Zero trust, Threat Management

When zero trust principles fail: Microsoft’s Alex Weinert on what actually went wrong

Share

Why is it so difficult for organizations to implement zero-trust practices? As demonstrated by the SolarWinds attack, as well as many other breaches since, security leaders often overlook windows into an organization that can be leveraged for an attack.

As Microsoft’s director of identity security, Alex Weinert had a front-row seat into the investigation and aftermath of the attack, which he called the most sophisticated he or anyone on his team had ever seen up to that point during an interview with SC Media’s Deputy Editor Bradley Barth.

The principles of zero trust are sound, he said, but chief information security officers do not necessarily define the scope properly. SolarWinds was one of numerous attacks that infiltrated the supply chain, providing that a zero trust model must go well beyond the confines of an enterprise network.

Click here to access the SC eSummit, "Are you ready for zero trust?" on demand.

“Your vendor is fair game. Your service accounts are fair game. Your legacy applications that you've been running forever are fair game. The contractors that you hire are fair game. All of these things were used as vectors into organizations,” Weinert said. 

The lessons? he suggests verification models for vendors and contractors to ensure their products and services are trustworthy.

“We don't want the verification to simply not happen, which is what was happening here,” he said.

Stephen Weigand

Stephen Weigand is managing editor and production manager for SC Media. He has worked for news media in Washington, D.C., covering military and defense issues, as well as federal IT. He is based in the Seattle area.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.