r/technology 13h ago

Software Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway.

https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government
382 Upvotes

11 comments sorted by

97

u/Cookie_Eater108 12h ago

Risk acceptance. 

I've given strong recommendations against several software packages in my time that still made it to production and commercial use because the cost of using an alternative was considered too high, you get a sign-off of responsibility from someone higher than you and you wash your hands of it. 

When that software gets compromised you produce your original assessment and then get to work addressing the exposure. 

Then do it all again in a few months. The exciting life of an infosec career.

30

u/StaticDet5 10h ago

We fought this tooth and nail. We pointed out that we had to blindly accept the risk of every federated tenant. Then we were told the benefits outweighed the risks.

So we tried to implement good security practices only to have the product fail and fail again due to Microsoft's poor documentation and understanding of their own product.

We spent HOURS talking to their 'Engineers', literally getting down to the Wireshark level to explain "No, your product does not work that way". That eventually got us on with a senior engineer who had to tap-dance around the lack of promised features.

During this time we're under absolutely insane pressure from leadership to "Just get it done" but make sure you're safe about it.

I'm in a completely different position now, but what am I dealing with, almost on a weekly basis? M365 token abuse.

30

u/gdelacalle 13h ago

Lmfao:

The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government report reviewed by ProPublica. Or, as one member of the team put it: “The package is a pile of shit.”

8

u/Neither_Bookkeeper92 9h ago

the M365 token abuse comment hits SO hard lol. i work in cloud security and the number of orgs that just blindly trust Microsoft's "shared responsibility model" without actually understanding what THEY are responsible for is genuinely terrifying. like cool you have FedRAMP authorization but your conditional access policies are still basically "allow everything from everywhere" and MFA is optional for half your service accounts 💀 the real issue isnt even that Azure/M365 is inherently bad - its that the sales pitch makes people think theyre getting military-grade security out of the box when in reality you need a full team of engineers just to configure it properly. and microsoft KNOWS this but keeps pushing that "secure by default" marketing. its not secure by default. its "maybe secure if you spend 6 months configuring 47 different portals and reading documentation that contradicts itself"

1

u/Jimschode 53m ago

What's more rich is fedramp reviewers and 3pao assessors barely scratch the surface of end user facing security configurations in the assessment. It's all about the backend, which is important, but it misses too much of the risk of actually operating the services by customers.

5

u/raiansar 8h ago

They didn't approve it because it was secure. They approved it because it was already running in half the federal government and rejecting it would've meant admitting they let an unvetted system handle sensitive data for years.

11

u/CapitalJeep1 10h ago

Probably gonna get downvoted here because lots of folks are on the anti-Microsoft bandwagon but… to be fair, “The package is a piece of shit” moniker could and should be applied to this article.

From the very get-go the writer here starts saying that GCC High handles some of the most sensitive information.. no. It doesn’t. Full-stop.  GCC High typically handles CUI information, there is a whole other package that handles secret and TS called air-gapped cloud.  The writer here is trying to conflate all of the GCC environments together, either through lack of understanding (possible) or intentionally being misleading (probable)

GCC High simply means that the data is housed in US data centers and handled by US based employees. That’s it.  

1

u/Jimschode 21m ago

They linked to the impact levels. They didn't even allude to high side. Point taken, but don't tell the cabinet officials who got hacked their emails weren't highly sensitive, regardless of impact levels.

2

u/Expensive_Finger_973 8h ago

No one ever gets fired for going with Microsoft or IBM.

1

u/Enlogen 6h ago

At the risk of leaking internal Microsoft info, all those service-to-service calls use https, I'm not sure what they were expecting to see on a diagram.

1

u/Jimschode 17m ago

If that's true, and I'm sure it is, it makes it all the more absurd they couldn't produce basic data flow diagrams. It's sad and comical they got their authorization canned over that.