Announcing preview of Azure Trusted Launch for virtual machines

%3CLINGO-SUB%20id%3D%22lingo-sub-2229729%22%20slang%3D%22en-US%22%3EAnnouncing%20preview%20of%20Azure%20Trusted%20Launch%20for%20virtual%20machines%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2229729%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EWritten%20by%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22Mark%20Russinovich's%20blog%20archive%22%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fauthor%2Fmarkruss%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMark%20Russinovich%3C%2FA%3E%2C%20Chief%20Technology%20Officer%20and%20Technical%20Fellow%2C%20Microsoft%20Azure%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPersistent%20threats%20like%20bootkits%20and%20rootkits%20are%20sophisticated%20malware%20types%20that%20run%20with%20the%20same%20kernel-mode%20privileges%20as%20the%20operating%20system%20they%20infect.%20Using%20those%20privileges%2C%20they%20can%20hide%20themselves%20from%20diagnostic%20tools%20and%20antimalware%2C%20making%20them%20extremely%20difficult%20to%20detect%20and%20almost%20impossible%20to%20remove.%20That%20foothold%20is%20typically%20leveraged%20by%20malware%20to%20bypass%20local%20logins%2C%20record%20passwords%20and%20keystrokes%2C%20exfiltrate%20private%20files%2C%20and%20steal%20security%20keys%20and%20credentials.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EToday%2C%20I'm%20announcing%20that%20Azure%20customers%20can%20prevent%20bootkit%20and%20rootkit%20infections%20by%20enabling%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22Trusted%20launch%20for%20Azure%20virtual%20machines%20(preview)%20%7C%20docs%22%20href%3D%22https%3A%2F%2Faka.ms%2Ftrustedlaunch%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Trusted%20Launch%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Efor%20their%20virtual%20machines.%20Trusted%20Launch%20allows%20administrators%20to%20deploy%20virtual%20machines%20with%20verified%20and%20signed%20bootloaders%2C%20OS%20kernels%2C%20and%20a%20boot%20policy%20that%20leverages%20the%20Trusted%20Launch%20Virtual%20Trusted%20Platform%20Module%20(vTPM)%20to%20measure%20and%20attest%20to%20whether%20the%20boot%20was%20compromised.%20The%20vTPM%20measurements%20give%20administrators%20visibility%20into%20the%20integrity%20of%20the%20entire%20boot%20process%2C%20and%20vTPM%20release%20policies%20ensure%20that%20keys%2C%20certificates%2C%20and%20secrets%20aren't%20accessible%20to%20compromised%20virtual%20machines.%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%3CA%20title%3D%22Announcing%20preview%20of%20Azure%20Trusted%20Launch%20for%20virtual%20machines%22%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fannouncing-preview-of-azure-trusted-launch-for-virtual-machines%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3ERead%20the%20full%20article%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Written by Mark Russinovich, Chief Technology Officer and Technical Fellow, Microsoft Azure

 

Persistent threats like bootkits and rootkits are sophisticated malware types that run with the same kernel-mode privileges as the operating system they infect. Using those privileges, they can hide themselves from diagnostic tools and antimalware, making them extremely difficult to detect and almost impossible to remove. That foothold is typically leveraged by malware to bypass local logins, record passwords and keystrokes, exfiltrate private files, and steal security keys and credentials.

 

Today, I'm announcing that Azure customers can prevent bootkit and rootkit infections by enabling Azure Trusted Launch for their virtual machines. Trusted Launch allows administrators to deploy virtual machines with verified and signed bootloaders, OS kernels, and a boot policy that leverages the Trusted Launch Virtual Trusted Platform Module (vTPM) to measure and attest to whether the boot was compromised. The vTPM measurements give administrators visibility into the integrity of the entire boot process, and vTPM release policies ensure that keys, certificates, and secrets aren't accessible to compromised virtual machines.

 

Read the full article

0 Replies