Microsoft on Monday introduced that it has moved the Microsoft Account (MSA) signing service to Azure confidential digital machines (VMs) and that it is also within the strategy of migrating the Entra ID signing service as nicely.
The disclosure comes about seven months after the tech large stated it accomplished updates to Microsoft Entra ID and MS for each public and United States authorities clouds to generate, retailer, and routinely rotate entry token signing keys utilizing the Azure Managed {Hardware} Safety Module (HSM) service.
“Every of those enhancements helps mitigate the assault vectors that we suspect the actor used within the 2023 Storm-0558 assault on Microsoft,” Charlie Bell, Government Vice President for Microsoft Safety, stated in a publish shared with The Hacker Information forward of publication.

Microsoft additionally famous that 90% of identification tokens from Microsoft Entra ID for Microsoft apps are validated by a hardened identification Software program Improvement Package (SDK) and that 92% of worker productiveness accounts at the moment are utilizing phishing-resistant multifactor authentication (MFA) to mitigate threat from superior cyber assaults.
In addition to isolating manufacturing techniques and implementing a two-year retention coverage for security logs, the corporate additionally stated it is defending 81% of manufacturing code branches utilizing MFA by proof-of-presence checks.
“To scale back the chance of lateral motion, we’re piloting a undertaking to maneuver buyer assist workflows and situations right into a devoted tenant,” it added. “Safety baselines are enforced throughout all kinds of Microsoft tenants, and a brand new tenant provisioning system routinely registers new tenants in our security emergency response system.”
The adjustments are a part of its Safe Future Initiative (SFI), which the corporate characterised because the “largest cybersecurity engineering undertaking in historical past and most intensive effort of its form at Microsoft.”

The SFI gained traction final 12 months in response to a report from the U.S. Cyber Security Overview Board (CSRB), which criticized the tech large for a collection of avoidable errors that led to the breach of almost two dozen corporations throughout Europe and the U.S. by a China-based nation-state group referred to as Storm-0558 in 2023.
Microsoft, in July 2023, revealed {that a} validation error in its supply code allowed for Azure Lively Listing (Azure AD) or Entra ID tokens to be solid by Storm-0558 utilizing an MSA client signing key to infiltrate a number of organizations and achieve unauthorized e-mail entry for subsequent exfiltration of mailbox knowledge.
Late final 12 months, the corporate additionally launched a Home windows Resiliency Initiative to enhance security and reliability and keep away from inflicting system disruptions like what occurred in the course of the notorious CrowdStrike replace incident in July 2024.

This features a characteristic referred to as Fast Machine Restoration, which allows IT directors to run particular fixes on Home windows PCs even in conditions when the machines are unable in addition. It is constructed into the Home windows Restoration Surroundings (WinRE).
“In contrast to conventional restore choices that depend on person intervention, it prompts routinely when the system detects failure,” Patch My PC’s Rudy Ooms stated late final month.
“The entire cloud remediation course of is fairly simple: it checks if flags/settings like CloudRemediation, AutoRemediation, and optionally HeadlessMode are set. If the surroundings meets the circumstances (reminiscent of an obtainable community and required plugin), Home windows silently initiates restoration.”



