




已阅读5页,还剩21页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Microsoft Security Strategy,站长站素材 SC.chinaz.COM,Session Agenda,Focus on Customer Challenges Microsoft Security Strategy Secure Windows Initiative Strategic Technology Protection Program Trustworthy Computing Building the secure platform .NET Framework Windows .NET Summary Questions,Technology, Process, People What are the challenges?,Products lack security features Products have bugs Insufficient technical standards Difficult to stay up-to-date,Design for security Roles & responsibilities Vigilance Business continuity plans Stay up-to-date with security development,Problem recognition Skills shortage Human error,Microsoft Security Strategy,Secure Windows Initiative “Engineering For Security”,Goal: Eliminate Every Security Vulnerability Before The Product Ships,People,Process,Technology,Industry Yardstick,Source: Security Focus /vulns/stats.shtml,Secure Windows Initiative,People,Train, and keep current, every developer, tester, and program manager in the specific techniques of building secure products,Process,Make security a critical factor in design, coding and testing of every product Microsoft builds Cross-group design & code reviews Security Threat Analysis part of every design spec Red Team testing and code reviews Focus not confined to buffer overruns Security bug feedback loop & code sign-off requirements External reviews and testing by consultants and public,Technology,Build tools to automate everything possible in the quest to code the most secure products Prefix and Prefast for buffer overrun detection Updated as new vulnerabilities found Visual C+ 7.0 compiler improvements Domain-specific tools (i.e. RPC security stress),Secure Windows Initiative External Security Review,FIPS 140-1 evaluation of Cryptographic Service Provider (CSP) Completed Government validation of base crypto algorithms in Windows Common Criteria evaluation In Preparation Evaluation of Windows source code against International security criteria for evaluating Third party expert review of key components Source code licensed to over 80 universities, labs, and government agencies,Goal: Help customers secure their Windows Systems,People,Process,Technology,Strategic Technology Protection Program,Strategic Technology Protection Program - Customers Need Our Help,I didnt know which patches I needed I didnt know where to find the updates I didnt know which machines to update We updated our production servers, but the rogue servers got infected,More than 50% of the customers affected by Code Red were not patched in time for Nimda,STPP: “Get Secure”,Coming - Enterprise Security Tools Microsoft Baseline Security Analyzer SMS security patch rollout tool Windows Update Auto-update client,Now - Microsoft Security Toolkit Server oriented security resources. New server security tools and updates, Windows Update bootstrap client for Windows 2000,Now - Security Assessment Program Offering Available immediately through MCS/PSS,Now - Free Virus Support Hotline Contact your local PSS office,Get Secure Microsoft Security Toolkit,Gets Windows NT and 2000 systems to secure baseline, even disconnected net Automates server updates One-button wizard and SMS Scripts Updates and Patches Includes all Service Packs and critical OS and IIS patches through 10/15 HFNetchk: patch level verifier IIS Lockdown & URLScan,STPP: “Stay Secure”,Ongoing - Enhanced Product Security Provide greater security enhancements in the releases of all new products, including the Windows .NET Server family,Spring 2002 - Federated Corporate Windows Update Program Allows enterprise to host and select Windows Update content,Spring 2002 - Windows 2000 Service Pack (SP3) Provide ability to install SP3 + security rollup with a single reboot,Jan. 2002 - Windows 2000 Security Rollup Patches Bundle all security fixes in single patches Reduces reboots and administrator burden,Corporate Update Server Solution,Automatic Update (AU) client Automatically download and install critical updates Security patches, high impact bug fixes and new drivers when no driver is installed for a device Checks Windows Update service or Corporate Update server once a day New! Install at schedule time after automatic downloads Administrator control of configuration via registry-based policy Support for Windows .NET Server, Windows XP and Windows 2000 Update server Corporate hosted WU server to support download and install of critical updates through AU client Server synchronizes with the public Windows Update service Simple administrative model via IE Updates are not made available to clients until the administrator approves them Runs on Windows .NET Server and Windows 2000 Server,Trustworthy Computing,Goal: Make devices powered by computers and software as trustworthy as devices powered by electricity.,A Trust Taxonomy,Availability At advertised levels Suitability Features fit function Integrity Against data loss or alteration Privacy Access authorized by end-user Reputation System and provider brand,Security Resists unauthorized access Quality Performance criteria Dev Practices Methods, philosophy Operations Guidelines and benchmarks Business Practices Business model Policies Laws, regulations, standards, norms,Intent Management assertions Risks What undermines intent, causes liability Implementation Steps to deliver intent Evidence Audit mechanisms,Goals,Means,Execution,Building the secure platform,Goal: Provide IT with a secure, integrated foundation for managing how users, business, and technologies connect.,Infrastructure (PKI, Directory),Security in depth,Network (IPSec, Wireless, VPN),Device (PDA, Laptops, PCs, Servers),Application,Management,Front End,Typical Application Architecture,Users,Back End,Authentication,Network Access,Authorization,Audit,Alerts,Front End,Secure Network Access,Users,Back End,Authorization,Authentication,Network Access,Firewall VPN Wireless IPSEC,Audit,Alerts,Front End,Flexible Authentication,Users,Back End,Basic HTTP Digest Kerberos Certificates Smartcards,Authentication,Network Access,Authorization,Audit,Alerts,Front End,Rich Access Controls,Users,Back End,Authentication,Network Access,Authorization,Audit,Alerts,Access Control Lists Roles,Front End,System Wide
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025版型钢结构瓦工施工总承包合同
- 2025版沙盘模型制作技术培训及转让合同
- 2025版新能源汽车充电站运营维护专业服务合同
- 2025版外卖配送服务合同技术升级范本
- 2025场环保产业调研与可持续发展服务协议
- 2025代收代缴水电费及环保监测服务合同
- 2025年商铺认筹与商业综合体合作框架协议
- 2025年度幼儿园食堂安全卫生管理服务协议
- 2025年度绿色建筑劳务分包合同示范文本大全
- 2025版智慧桥梁建设劳务分包合同模板
- 期权开户考试题及答案
- 建筑工程装饰预算课件
- 《民营经济促进法》解读与案例分析课件
- 山地绿化工程的安全防范措施
- 监理挂靠合同协议书
- 2025年广西南宁宾阳县昆仑投资集团有限公司招聘笔试参考题库含答案解析
- 2025-2030中国公路养护行业市场深度调研及前景趋势与投资研究报告
- 《数据采集与分析》课件
- 国家生物安全法课件
- 老年人生命教育
- 租车合同免责协议模板
评论
0/150
提交评论