businesses Solved Them

February 1, 2023

Frost Radar: North American UCaaS Market, 2022

February 1, 2023

The Complete Guide to White-Label UCaaS for Reseller Success

February 1, 2023

Channel Futures TV

View all

Coffee with Craig and James Episode 121: Hewlett Packard Enterprise

Aryaka ‘Driving Value to the Channel Community’ with Throttle

March 24, 2023

Real-Life M&A: Advice for a Successful Channel Deal

March 13, 2023

Coffee with Craig and James Episode 120: Ronnell Richards

March 3, 2023

Twitter

ChannelFutures

Channel people making waves include: @jmcbain, @NetworkMoe, @ajassy, @JulieSweet, @Elvia_Valdes_M, @GovITDave… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

We delve into AI impacting the channel, this week featuring @nvidia, @GoTo, @twilio and more.… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

[email protected]_Inc's Peer Insights are a treasure trove for partners looking to sell #SDWAN. dlvr.it/SlRDmk https://t.co/oElLXzOIbb

March 24, 2023
ChannelFutures

#CPExpo preview: @GlobalIndirect of @AryakaChannel with a preview of the next phase of the company's channel progra… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

U.S. competition regulators want to know if @AWSCloud, @Azure, @GoogleCloud, @OracleCloud hold too much market powe… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

📣 Join us on April 13th to hear from the 2023 Channel Influencers and get their insights on the state of the channe… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

#CPExpo preview: Learn about why @USWired accepted an #acquisition deal and what partners should look for in an M&A… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

.@Veeam lays off 200 workers to increase efficiency. #backupandrecovery dlvr.it/SlQWZW https://t.co/QTJx1NX69q

March 24, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X