HomeCyber BalkansMicrosoft and Security Operations professionals discuss kernel access after CrowdStrike

Microsoft and Security Operations professionals discuss kernel access after CrowdStrike

Published on

spot_img

Microsoft is reconsidering its policy on allowing partners direct kernel access following the recent outage caused by a bug in CrowdStrike’s Falcon software. The incident, which occurred on July 19, resulted in the failure of 8.5 million Windows systems worldwide due to the software running as a device driver in the core Windows OS kernel, leading to a kernel panic and system crash.

SecOps professionals have raised concerns about the potential instability of systems if partners continue to have direct kernel access. While some argue that kernel access is necessary for comprehensive system visibility and security enforcement, others believe that alternatives should be explored to prevent similar incidents in the future.

Microsoft’s decision to potentially revise its stance on kernel access comes after the company highlighted the need for innovation in ensuring end-to-end resilience in Windows systems. New technologies such as Virtualization-Based Security (VBS) enclaves and the Microsoft Azure Attestation service are being touted as promising alternatives to traditional kernel access for cybersecurity tools.

However, some SecOps experts remain skeptical about the effectiveness of transitioning away from kernel access in newer products. They argue that implementing such changes could be challenging and may not necessarily prevent future outages. Additionally, concerns have been raised about the compatibility of these new approaches with existing Microsoft products and services.

The fallout from the CrowdStrike incident has also shed light on the organizational dynamics between IT security teams and operations teams. The imbalance of power between these two groups, with security teams often dictating tool deployment without sufficient input from operations, has been cited as a contributing factor to the incident. Moving forward, it is crucial for operations teams to have a say in the selection and implementation of security tools to ensure smooth operations and minimize disruptions.

While some industry observers believe that the CrowdStrike outage was a result of technical oversight and bad luck, others emphasize the need for proper testing and evaluation of software updates to avoid similar incidents in the future. The incident has sparked a broader conversation about cybersecurity practices and the importance of collaboration between different teams within organizations.

In conclusion, the aftermath of the CrowdStrike outage has prompted Microsoft and other industry players to reevaluate their approach to kernel access and cybersecurity tools. While the debate continues on the best path forward, it is clear that a more holistic and collaborative approach is needed to ensure the stability and security of systems in an increasingly complex and interconnected digital landscape.

Source link

Latest articles

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...

Cybersecurity Professionals Feel Underappreciated

Growing Dissatisfaction Among Cybersecurity Professionals: A Call for Recognition and Support A recent report by...

More Fraudulent Extensions Associated with GlassWorm Discovered in Open VSX Code Marketplace

Security Risks of IDE Extensions: A Growing Concern for Developers In the evolving landscape of...

AI Governance Transitions from Theory to Practice

CIOs Navigate Growing Demands on Risk, Data, and Board Reporting in AI Governance In recent...

More like this

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...

Cybersecurity Professionals Feel Underappreciated

Growing Dissatisfaction Among Cybersecurity Professionals: A Call for Recognition and Support A recent report by...

More Fraudulent Extensions Associated with GlassWorm Discovered in Open VSX Code Marketplace

Security Risks of IDE Extensions: A Growing Concern for Developers In the evolving landscape of...