{"id":42652,"date":"2021-12-08T11:45:43","date_gmt":"2021-12-08T11:45:43","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=c8400233269d3a147f2a83875f546e0f"},"modified":"2021-12-08T11:45:43","modified_gmt":"2021-12-08T11:45:43","slug":"microsoft-launches-secured-core-servers-to-combat-ransomware","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/microsoft-launches-secured-core-servers-to-combat-ransomware\/","title":{"rendered":"Microsoft launches Secured-core servers to combat ransomware"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/connor-jones\">Connor Jones<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">8 Dec, 2021<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>Microsoft has expanded its Secured-core PC initiative to its server products in a bid to combat ransomware attacks on infrastructure.<\/p>\n<p>Secured-core will now be expanded to reach Windows Server, Microsoft Azure Stack <span class=\"scayt-misspell-word\" data-scayt-word=\"HCI\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn8oiynhisto0c\">HCI<\/span>, and Azure-certified <a href=\"https:\/\/www.itpro.co.uk\/cloud-computing\/28037\/what-is-iot\" data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/cloud-computing\/28037\/what-is-iot\">IoT<\/a> devices.<\/p>\n<p><!--wysiwyg_see-related_plugin--><\/p>\n<p>\nBusinesses can search for Secured-core servers in the Azure Stack <span class=\"scayt-misspell-word\" data-scayt-word=\"HCI\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn8rgltlmxkh2y\">HCI<\/span> and Windows Server online catalogues. There are currently four all-<span class=\"scayt-misspell-word\" data-scayt-word=\"HPE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn8ud44h4ohgri\">HPE<\/span> products that run Azure Stack <span class=\"scayt-misspell-word\" data-scayt-word=\"HCI\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn8udpvrkyel30\">HCI<\/span> and 42 options from a variety of vendors that meet the Windows Server spec.<\/p>\n<p>All servers come \u201cfully equipped with industry-leading security mitigations built into the hardware, firmware, and the operating system to help thwart some of the most advanced attack vectors,\u201d Microsoft said.<\/p>\n<p>Secured-core servers are built around three distinct security pillars:<\/p>\n<ol>\n<li>To protect the server infrastructure with a hardware-based root of trust<\/li>\n<li>To defend sensitive workloads against firmware-level attacks<\/li>\n<li>To prevent access and the execution of unverified code on the systems<\/li>\n<\/ol>\n<p>\u201cPartnering with leading original equipment manufacturers (OEMs) and silicon vendors, Secured-core servers use industry-standard hardware-based root of trust coupled with security capabilities built into today\u2019s modern central processing units (CPUs),\u201d said Microsoft in a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/07\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/\" data-cke-saved-href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/07\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/\">blog post<\/a>.\u00a0<\/p>\n<p>\u201cSecured-core servers use the Trusted Platform Module 2.0 and Secure boot to ensure that only trusted components load in the boot path.\u201d<\/p>\n<p>It\u2019s thought the new hardware will help tackle specific parts of ransomware attacks and help detect intrusions earlier, with the hope that attacks can be mitigated before any real damage is done.<\/p>\n<p>Microsoft used a typical <span class=\"scayt-misspell-word\" data-scayt-word=\"REvil\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn92ocht9avitp\">REvil<\/span> ransomware kill chain as an example. <span class=\"scayt-misspell-word\" data-scayt-word=\"REvil\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn95jw108411n4\">REvil<\/span> was one of the most prolific ransomware gangs of 2021 before it <a href=\"https:\/\/www.itpro.co.uk\/security\/ransomware\/361480\/three-revil-ransomware-gang-members-arrested-following-international\" data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/ransomware\/361480\/three-revil-ransomware-gang-members-arrested-following-international\">shuttered following a string of arrests of alleged REvil associates<\/a>.\u00a0<\/p>\n<p>Using the kill chain used by <span class=\"scayt-misspell-word\" data-scayt-word=\"REvil\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn98jpq7m8f5c9\">REvil<\/span> on <a href=\"https:\/\/www.itpro.co.uk\/security\/ransomware\/360122\/up-to-1500-organizations-compromised-in-kaseya-ransomware-attack\" data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/ransomware\/360122\/up-to-1500-organizations-compromised-in-kaseya-ransomware-attack\">Kaseya<\/a> earlier this year, Microsoft explained that certain features in Secured-core servers like <span class=\"scayt-misspell-word\" data-scayt-word=\"Hypervisor\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn98jbw7k4g8al\">Hypervisor<\/span>-protected Code Integrity (<span class=\"scayt-misspell-word\" data-scayt-word=\"HVCI\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn98i6t7u3m7et\">HVCI<\/span>) can block drivers that tamper with the kernel, like with <span class=\"scayt-misspell-word\" data-scayt-word=\"Mimikatz\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwxgn98hlij4s6cv5\">Mimikatz<\/span>, via a code integrity security policy.<\/p>\n<p>By preventing credential theft, an early stage of the <a href=\"https:\/\/www.itpro.co.uk\/security\/ransomware\/361250\/how-not-to-get-hit-by-ransomware-in-2022\" data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/ransomware\/361250\/how-not-to-get-hit-by-ransomware-in-2022\">ransomware<\/a> kill chain, Microsoft said Secured-core server can make it very difficult for attackers to move laterally around a potential victim\u2019s network.<\/p>\n<p>\u201cContinuing to raise the security bar for critical infrastructure against attackers makes it easier for organisations to meet that higher bar, which is an important priority for both customers and Microsoft,\u201d said Microsoft.\u00a0<\/p>\n<p>\u201cSuccessfully protecting systems requires a holistic approach that builds security from the chip to the cloud across hardware, firmware, and the operating system.\u201d<\/p>\n<p>Microsoft <a href=\"https:\/\/www.itpro.co.uk\/security\/34673\/microsoft-partners-with-device-and-chip-makers-on-secured-core-pcs\" data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/34673\/microsoft-partners-with-device-and-chip-makers-on-secured-core-pcs\">debuted the Secured-core initiative in 2019<\/a> on Windows PCs which saw computers ship with enhanced security measures at the hardware level.\u00a0<\/p>\n<p>The machines were designed for business use, with the financial services and healthcare industries targeted specifically, as well as anyone working in a high-value-data role such as in government.\u00a0 <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Connor Jones<\/p>\n<p>        8 Dec, 2021    <\/p>\n<p>      Microsoft has expanded its Secured-core PC initiative to its server products in a bid to combat ransomware attacks on infrastructure.<br \/>\nSecured-core will now be expanded to reach Windows Server, Mi&#8230;<\/p>\n","protected":false},"author":507,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-42652","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/507"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=42652"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42652\/revisions"}],"predecessor-version":[{"id":42653,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42652\/revisions\/42653"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=42652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=42652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=42652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}