Developing secure coding in Azure Sphere

%3CLINGO-SUB%20id%3D%22lingo-sub-1867238%22%20slang%3D%22en-US%22%3EDeveloping%20secure%20coding%20in%20Azure%20Sphere%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1867238%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EThis%20article%20was%20originally%20published%20by%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22Jewell%20Seay%20profile%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F431350%22%20target%3D%22_blank%22%3EJewell%20Seay%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ein%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Finternet-of-things%2Fbg-p%2FIoTBlog%22%20target%3D%22_blank%22%3EInternet%20of%20Things%20blog%3C%2FA%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%22How%20do%20you%20develop%20secure%20code%3F%22%20I've%20been%20asked%20this%20a%20lot%20recently%20and%20it%20is%20time%20for%20a%20blog%20post%20as%20the%20public%20and%20various%20parts%20of%20Microsoft%20have%20gotten%20a%20glimpse%20of%20how%20much%20Azure%20Sphere%20goes%20through%20to%20hold%20to%20our%20security%20promises.%20This%20will%20not%20be%20a%20short%20blog%20post%20as%20I%20have%20a%20lot%20to%20cover.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20joined%20Microsoft%20in%20February%202019%20with%20the%20goal%20of%20improving%20the%20security%20posture%20of%20Azure%20Sphere%20and%20also%20desired%20to%20give%20back%20to%20the%20public%20community%20when%20possible.%20My%20talk%20at%20the%20Platform%20Security%20Summit%20talks%20about%20the%20hardware%20however%20the%20talk%20did%20not%20provide%20detailed%20answers%20on%20how%20to%20improve%20security%20for%20software%20development%20and%20testing.%20Azure%20Sphere's%20focus%20is%20IoT%20however%20we%20still%20give%20back%20to%20the%20open%20source%20community%20and%20want%20to%20see%20the%20software%20industry%20improve%20too%2C%20this%20blog%20post%20is%20to%20help%20reveal%20the%20efforts%20we%20go%20through%20and%20hopefully%20help%20others%20understand%20what%20it%20means%20to%20sign%20up%20saying%20you%20are%20secure.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFirst%2C%20you%20must%20realize%20that%20there%20is%20no%20magic%20bullet%20or%20single%20solution%20to%20keep%20a%20system%20secure%2C%20there%20are%20a%20wide%20range%20of%20potential%20issues%20and%20problems%20that%20require%20solutions.%20You%20must%20also%20accept%20that%20all%20code%20must%20be%20questioned%20regardless%20of%20where%20it%20is%20from%2C%20so%20how%20does%20Azure%20Sphere%20handle%20this%3F%20We%20have%20a%20range%20of%20guidelines%20and%20rules%20that%20we%20refuse%20to%20bend%20on.%20These%20become%20our%20foundation%20when%20questions%20come%20up%20about%20allowing%20an%20exception%20or%20if%20a%20new%20feature%20has%20the%20right%20design%20by%20checking%20if%20it%20violates%20a%20rule%20we%20refuse%20to%20bend%20on.%20The%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2F7properties%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E7%20properties%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eis%20a%20good%20starting%20point%20and%20provides%20a%20number%20of%20overarching%20requirements%2C%20this%20is%20further%20extended%20with%20internal%20requirements%20that%20we%20do%20not%20want%20to%20bend%20on%2C%20an%20example%20being%20no%20unsigned%20code%20can%20ever%20be%20allowed%20to%20execute.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EWhat%20is%20your%20foundation%3F%20What%20lines%20are%20you%20willing%20to%20draw%20in%20the%20sand%20that%20can%20not%20be%20compromised%2C%20bent%2C%20or%20ignored%3F%20Our%20foundation%20of%20what%20we%20deem%20secure%20is%20always%20being%20improved%20and%20expanded%20with%20the%20following%20being%20a%20few%20examples.%20These%20are%20meant%20to%20help%20drive%20thoughts%20on%20what%20works%20on%20your%20own%20software%20and%20is%20not%20meant%20to%20be%20a%20complete%20list.%20By%20having%20these%20lines%20along%20with%20the%207%20properties%20allows%20for%20better%20security%20decisions%20as%20new%20features%20are%20added.%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Finternet-of-things%2Fdeveloping-secure-coding-in-azure-sphere%2Fba-p%2F1796510%22%20target%3D%22_self%22%3E%3CSTRONG%3ERead%20the%20full%20article%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1867238%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Sphere%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

This article was originally published by Jewell Seay in the Internet of Things blog

 

"How do you develop secure code?" I've been asked this a lot recently and it is time for a blog post as the public and various parts of Microsoft have gotten a glimpse of how much Azure Sphere goes through to hold to our security promises. This will not be a short blog post as I have a lot to cover.

 

I joined Microsoft in February 2019 with the goal of improving the security posture of Azure Sphere and also desired to give back to the public community when possible. My talk at the Platform Security Summit talks about the hardware however the talk did not provide detailed answers on how to improve security for software development and testing. Azure Sphere's focus is IoT however we still give back to the open source community and want to see the software industry improve too, this blog post is to help reveal the efforts we go through and hopefully help others understand what it means to sign up saying you are secure.

 

First, you must realize that there is no magic bullet or single solution to keep a system secure, there are a wide range of potential issues and problems that require solutions. You must also accept that all code must be questioned regardless of where it is from, so how does Azure Sphere handle this? We have a range of guidelines and rules that we refuse to bend on. These become our foundation when questions come up about allowing an exception or if a new feature has the right design by checking if it violates a rule we refuse to bend on. The 7 properties is a good starting point and provides a number of overarching requirements, this is further extended with internal requirements that we do not want to bend on, an example being no unsigned code can ever be allowed to execute.

 

What is your foundation? What lines are you willing to draw in the sand that can not be compromised, bent, or ignored? Our foundation of what we deem secure is always being improved and expanded with the following being a few examples. These are meant to help drive thoughts on what works on your own software and is not meant to be a complete list. By having these lines along with the 7 properties allows for better security decisions as new features are added.

 

Read the full article

0 Replies