Microsoft makes cloud security logs available for free • The Register

Microsoft announced on Wednesday it would provide all customers free access to cloud security logs – a service usually reserved for premium clients – within weeks of a reveal that government officials’ cloud-based emails were targets of an alleged China-based hack.

Microsoft wrote on its blog it was expanding the service’s access beginning in September 2023 to “increase the secure-by-default baseline” of its cloud platforms “in response to the increasing frequency and evolution of nation-state cyber threats.”

Subscribers to the standard version of Microsoft Purview Audit will also have their default retention period extended from 90 to 180 days.

The cloud Goliath theorized that, while logs don’t prevent attacks, they are useful in digital forensics and incident responding. They provide insight into legitimate versus abnormal user behavior.

The move is the result of close coordination with commercial and government customers, as well as the Cybersecurity and Infrastructure Security Agency (CISA), said Microsoft. It added that CISA called for more accountability from industry regarding cyber security.

CISA director Jen Easterly called the decision “a step in the right direction.”

In a blog post on the CISA website praising the decision, the org’s executive assistant director for cyber security Eric Goldstein cited the recent Microsoft Exchange Online breach.

According to Goldstein, the affected agency used logging data to detect the breach on Microsoft’s cloud-based email services and take action to limit the damage. He said charging for logging data was “a recipe for inadequate visibility into investigating cyber security incidents.”

The attack – which Microsoft has called espionage-focused and attributed to a China-based threat actor it tracks as Storm-O558 – was found by the Federal Civilian Executive Brach (FCEB) agency. Among the reported victims are US commerce secretary Gina Raimondo and other State and Commerce Department officials. The threat actors had access to accounts for around a month before being detected on June 16, 2023.

Redmond said it had determined the actor was forging Azure Active Directory (AD) tokens using an acquired Microsoft account (MSA) consumer signing key, which was made possible by a validation error in Microsoft code. The use of an incorrect key allowed Microsoft’s crack team of boffins to track all access requests from the threat actor.

On Friday, Microsoft admitted it still didn’t know how the hackers gained access to the signing key needed to access accounts, and said the investigation was “ongoing.”

It also revealed that it had seen Storm-0558 transition to other techniques – indicating the gang’s ability to use signing keys has been disrupted by cyber security measures. ®

#Microsoft #cloud #security #logs #free #Register