by Scott Muniz | Oct 14, 2021 | Security, Technology
This article is contributed. See the original author and article here.
CISA, the Federal Bureau of Investigation (FBI), the Environmental Protection Agency (EPA), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) that details ongoing cyber threats to U.S. Water and Wastewater Systems (WWS) Sector. This activity—which includes cyber intrusions leading to ransomware attacks—threatens the ability of WWS facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities. The joint CSA provides extensive mitigations and resources to assist WWS Sector facilities in strengthening operational resilience and cybersecurity practices.
CISA has also released a Cyber Risks & Resources for the Water and Wastewater Systems Sector infographic that details both information technology and operational technology risks the WWS Sector faces and provides select resources.
by Scott Muniz | Oct 14, 2021 | Security, Technology
This article is contributed. See the original author and article here.
Summary
Immediate Actions WWS Facilities Can Take Now to Protect Against Malicious Cyber Activity
• Do not click on suspicious links.
• If you use RDP, secure and monitor it.
• Use strong passwords.
• Use multi-factor authentication.
Note: This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
This joint advisory is the result of analytic efforts between the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Agency (CISA), the Environmental Protection Agency (EPA), and the National Security Agency (NSA) to highlight ongoing malicious cyber activity—by both known and unknown actors—targeting the information technology (IT) and operational technology (OT) networks, systems, and devices of U.S. Water and Wastewater Systems (WWS) Sector facilities. This activity—which includes attempts to compromise system integrity via unauthorized access—threatens the ability of WWS facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities. Note: although cyber threats across critical infrastructure sectors are increasing, this advisory does not intend to indicate greater targeting of the WWS Sector versus others.
To secure WWS facilities—including Department of Defense (DoD) water treatment facilities in the United States and abroad—against the TTPs listed below, CISA, FBI, EPA, and NSA strongly urge organizations to implement the measures described in the Recommended Mitigations section of this advisory.
Click here for a PDF version of this report.
Technical Details
Threat Overview
Tactics, Techniques, and Procedures
WWS facilities may be vulnerable to the following common tactics, techniques, and procedures (TTPs) used by threat actors to compromise IT and OT networks, systems, and devices.
- Spearphishing personnel to deliver malicious payloads, including ransomware [T1566].
- Spearphishing is one of the most prevalent techniques used for initial access to IT networks. Personnel and their potential lack of cyber awareness are a vulnerability within an organization. Personnel may open malicious attachments or links to execute malicious payloads contained in emails from threat actors that have successfully bypassed email filtering controls.
- When organizations integrate IT with OT systems, attackers can gain access—either purposefully or inadvertently—to OT assets after the IT network has been compromised through spearphishing and other techniques.
- Exploitation of internet-connected services and applications that enable remote access to WWS networks [T1210].
- For example, threat actors can exploit a Remote Desktop Protocol (RDP) that is insecurely connected to the internet to infect a network with ransomware. If the RDP is used for process control equipment, the attacker could also compromise WWS operations. Note: the increased use of remote operations due to the COVID-19 pandemic has likely increased the prevalence of weaknesses associated with remote access.
- Exploitation of unsupported or outdated operating systems and software.
- Threat actors likely seek to take advantage of perceived weaknesses among organizations that either do not have—or choose not to prioritize—resources for IT/OT infrastructure modernization. WWS facilities tend to allocate resources to physical infrastructure in need of replacement or repair (e.g., pipes) rather than IT/OT infrastructure.
- The fact that WWS facilities are inconsistently resourced municipal systems—not all of which have the resources to employ consistently high cybersecurity standards—may contribute to the use of unsupported or outdated operating systems and software.
- Exploitation of control system devices with vulnerable firmware versions.
- WWS systems commonly use outdated control system devices or firmware versions, which expose WWS networks to publicly accessible and remotely executable vulnerabilities. Successful compromise of these devices may lead to loss of system control, denial of service, or loss of sensitive data [T0827].
WWS Sector Cyber Intrusions
Cyber intrusions targeting U.S. WWS facilities highlight vulnerabilities associated with the following threats:
- Insider threats, from current or former employees who maintain improperly active credentials
- Ransomware attacks
WWS Sector cyber intrusions from 2019 to early 2021 include:
- In August 2021, malicious cyber actors used Ghost variant ransomware against a California-based WWS facility. The ransomware variant had been in the system for about a month and was discovered when three supervisory control and data acquisition (SCADA) servers displayed a ransomware message.
