Azure Sphere MT3620 Insights - September 2021

Published Oct 12 2021 09:00 AM 826 Views
Microsoft

Azure Sphere can do so many things across many domains, but Security is a deep domain, so vast it seems sometimes to impact every line of code ever written. Sometimes security is a big, bright, and showy focal point, other times it sits humbly away from the spotlights; you might not even notice it if you don’t peer into the shadows. Through this series, I intend to share our team perspective and insights to give some context around the work we’re doing for the MT3620.

 

In our 21.09 Azure Sphere OS, we’re shipping a kernel update to version 5.10.60. This update has no new features. So, why take the risk of making the change then?

 

Can a product be known to be secure? Or is a locked-down product one that just has not yet been exploited? Evidence suggests that security is not a binary state but a spectrum of how often and how long a product can establish trust and regain trust once it has been lost. The key difference is time—how long it takes to find and exploit unknown vulnerabilities and how trusted something can be over time. By updating the Azure Sphere OS kernel version, we’re lowering the risk of exploitation. This minor kernel update includes bug fixes and security patches, and its configuration is newer and less familiar to exploits that have been packaged for mass application.

 

Last year we ran a public Azure Sphere research challenge. During the challenge we received a couple of complaints from legitimately annoyed researchers. Though the challenge spanned several months, each month the researchers’ findings were patched, making it hard to string together multiple vulnerabilities into exploits that dig deeper into the system. We had to explain that Azure Sphere’s security isn’t based on one build of its OS. Regular updates are part of the security story of Azure Sphere; making changes that disrupt exploits isn’t a bug, it’s a feature. Azure Sphere’s security is designed to take into account. Changes, patches, fixes, and updates build up a product whose We’ve taken to heart any complaints from participants to better design future challenges that play to researchers’ strengths. But we continue to make updates available for operational devices, like this latest kernel update, because these changes are an essential part of our security story, a story that drives us to renew trust at every opportunity and every interaction with the platform.

 

Azure Sphere defense-in-depth features are designed to mitigate potential impacts. Nominally, by the time a proper exploit has been packaged, Azure Sphere devices will be on a newer version, through another update, maybe even several updates from now. Azure Sphere changes with time. I think that’s worth thinking about when it comes to security.

1 Comment
New Contributor

Given that Azure Sphere OS only offers C as programming language, without memory tagging, despite the security talk around Sphere, there are still plenty of opportunities for those researchers to work out their exploits.

