Microsoft Enhances Cybersecurity for U.S. Federal Agencies with Free Advanced Audit Logs
In a bold move to bolster national cybersecurity, Microsoft has widened the scope of protection, offering free logging capabilities to all U.S. federal agencies through Microsoft Purview Audit. No longer confined by the bounds of licensing tiers, this marks a significant escalation in cyber defense posture following revelations of China-linked cyber espionage activities.
Just over six months ago, alarm bells rang as a cyber espionage campaign orchestrated by a China-based nation-state activity group, known as Storm-0558, targeted and infiltrated approximately 25 entities across the U.S. and Europe. Now, with Microsoft’s expanded audit logs, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirms that federal agencies will see automatic log activation and an extension in the default log retention period: leaping from a mere 90 days to a robust 180 days. This development is critical for agencies striving to align with the mandated logging requirements of the Office of Management and Budget Memorandum M-21-31.
Storm-0558, demonstrating high degrees of technical tradecraft and operational security, was keenly aware of logging policies, a factor that ultimately played a role in their detection. These adversaries were responsible for appropriating at least 60,000 unclassified emails, predominantly from Outlook accounts held by State Department officials. A contribution to their success was a validation error in Microsoft’s source code, which allowed the crafting of forged Azure AD tokens.
In light of this breach, it is imperative to underline the importance of comprehensive logging in aiding forensic investigations. The new MailItemsAccessed mailbox-auditing action in Exchange Online, for instance, inspects sync and bind activities, enabling the detection of unauthorized access. It is a tool crucial in unraveling the threads of a data breach, as it distinguishes between lawful access by the mailbox owner and intrusions by attackers.
Microsoft, initially criticized for not granting advanced audit log access to entities outside of the E5 or G5 plans, has shifted gears with these recent changes. The company continues its endeavor to secure vital data flows within government agencies.
Meanwhile, the shadow of the Microsoft hack lingers, with reports that Chinese hackers pilfered tens of thousands of emails from U.S. State Department accounts. The breach has profoundly impacted U.S. relations with China, underscoring the heightened vigilance required in today’s digitally interconnected geopolitical landscape. Senator Eric Schmitt has expressed urgency in fortifying cybersecurity defenses and advocating for less reliance on single vendors within federal systems.
The response is proactive; the State Department is pursuing a transition to hybrid IT environments, incorporating multiple vendors. It vouches for bolstered system protection with the implementation of multi-factor authentication—a critical step in thwarting unwanted intrusions. In parallel, new protocols are in place to shield against hazardous materials impacting election mail handling. The cybersecurity landscape is changing rapidly, with resilience and adaptability at its core.
As the digital era continues to evolve, the measures that agencies, organizations, and individuals need to take to secure their data must remain equally dynamic. This recent enhancement of logging capabilities signifies a vital component in the multifaceted approach required to secure the nation’s cyber infrastructure.
If you enjoyed this article, please check out our other articles on CyberNow