- In July 2021, cyber actors used remote access to introduce ZuCaNo ransomware onto a Maine-based WWS facility’s wastewater SCADA computer. The treatment system was run manually until the SCADA computer was restored using local control and more frequent operator rounds.
- In March 2021, cyber actors used an unknown ransomware variant against a Nevada-based WWS facility. The ransomware affected the victim’s SCADA system and backup systems. The SCADA system provides visibility and monitoring but is not a full industrial control system (ICS).
- In September 2020, personnel at a New Jersey-based WWS facility discovered potential Makop ransomware had compromised files within their system.
- In March 2019, a former employee at Kansas-based WWS facility unsuccessfully attempted to threaten drinking water safety by using his user credentials, which had not been revoked at the time of his resignation, to remotely access a facility computer.
Mitigations
The FBI, CISA, EPA, and NSA recommend WWS facilities—including DoD water treatment facilities in the United States and abroad—use a risk-informed analysis to determine the applicability of a range of technical and non-technical mitigations to prevent, detect, and respond to cyber threats.
WWS Monitoring
Personnel responsible for monitoring WWS should check for the following suspicious activities and indicators, which may be indicative of threat actor activity:
- Inability of WWS facility personnel to access SCADA system controls at any time, either entirely or in part;
- Unfamiliar data windows or system alerts appearing on SCADA system controls and facility data screens that could indicate a ransomware attack;
- Detection by SCADA system controls, or by water treatment personnel, of abnormal operating parameters—such as unusually high chemical addition rates—used in the safe and proper treatment of drinking water;
- Access of SCADA systems by unauthorized individuals or groups, e.g., former employees and current employees not authorized/assigned to operate SCADA systems and controls.
- Access of SCADA systems at unusual times, which may indicate that a legitimate user’s credentials have been compromised
- Unexplained SCADA system restarts.
- Unchanging parameter values that normally fluctuate.
Remote Access Mitigations
Note: The increased use of remote operations due to the COVID-19 pandemic increases the necessity for asset owner-operators to assess the risk associated with enhanced remote access to ensure it falls within acceptable levels.
- Require multi-factor authentication for all remote access to the OT network, including from the IT network and external networks.
- Utilize blocklisting and allowlisting to limit remote access to users with a verified business and/or operational need.
- Ensure that all remote access technologies have logging enabled and regularly audit these logs to identify instances of unauthorized access.
- Utilize manual start and stop features in place of always activated unattended access to reduce the time remote access services are running.
- Audit networks for systems using remote access services.
- Close unneeded network ports associated with remote access services (e.g., RDP – Transmission Control Protocol [TCP] Port 3389).
- When configuring access control for a host, utilize custom settings to limit the access a remote party can attempt to acquire.
Network Mitigations
- Implement and ensure robust network segmentation between IT and OT networks to limit the ability of malicious cyber actors to pivot to the OT network after compromising the IT network.
- Implement demilitarized zones (DMZs), firewalls, jump servers, and one-way communication diodes to prevent unregulated communication between the IT and OT networks.
- Develop/update network maps to ensure a full accounting of all equipment that is connected to the network.
- Remove any equipment from networks that is not required to conduct operations to reduce the attack surface malicious actors can exploit.
Planning and Operational Mitigations
- Ensure the organization’s emergency response plan considers the full range of potential impacts that cyberattacks pose to operations, including loss or manipulation of view, loss or manipulation of control, and threats to safety.
- The plan should also consider third parties with legitimate need for OT network access, including engineers and vendors.
- Review, test, and update the emergency response plan on an annual basis to ensure accuracy.
- Exercise the ability to fail over to alternate control systems, including manual operation while assuming degraded electronic communications.
- Allow employees to gain decision-making experience via tabletop exercises that incorporate loss of visibility and control scenarios. Utilize resources such as the Environment Protection Agency’s (EPA) Cybersecurity Incident Action Checklist as well as the Ransomware Response Checklist on p. 11 of the CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
Safety System Mitigations
- Install independent cyber-physical safety systems. These are systems that physically prevent dangerous conditions from occurring if the control system is compromised by a threat actor.
- Examples of cyber-physical safety system controls include:
- Size of the chemical feed pump
- Gearing on valves
- Pressure switches, etc.
- These types of controls benefit WWS Sector facilities—especially smaller facilities with limited cybersecurity capability—because they enable facility staff to assess systems from a worst-case scenario and determine protective solutions. Enabling cyber-physical safety systems allows operators to take physical steps to limit the damage, for example, by preventing cyber actors, who have gained control of a sodium hydroxide pump, from raising the pH to dangerous levels.