%3CLINGO-SUB%20id%3D%22lingo-sub-2835962%22%20slang%3D%22en-US%22%3EAzure%20Sphere%20MT3620%20Insights%20-%20September%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2835962%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Sphere%20can%20do%20so%20many%20things%20across%20many%20domains%2C%20but%20Security%20is%20a%20deep%20domain%2C%20so%20vast%20it%20seems%20sometimes%20to%20impact%20every%20line%20of%20code%20ever%20written.%20Sometimes%20security%20is%20a%20big%2C%20bright%2C%20and%20showy%20focal%20point%2C%20other%20times%20it%20sits%20humbly%20away%20from%20the%20spotlights%3B%20you%20might%20not%20even%20notice%20it%20if%20you%20don%E2%80%99t%20peer%20into%20the%20shadows.%20Through%20this%20series%2C%20I%20intend%20to%20share%20our%20team%20perspective%20and%20insights%20to%20give%20some%20context%20around%20the%20work%20we%E2%80%99re%20doing%20for%20the%20MT3620.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20our%2021.09%20Azure%20Sphere%20OS%2C%20we%E2%80%99re%20shipping%20a%20kernel%20update%20to%20version%205.10.60.%20This%20update%20has%20no%20new%20features.%20So%2C%20why%20take%20the%20risk%20of%20making%20the%20change%20then%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECan%20a%20product%20be%20known%20to%20be%20secure%3F%20Or%20is%20a%20locked-down%20product%20one%20that%20just%20has%20not%20yet%20been%20exploited%3F%20Evidence%20suggests%20that%20security%20is%20not%20a%20binary%20state%20but%20a%20spectrum%20of%20how%20often%20and%20how%20long%20a%20product%20can%20establish%20trust%20and%20regain%20trust%20once%20it%20has%20been%20lost.%20The%20key%20difference%20is%20time%E2%80%94how%20long%20it%20takes%20to%20find%20and%20exploit%20unknown%20vulnerabilities%20and%20how%20trusted%20something%20can%20be%20over%20time.%20By%20updating%20the%20Azure%20Sphere%20OS%20kernel%20version%2C%20we%E2%80%99re%20lowering%20the%20risk%20of%20exploitation.%20This%20minor%20kernel%20update%20includes%20bug%20fixes%20and%20security%20patches%2C%20and%20its%20configuration%20is%20newer%20and%20less%20familiar%20to%20exploits%20that%20have%20been%20packaged%20for%20mass%20application.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELast%20year%20we%20ran%20a%20public%20Azure%20Sphere%20research%20challenge.%20During%20the%20challenge%20we%20received%20a%20couple%20of%20complaints%20from%20legitimately%20annoyed%20researchers.%20Though%20the%20challenge%20spanned%20several%20months%2C%20each%20month%20the%20researchers%E2%80%99%20findings%20were%20patched%2C%20making%20it%20hard%20to%20string%20together%20multiple%20vulnerabilities%20into%20exploits%20that%20dig%20deeper%20into%20the%20system.%20We%20had%20to%20explain%20that%20Azure%20Sphere%E2%80%99s%20security%20isn%E2%80%99t%20based%20on%20one%20build%20of%20its%20OS.%20Regular%20updates%20are%20part%20of%20the%20security%20story%20of%20Azure%20Sphere%3B%20making%20changes%20that%20disrupt%20exploits%20isn%E2%80%99t%20a%20bug%2C%20it%E2%80%99s%20a%20feature.%20Azure%20Sphere%E2%80%99s%20security%20is%20designed%20to%20take%20into%20account.%20Changes%2C%20patches%2C%20fixes%2C%20and%20updates%20build%20up%20a%20product%20whose%20We%E2%80%99ve%20taken%20to%20heart%20any%20complaints%20from%20participants%20to%20better%20design%20future%20challenges%20that%20play%20to%20researchers%E2%80%99%20strengths.%20But%20we%20continue%20to%20make%20updates%20available%20for%20operational%20devices%2C%20like%20this%20latest%20kernel%20update%2C%20because%20these%20changes%20are%20an%20essential%20part%20of%20our%20security%20story%2C%20a%20story%20that%20drives%20us%20to%20renew%20trust%20at%20every%20opportunity%20and%20every%20interaction%20with%20the%20platform.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Sphere%20defense-in-depth%20features%20are%20designed%20to%20mitigate%20potential%20impacts.%20Nominally%2C%20by%20the%20time%20a%20proper%20exploit%20has%20been%20packaged%2C%20Azure%20Sphere%20devices%20will%20be%20on%20a%20newer%20version%2C%20through%20another%20update%2C%20maybe%20even%20several%20updates%20from%20now.%20Azure%20Sphere%20changes%20with%20time.%20I%20think%20that%E2%80%99s%20worth%20thinking%20about%20when%20it%20comes%20to%20security.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2835962%22%20slang%3D%22en-US%22%3E%3CP%3EThe%2021.09%20Azure%20Sphere%20OS%20is%20an%20update%20with%20no%20new%20features.%20So%2C%20why%20take%20the%20risk%20of%20making%20the%20change%20then%3F%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Annotation%202019-10-22%20124248.png%22%20style%3D%22width%3A%20959px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F316632iE40E2F0EE364D9F8%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Annotation%202019-10-22%20124248.png%22%20alt%3D%22Annotation%202019-10-22%20124248.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2835962%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20IoT%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Sphere%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EInternet%20of%20Things%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIoT%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20IoT%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2849052%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Sphere%20MT3620%20Insights%20-%20September%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2849052%22%20slang%3D%22en-US%22%3E%3CP%3EGiven%20that%20Azure%20Sphere%20OS%20only%20offers%20C%20as%20programming%20language%2C%20without%20memory%20tagging%2C%20despite%20the%20security%20talk%20around%20Sphere%2C%20there%20are%20still%20plenty%20of%20opportunities%20for%20those%20researchers%20to%20work%20out%20their%20exploits.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Oct 11 2021 04:31 PM
Updated by: