Monday, March 17, 2014

Windows XP can put SOX, HIPAA, credit card security-compliance at risk

There are ways around it, but upgrading may be simpler, cheaper

When Microsoft stops supporting Windows XP next month businesses that have to comply with payment card industry (PCI) data security standards as well as health care and financial standards may find themselves out of compliance unless they call in some creative fixes, experts say.

Strictly interpreted, the PCI Security Standards Council requires that all software have the latest vendor-supplied security patches installed, so when Microsoft stops issuing security patches April 8, businesses processing credit cards on machines using XP should fall out of PCI compliance, says Dan Collins, president of 360advanced, which performs security audits for businesses.

But that black and white interpretation is tempered by provisions that allow for compensating controls – supplementary procedures and technology that helps make up for whatever vulnerabilities an unsupported operating system introduces, he says.

These can include monthly or quarterly reviews of overall security, use of software to monitor file integrity and rebooting each XP machine every day in order to restore it to a known safe state, says Mark Akins, CEO of 1st Secure IT, which also performs compliance audits. That safe state can be reset using a Microsoft tool called SteadyState that was built for XP but not later versions of Windows.

“Risk is the factor,” he says, and mitigating it is the goal, but the mitigations must reduce risk just as effectively as the original regulatory requirement that is not being met. To some extent that is a subjective call, and depending on the auditor businesses may have more or less flexibility in what compensating controls are deemed OK, says Akins.

Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX) financial regulations have provisions similar to those in the PCI standard, says Collins. In fact, PCI provisions are pretty much the baseline for the other two, which have some additional requirements tacked on, he says. So the issue goes well beyond businesses that handle credit cards.

These workarounds may sound good to businesses that haven’t upgraded to Windows 7 or 8/8.1 yet, Akins says, but it’s not likely to save any time, effort or money. “For IT it’s easier to upgrade to Windows 7 or 8 versus implementing file integrity monitoring and installing SteadyState,” he says.

Compensating controls can place a big load on IT departments because, for example, updating anti-virus software daily or constantly monitoring for file integrity or for evidence of intrusions, Collins says, isn’t simple. “It’s an arduous task,” he says.

“Compensating controls should be as short-term as possible,” and used only in order to keep key business applications running. Some legacy or proprietary business-critical software runs best or only runs on Windows XP, he says, and there are no feasible alternatives yet. “It’s a major issue if the software deployed is unstable on newer versions of Windows.”

That situation leaves a choice. The first option is to migrate from Windows XP or implement compensating controls. The second is buying replacement apps or rewriting old ones so they perform well on Windows 7 or 8/8.1. Another option businesses have is to pay Microsoft for extending XP support – also costly, but something that can buy time until a better solution is in place.

Some merchants that should comply with PCI could fly under the radar for a while without doing anything to address Windows XP non-compliance, he says. While it’s not advisable, they are not compelled to have security audits unless a merchant bank or credit processing service provider requires it – and that doesn’t happen all the time, Collins says.

PCI doesn’t require all businesses to meet the updated operating system requirement. If credit card data is collected by a business, encrypted using keys that are not in control of that business and passed off to a separate entity for processing and storage, the collecting business doesn’t have to comply with the requirement to a fully patched and supported operating system, Akins says.

Still, the best option is to upgrade, Collins says. “It’s difficult to envision a case where the cost of upgrading is greater than the cost of compensating controls,” he says.


Monday, March 10, 2014

Android malware detection boosted by university research

Researchers from North Carolina State University have found a way to monitor for Android malware with very low overhead


With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices.

The tool they have developed, called Practical Root Exploit Containment (PREC), is trained to uncover aberrant code written in the C programming language, the language in which they say most malicious Android code is written.

PREC looks for root exploits, in which a program gains system administration access rights to the entire device, which a malicious hacker can use with ill intent.

The researchers detailed their work, captured in the paper "PREC: Practical Root Exploit Containment for Android Devices," at the Association for Computing Machinery's Conference on Data and Application Security and Privacy, which was held this week in San Antonio, Texas.

PREC uses a well-known technique for identifying malicious code, called anomaly detection. Anomaly detection compares the expected behavior of an application with how it actually behaves when it is running on a device, in terms of the system calls it makes.

PREC is unique in that it can identify calls made to native C code from a Java program, and check to see if such actions fit into the application's profile for typical usage. The bulk of software programs for Android are written in Java, which other experimental anomaly detectors have focused on.