Additional Mitigations
- Foster an organizational culture of cyber readiness. See the CISA Cyber Essentials along with the items listed in the Resources section below for guidance.
- Update software, including operating systems, applications, and firmware on IT network assets. Use a risk-based assessment strategy to determine which OT network assets and zones should participate in the patch management program. Consider using a centralized patch management system.
- Set antivirus/antimalware programs to conduct regular scans of IT network assets using up-to-date signatures. Use a risk-based asset inventory strategy to determine how OT network assets are identified and evaluated for the presence of malware.
- Implement regular data backup procedures on both the IT and OT networks.
- Regularly test backups.
- Ensure backups are not connected to the network to prevent the potential spread of ransomware to the backups.
- When possible, enable OT device authentication, utilize the encrypted version of OT protocols, and encrypt all wireless communications to ensure the confidentiality and authenticity of process control data in transit.
- Employ user account management to:
- Remove, disable, or rename any default system accounts wherever possible.
- Implement account lockout policies to reduce risk from brute-force attacks.
- Monitor the creation of administrator-level accounts by third-party vendors with robust and privileged account management policies and procedures.
- Implement a user account policy that includes set durations for deactivation and removal of accounts after employees leave the organization or after accounts reach a defined period of inactivity.
- Implement data execution prevention controls, such as application allowlisting and software restriction policies that prevent programs from executing from common ransomware locations, such as temporary folders supporting popular internet browsers.
- Train users through awareness and simulations to recognize and report phishing and social engineering attempts. Identify and suspend access of users exhibiting unusual activity.
FBI, CISA, EPA, and NSA would like to thank Dragos as well as the WaterISAC for their contributions to this advisory.
Resources
Cyber Hygiene Services
CISA offers a range of no-cost cyber hygiene services—including vulnerability scanning and ransomware readiness assessments—to help critical infrastructure organizations assess, identify, and reduce their exposure to cyber threats. By taking advantage of these services, organizations of any size will receive recommendations on ways to reduce their risk and mitigate attack vectors.
Rewards for Justice Reporting
The U.S. Department of State’s Rewards for Justice (RFJ) program offers a reward of up to $10 million for reports of foreign government malicious activity against U.S. critical infrastructure. See the RFJ website for more information and how to report information securely.
StopRansomware.gov
The StopRansomware.gov webpage is an interagency resource that provides guidance on ransomware protection, detection, and response. This includes ransomware alerts, reports, and resources from CISA and other federal partners, including:
Additional Resources
For additional resources that can assist in preventing and mitigating this activity, see:
Disclaimer of Endorsement
The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
Contact Information
To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at www.fbi.gov/contact-us/field-offices, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at CyWatch@fbi.gov. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. If you have any further questions related to this Joint Cybersecurity Advisory, or to request incident response resources or technical assistance related to these threats, contact CISA at CISAServiceDesk@cisa.dhs.gov.
Revisions
Initial Version: October 14, 2021
This product is provided subject to this Notification and this Privacy & Use policy.
by Contributed | Oct 14, 2021 | Technology
This article is contributed. See the original author and article here.
We’re happy to announce the addition of the Azure Cosmos DB Developer Specialty certification to our portfolio, to be released in mid-November 2021.
This new certification is a key step for developers who are ready to prove their expertise supporting their organization’s business goals with modern cloud apps. IT environments where application infrastructure is dated, rigorous, and specialized often cost developers valuable time and resources. Business-critical modern apps require scale, speed, and guaranteed availability, and they need to store ever-increasing volumes of data—all while delivering real-time customer access. Developers who work with Azure Cosmos DB find the tools and security they need to meet these requirements and more to meet today’s business challenges.
Is the Azure Cosmos DB Developer Specialty certification right for you?
You’re a great candidate for the Azure Cosmos DB Developer Specialty certification if you have subject matter expertise designing, implementing, and monitoring cloud-native applications that store and manage data.
Typical responsibilities for developers in this role include designing and implementing data models and data distribution, loading data into a database created with Azure Cosmos DB, and optimizing and maintaining the solution. These professionals integrate the solution with other Azure services. They also design, implement, and monitor solutions that consider security, availability, resilience, and performance requirements.
Professionals in this role have experience developing apps for Azure and working with Azure Cosmos DB database technologies. They should be proficient at developing applications by using the Core (SQL) API and SDKs, writing efficient queries and creating appropriate index policies, provisioning and managing resources in Azure, and creating server-side objects with JavaScript. They should also be able to interpret JSON, read C# or Java code, and use PowerShell.
