[Infowarrior] - MS offers Secure Windows … But Only to the Government
Richard Forno
rforno at infowarrior.org
Sat May 2 02:28:55 UTC 2009
Microsoft Offers Secure Windows … But Only to the Government
* By Kim Zetter Email Author
* April 30, 2009 |
* 11:50 pm |
* Categories: Cybersecurity
http://www.wired.com/threatlevel/2009/04/air-force-windows/
It’s the most secure distribution version of Windows XP ever produced
by Microsoft: More than 600 settings are locked down tight, and
critical security patches can be installed in an average of 72 hours
instead of 57 days. The only problem is, you have to join the Air
Force to get it.
The Air Force persuaded Microsoft CEO Steve Ballmer to provide it with
a secure Windows configuration that saved the service about $100
million in contract costs and countless hours of maintenance. At a
congressional hearing this week on cybersecurity, Alan Paller,
research director of the Sans Institute, shared the story as a
template for how the government could use its massive purchasing power
to get companies to produce more secure products. And those could
eventually be available to the rest of us.
Security experts have been arguing for this “trickle-down” model for
years. But rather than wield its buying power for the greater good,
the government has long wimped out and taken whatever vendors served
them. If the Air Force case is a good judge, however, things might be
changing.
Threat Level spoke with former CIO of the Air Force, John Gilligan, to
get the details.
Gilligan, who served as CIO of the Air Force from 2001 to 2005 and now
runs a consulting firm, said it all began in 2003 after the NSA
conducted penetration tests on the Air Force network as part of its
regular testing of Pentagon cybersecurity.
NSA pen-testers made Swiss cheese of the network, and found that more
than two-thirds of their intrusions were possible because of poorly
configured software that created vulnerabilities. In some cases, the
culprit was an operating system or application that came bloated with
unsecured features that were never re-configured securely by Air Force
administrators. In other cases, systems that were configured securely
became vulnerable later (for instance, when a system crashed and
original software was re-installed without patches that had been on
the system before the crash).
“It was really an easy target,” Gilligan says. “All the NSA had to do
was scan the network.”
The Air Force, on the verge of renegotiating its desktop-software
contract with Microsoft, met with Ballmer and asked the company to
deliver a secure configuration of Windows XP out of the box. That way,
Air Force administrators wouldn’t have to spend time re-configuring,
and the department would have uniform software across the board,
making it easier to control and maintain patches.
Surprisingly, Microsoft quickly agreed to the plan, and Ballmer got
personally involved in the project.
“He has half-a-dozen clients that he personally gets involved with,
and he saw that this just made a lot of sense,” Gilligan said. “They
had already done preliminary work themselves trying to identify what
would be a more secure configuration. So we fine-tuned and added to
that.”
The NSA got together with the National Institute of Standards and
Technology, the Defense Information Systems Agency and the Center for
Internet Security to decide what to lock down in the Air Force special
edition.
Many of the changes were complex and technical, but Gilligan says one
of the most important and simplest was an obvious fix to how Windows
XP handled passwords. The Air Force insisted the system be configured
so administrative passwords were unique, and different from general
user passwords, preventing an average user from obtaining
administrative privileges. Specifications were added to increase the
length and complexity of passwords and expire them every 60 days.
It then took two years for the Air Force to catalog and test all the
software applications on its networks against the new configuration to
uncover conflicts. In some cases, where internally designed software
interacted with Windows XP in an insecure way, they had to change the
in-house software.
“We started to put discipline into what people were fielding in the
way of applications,” Gilligan said. “It required a lot of senior-
level attention because this was not something that the IT guys were
happy about. We were taking control from them and forcing them to make
modifications in systems. But the benefits were huge because now the
Air Force knows what is fielded; they know all the applications that
run against a certain configuration.”
In addition to the secure configuration, they also got Microsoft to
install automated tools to update patches and to detect and prevent
someone from altering the configuration.
Having a single configuration across the network greatly reduced the
time it took to patch systems. Gilligan said it used to take the Air
Force well over 100 days to install patches after new vulnerabilities
were discovered, because the military’s network administrators had to
test the patches against multiple configurations. Emergency patches
that needed to be installed post-haste took 57 days to install,
leaving systems vulnerable to intruders during that time.
“Once the flaw was known, then those who wanted to attack our systems
could be developing attacks in that time,” Gilligan said.
gilligan_jm
Former Air Force CIO John Gilligan
But with a single configuration, all that testing is now done by
Microsoft before it releases a patch, saving the Air Force time. An
added benefit of the new configuration was a 40 percent drop in the
number of calls to Air Force help desks.
“Turns out when you configure things properly and don’t touch them,
they actually work pretty well,” Gilligan said.
The Air Force began the project in 2005 and finished installing the
new configuration on systems in 2007. In contracts with hardware
providers it demanded that vendors pre-load the special Windows XP
configuration onto systems before delivering them to the Air Force.
The USAF saved $100 million on a five-year license agreement with
Microsoft by consolidating more than 30 contracts — made possible by
the fact that it was now able to buy a single standard configuration.
Most importantly, security of the system improved. Gilligan said 85
percent of attacks were blocked after the configuration was installed.
“Once you get the standard configuration, then it becomes a much
harder target to attack,” Gilligan said. “I will not say that the Air
Force cannot be penetrated, but the incidents have decreased. The hope
is that those who are defending the networks can focus their energies
on a smaller set of vulnerabilities and more sophisticated attacks. It
dampens out the low-hanging fruit and the easy attacks.”
The project was so successful that it became the foundation for the
government’s Federal Desktop Core Configuration program, which was
mandated last year by the White House’s Office of Management and
Budget to improve the security of government systems across the board.
Gilligan said other departments have started with the Air Force
configuration and modified it slightly to fit their unique needs and
applications.
He said the next step is to expand the project to other software
products, such as database management systems. He added that he’s
confident the Microsoft example marks the turning of the tide against
vendors that arrogantly resist locking down their products.
“They’re still in the model that they want to give all the features
enabled to clients,” he said. “But I think we’ve reached a point where
that model is one that is no longer effective. I’m of the opinion that
all products ought to be configured with these locked-down
configurations, and if the customer decides they want to undo them,
then they can do that. They cannot continue fielding products where
the cost that is being borne by the consumer in terms of having to
maintain configurations and deal with attacks is so high.”
What this means for the rest of us is unclear. Threat Level contacted
Microsoft to find out if any part of the locked down Windows XP
configuration got into general consumer versions of the software or
has influenced how it configures future versions of its software. The
company did not respond.
Top image: Brigadier General Gary T. Magonigle and Colonel Brian
Dravis present Steve Ballmer with a plaque showing the Air Guard’s
appreciation for Microsoft’s support of Guards and Reservists. (United
States Air Force photo by Tech. Sgt. Douglas Olsen)
More information about the Infowarrior
mailing list