September 15th, 2024

CrowdStrike outage leads Microsoft plan security capabilities outside of kernel

Microsoft aims to improve security outside the Windows kernel after a CrowdStrike update outage affecting 8.5 million devices, emphasizing collaboration, Safe Deployment Practices, and robust incident response plans.

Read original articleLink Icon
CrowdStrike outage leads Microsoft plan security capabilities outside of kernel

In response to a significant outage caused by a CrowdStrike software update that affected approximately 8.5 million Windows devices, Microsoft is planning to enhance security capabilities that operate outside of the Windows kernel. The outage, which resulted in a blue screen of death (BSOD) for many organizations, prompted Microsoft to convene a Windows Endpoint Security Ecosystem Summit. Attendees, including various endpoint security vendors and government officials, discussed strategies to improve resilience in the endpoint security ecosystem and prevent similar incidents in the future. A key focus was on enabling security solutions to function outside of kernel mode, which could mitigate the risk of widespread failures due to faulty updates. Microsoft has indicated a shift towards reducing reliance on kernel access, although concerns have been raised about potential anticompetitive advantages if kernel access is restricted for other vendors. The summit also emphasized the importance of collaboration among security vendors and the implementation of Safe Deployment Practices to enhance incident response and software testing. Microsoft provided recommendations for organizations to prepare for major incidents, including robust business continuity and incident response plans.

- Microsoft plans to enhance security capabilities outside of the Windows kernel following a CrowdStrike outage.

- The outage affected 8.5 million devices, prompting discussions on improving endpoint security resilience.

- Concerns exist regarding potential anticompetitive advantages if Microsoft restricts kernel access for other vendors.

- Collaboration among security vendors and Safe Deployment Practices were emphasized at the summit.

- Organizations are advised to have robust business continuity and incident response plans in place.

Link Icon 0 comments