Developers interested in earning this new certification need to pass Exam DP-420: Designing and Implementing Cloud-Native Applications Using Microsoft Azure Cosmos DB, which will be available in mid-November 2021. If you’re a skilled Azure developer who has experience with Azure Cosmos DB, we encourage you to participate in the beta. Stay tuned for the announcement.
Start preparing now for the upcoming beta exam
Even though the exam won’t be released until November 2021, you can start preparing for it now:
Unlock opportunities with Azure Cosmos DB
Are you ready to take your skills to the next level with Azure Cosmos DB? Get ready for Exam DP-420 (beta) and earn your Azure Cosmos DB Developer Specialty certification. Validate that you have what it takes to unlock business opportunities with modern cloud apps—for you, your team, and your organization.
Related posts
Finding the right Microsoft Azure certification for you
by Scott Muniz | Oct 14, 2021 | Security, Technology
This article is contributed. See the original author and article here.
Juniper Networks has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Juniper Networks security advisories page and apply the necessary updates.
by Contributed | Oct 14, 2021 | Dynamics 365, Microsoft 365, Technology
This article is contributed. See the original author and article here.
Microsoft Dynamics 365 Business Central is teaming up with Shopify to help our customers create a better shopping experience. While Shopify provides merchants with an easy-to-use e-commerce solution, Dynamics 365 Business Central offers comprehensive business management across finance, sales, service, and operations teams within a single application. Seamless connection between the two systems will synchronize orders, stock, and customer information to ensure merchants can fulfill orders faster and better serve customers. The joint effort furthers the commitment of Dynamics 365 Business Central to connect data to help businesses adapt faster, work smarter, and perform better.
Adapt faster
Connecting Dynamics 365 Business Central with Shopify will help merchants all over the world implement more agile online business processes, while keeping people focused on selling. With connected data from across your online stores and business operations, you can rapidly respond to consumer demands to adjust product pricing and merchandising. With support for multi-tier pricing structures and multiple currencies, companies, and entities, Dynamics 365 Business Central will support multiple Shopify store scenarios with ease.
Work smarter
Eliminating manual processes will not only improve accuracy, but also keep your people focused on taking care of customers. By connecting Shopify and Dynamics 365 Business Central, you will improve visibility into stock, pricing, existing customers and order history, order status, billing, and payments. Better visibility means faster customer inquiry responses, timely returns and refunds, and more accurate order processing.
Perform better
Enhanced operational efficiency not only saves you time and reduces costs but can also translate into better results and faster decision-making. So, you have the confidence to expand your online presence while minimizing overhead with automatic synchronization between systems for price changes, product updates, and customers. At the end of accounting periods, Dynamics 365 Business Central will help merchants handle their financial reporting and tax reporting as required by local legislation.
Microsoft is committed to creating an open ecosystem to help our customers with finding the right solution to accelerate their digital transformation journey. Joining the Shopify Global ERP Program helps our Dynamics 365 Business Central customers accelerate growth with the ability to sell, ship, and process payments online using a native connector available in early 2022.
Innovation begins with data-fueled insights and more connected operations will allow merchants that use Dynamics 365 Business Central to meet consumer demands. Along with this, our corporate and enterprise customers continue to rely on Microsoft Dynamics 365 Commerce to deliver unified, personalized, and seamless buying experiences across online and offline channels. Now businesses of all sizes can deliver commerce anywhere to offer consumers more choices and better experiences.
The post Microsoft partners with Shopify to expand Dynamics 365 Business Central ecosystem appeared first on Microsoft Dynamics 365 Blog.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
by Contributed | Oct 13, 2021 | Technology
This article is contributed. See the original author and article here.
We are excited to announce the support for Ddsv4 (General Purpose) and Edsv4 (Memory optimized) VM series with Azure Database for PostgreSQL – Flexible Server (Preview).
As you may know, the Flexible Server option in Azure Database for PostgreSQL is a fully managed PostgreSQL service that handles your mission-critical workloads with predictable performance. Flexible Server offers you with compute tier choices including Burstable compute tier for dev/test use cases, a General Purpose compute tier for running your small and medium production workloads, and a Memory Optimized compute tier to handle your large, mission-critical workloads. Flexible Server allows you to dynamically scale your compute across these tiers and compute sizes.
In addition to the existing DsV3 and EsV3 series of compute, you can now deploy using Ddsv4 and Edsv4 (V4-series) computes for your general purpose and memory optimized computing needs.