"We've observed that most all of the existing exploits are coming from C code," said Helen Gu, an associate professor of computer science at NCSU who was involved in the work. "It's hard, if not impossible, to launch exploits in Java code, because it has to go through the virtual machine."

With this approach, PREC has been able to reduce the number of false identifications by an order of magnitude, compared to other anomaly detectors. Focusing on native C code gives PREC a more accurate model of how attacks would differ from standard operations.

The researchers tested a prototype against 150 Android apps, of which 140 were benign and 10 contained root exploits. The experiments were run on a Google Galaxy Nexus and on an emulator. PREC was able to identify all of the root exploits with a minimum number of false alarms.

What the researchers hope to do is convince app stores, such as the Google Play Store, to create a database describing the typical performance characteristics of all their apps. They could use PREC to build these assessments. Then when a user downloads a new app, the Android device can also download the PREC execution profile for that application, and use that profile to monitor for any unusual activity coming from the app.

While app marketplace operators such as Apple or Google already screen the apps submitted to their stores, malware programmers have learned how to bury their code within an app so it doesn't execute until after the program has been downloaded, Gu said.

The researchers chose Android over Apple's iOS because the Android kernel, which is Linux, is open source, whereas Apple keeps the kernel for iOS under wraps. They built PREC as a module that can be compiled into the kernel.

PREC is not the only Android malware detector based on anomaly detection that researchers have created. Crowdroid uses a crowd-sourcing model of determining routine app behavior, and Paranoid Android offloads some of the detection duties to servers.

Both of those detectors require far more processing power on the portable device, compare to PREC, according to the NCSU researchers. Running PREC typically incurs about 3 percent overhead on the system, compared to the 15 to 30 percent overhead incurred by Crowdroid and Android.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, March 3, 2014

Another executive shakeup at Microsoft

Rumor: Biz development head Bates, marketing chief Reller call it quits

Just a month after Satya Nadella took over as Microsoft CEO the executive inner circle is being overhauled, with two key leaders leaving the company and a third assuming significant new power.

Executive vice presidents Tony Bates, the former CEO of Skype, and Tami Reller, who cut her teeth on Windows, are leaving the company, according to a post by Kara Swisher on re/code.

Bates had reportedly been a top contender for CEO and was serving as head of business development and evangelism. Reller was head of marketing.

Bates' job will be filled temporarily by Executive Vice President Eric Rudder, who is in charge of advanced strategy, according to the report.

Reller’s job is being expanded and filled by Chris Capossa, a Microsoft marketing executive who will now be executive vice president of both marketing and advertising, the report says.

Both Bates and Reller were in ambiguous jobs under a reorganization put in place last year by outgoing CEO Steve Ballmer.

Reller was named executive vice president of marketing under that new management scheme, but Reller essentially had to share the job with Mark Penn, another executive vice president, who “will take a broad view of marketing strategy and will lead with Tami the newly centralized advertising and media functions.”

Similarly, Bates had uncertain duties and power in dealing with manufacturing partners. Under the Ballmer reorganization, “OEM will remain in [the sales marketing and services group] with Kevin Turner with a dotted line to Tony who will work closely with Nick Parker on key OEM relationships.” At best he had fragmented authority.

Bates came onboard at Microsoft when the company bought Skype for $8.5 billion in 2011. Reller was brought into Microsoft when it bought Great Plains Software in 2001. Earlier she was both the chief financial officer and the chief marketing officer for Microsoft’s Windows division, which was moved into the operating systems division under Ballmer’s reorganization. She assumed her role as executive vice president when Ballmer reorganized.

News of this latest shakeup comes just a week after Nadella cleared room at the top for Stephen Elop, the former CEO of Nokia who is joining the company as an executive vice president in charge of devices and studios when Microsoft’s purchase of Nokia is finalized.

That means the current occupant of the slot, Julie Larson-Green, will move over and down to the newly created position of chief experience officer (CXO) in which she will report to another executive vice president Qi Lu, who is in charge of applications (Office, SharePoint, Yammer, Lync, Skype) and services (Bing and MSN).

According to an email Larson-Green sent to her staff and published by Mary Jo Foley in her All About Microsoft blog Elop is scheduled to step into his new role immediately once Microsoft’s purchase of Nokia’s phone business is complete. Meanwhile, Larson-Green will continue her current role.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com