So @orcasec found a vulnerability in @azure and reported it to Microsoft back in January. @Azure's response was to go out and buy a booth for @RSAConference, then get back to Orca six short weeks later.
A speedy month and a half later, Azure releases a patch.
I AM NOT DONE.
Orca was able to BYPASS THE PATCH. @Azure security swung into action and expanded the size of their #RSAC booth, while paying @orcasec a $60K bug bounty. (This remains the only thing Azure got right in this entire debacle.)
Orca reached out to @Azure with an "oh, by the way, the security certificate we exfiltrated and reported to you have not been revoked."
Azure's security team met with Orca a few days later, presumably to ask @orcasec which flavor of crayon was the most delicious.
After that, @Azure finally understood what @orcasec was saying, and deployed a second patch.
Three days later ORCA BYPASSED THE NEW PATCH.
@Azure installed a 60 foot banner above their #rsac booth, and deployed a third patch. This one seems to have worked?
This is not a story about an @Azure security failure. This is a story about a complete lack of security culture apparent anywhere in this story.
I would dearly love @Azure to expound upon this. Tell me, how does "an attacker has access to and can run code within customer environments" not catapult "minimizing customer disruption" into the next county?!
Engineering mistakes happen, and I’m not one to shame people for making them. But this lack of responsiveness to reports of serious security issues is just wild to me.
I’ve seen their larger competitor patch issues far less severe within two days globally.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Gartner's Magic Quadrant for Application Performance Monitoring and Observability is out, and it's time for a readalong thread, in the style you've come to expect from the @LastWeekinAWS newsletter / "brand."
First, my scores. Like golf, lower is better because the numbers are "how many mandatory fields to download the report."
Here we have the actual quadrant, which makes @solarwinds and their decision to rebrand as an observability company uh... questionable, at best. Lots to unpack here.
Having spent an hour or so walking the floor of @RSAConference, it's rather clear that #RSAC's not about security learning, but rather about selling security in a box. As @mattstratton famously said in a talk once, "you can't buy DevOps but I sure would like to sell it to you."
Here @SentinelOne teaches us that the tree of security must be refreshed from time to time with the logo of @hashicorp. #RSAC
Here we see that Angry Twitter is making its presence known at #RSAC.
If you're speaking at or attending a three day conference, and the single not-dude on the agenda is giving a talk on "Why 10% of Women in the Conference Program Does Not Mean Gender Quotas," perhaps consider whether you really want to be involved at all with TrashGoblinCon.
...of course ESR is keynoting. Why wouldn't he be?
By my count, of 38 speakers named: 1 woman, 37 dudes.
I thought these Linux bros were supposed to be good at math or something?