Home Security ASD blows hot and cold over Microsoft Protected status
ASD blows hot and cold over Microsoft Protected status Featured

The Australian Signals Directorate appears to be blowing hot and cold over its reaction to the granting of Protected to status to Microsoft last week, for using some of its services to store and access government data.

Last week, as iTWire and other tech outlets reported, the ASD had issued a consumer guide containing a number of fiats about the services that Microsoft claimed to have received Protected status for on 3 April.

The company contested this, issuing a long statement to iTWire.

The ASD's reaction to a query from iTWire, asking why it had issued a consumer guide three days after Microsoft announced it had gained Protected status, was to only point out that issuing such a guide was not uncommon, leading to the conclusion that there was no concern over the granting of the Protected status to Microsoft.

In response to the query from iTWire, asking why the consumer guide had been issued — as no guide has been issued when the other four companies that have gained Protected status were certified — a Defence spokesperson did not directly answer the question, only pointing out that this was not the first time such a guide had been issued.

"This is not the first time ASD has produced Consumer Guides. ASD released a Consumer Guide for Apple iOS devices at Protected to aid secure configuration by government consumers," the spokesperson said.

"The ACSC works with providers to ensure guidance is provided to government agencies on how to consume the services in a more secure manner to meet business and risk objectives."

But in a comment to another news website, Defence stood by the fiats in the consumer guide issued by the ASD, "confirming more work is required on Microsoft’s side before Azure reaches an appropriate comfort level".

Adding to the confusion was a statement made by Alastair MacGibbon, national cyber security adviser and ASD deputy director-general to the InnovationAus website, saying he was "very, very satisfied" with the measures Microsoft had taken to mitigate risk and gain Protected status for some of its Azure Cloud and Office 365 services.

InnovationAus also reported that what appeared to be a "seemingly radical change in government cyber policy in relation to its cloud accreditation program has been a hotly discussed topic at the Australian Cyber Security Centre conference in Canberra" last week.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect