Responding In Kind

Wednesday, 5 February 2003, 12:50 PM EST

The Code Red and Nimda worms revealed severe problems in Microsoft's security alerting system. Despite the availability of patches weeks before either worm hit the Internet, few users--particularly enterprises--deployed them.

The problem was twofold: Some users found Microsoft's advisories difficult to understand or didn't receive them at all; others had a difficult time obtaining and verifying the patch. The situation prompted a complete revamping of the Microsoft Security Response Center (MSRC), the gateway for vulnerability reports and security fixes.

"We always took security seriously and were committed to it, but much more of the company takes it much more seriously in the aftermath of Code Red and Nimda," says Steve Lipner, director of security assurance, who oversees the MSRC. "We know it's important to get it all right and get it out to our customers, and everyone knows what can happen if we don't get it out."

All vulnerability reports filed with MSRC are put through a sophisticated triage and tracking process. The vulnerability report is sent to the appropriate development team, which is responsible for replicating the problem and developing a fix for it. At the same time, an independent engineering team does an evaluation to verify the problem and potential remedies.

Once a patch is created, it goes through a vetting process to ensure it works as intended.

[ Read more ]


Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco ASA products - appliances, firewalls, switches, routers, and security modules - have been found sporting a flaw that can ultimately lead to remote code execution by attackers.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Feb 12th