What are Ddsv4/Edsv4 VM series?
The Ddsv4 and Edsv4 VM series are based on the 2nd generation Intel Xeon Platinum 8272CL (Cascade Lake). This custom processor runs at a base speed of 2.5GHz and can achieve all-core turbo frequency of 3.4GHz. These compute tiers offer 50 percent larger and faster local storage, as well as better local disk IOPS for both Read and Write caching compared to the Dv3 and Ev3 compute sizes.
- Ddsv4 compute sizes provide a good balance of memory-to-vCPU performance, with up to 64 vCPUs, 256 GiB of RAM, and include local SSD storage.
- Edsv4 compute sizes feature a high memory-to-CPU ratio, with up to 64 vCPUs, 504 GiB of RAM, and include local SSD storage. The Edsv4 also supports a 20vCPU compute size with 160GiB of memory.
Ok. What are the benefits of running Flexible Server on v4-series?
- The V4-series compute sizes provide a faster processing power.
- V4-series also include high-speed local storage which are automatically used by PostgreSQL Flexible Server for read caching without requiring any user action.
So, depending on your workload and your data size, you could expect up to 40% performance improvement with V4 series compared to V3.
How about Flexible server V4-series pricing?
Please refer to the Azure Database for PostgreSQL – Flexible Server pricing page for detailed pricing. The V4-series flexible servers can be deployed using pay-as-you-go (PAYG or on-demand) pricing as well as reserved instance (RI) pricing. RI pricing offers up to 58% discount over PAYG pricing, depending on the compute tier and the reservation period.
I am currently running my server Postgres on V3-series. How can I migrate to V4-series?
You can simply scale your compute to any V4 compute size with a couple of clicks. From compute + storage blade (as illustrated in Figures 1, 2, and 3), you can simply modify your compute size to the desired V4 compute size. As scaling (compute migration) is an offline operation which would need couple of minutes of downtime in most cases, it is recommended that you perform scale operations during non-peak periods of your server. During the scale operation, your storage is detached from your existing server and gets attached to the new, scaled server. Flexible server offers a complete flexibility to scale your compute across all compute tiers and compute sizes at any time. You can either scale-up or scale-down the compute.
V4-series computes are only available with General Purpose or the Memory Optimized compute tiers. If you choose either of these tiers, then you’ll be able to select the new Ddsv4 compute size for General Purpose—or Edsv4 compute size for Memory Optimized compute tiers.
For example, to scale to General V4 compute size, from the “Compute + Storage” blade, choose the General Purpose tier.
Figure 1: Screenshot from the Azure Portal, of the provisioning workflow for the Flexible Server option in Azure Database for PostgreSQL Compute + Storage blade. This is where you can select the compute tier (General purpose / Memory Optimized)
Then choose a General Purpose Ddsv4 compute size that suits your application needs.
Figure 2: Screenshot of the pulldown menu for the “General Purpose” compute size choice in the Compute + Storage blade for Flexible Server in Azure Database for PostgreSQL. You can see new Ddsv4 choices on the list.
Similarly, when you choose Memory Optimized compute tier shown in Figure 1, you can choose a Edsv4 compute size.
Figure 3: Screenshot of the pulldown menu for the “Memory Optimized” compute size choice in the Compute + Storage blade for Flexible Server in Azure Database for PostgreSQL. You can see new Edsv4 choices on the list.
How do I transfer my existing reservations from V3 to V4?
If you are already using reserved instances with V3, you can easily exchange the reservations to the desired V4 compute, and you may just have to pay the difference in pricing depending on the compute tier.
Are these V4 compute tiers available in all regions?
Please see this list of regions for V3/V4 VM series availability.
All sounds good. What are the limitations?
- Currently, local disk caching is enabled for storage provisioned up to 2TiB, with plans to support caching for larger provisioned storage sizes in the future.
- The compute scaling is an offline operation and expect a couple of minutes of downtime. It is recommended to perform such scale operations during non-peak periods.
Where can I learn more about Flexible Server?
by Scott Muniz | Oct 13, 2021 | Security
This article was originally posted by the FTC. See the original article here.
If you’re like many people, before you lay your money down — particularly for big-ticket items — you want to hear what past buyers say about them. The FTC took a big step today to make sure that what you hear is truthful. It warned businesses that the endorsements they use to help sell their products must reflect the actual experience and opinions of real people who used them.
The FTC sent a “Notice of Penalty Offenses” to more than 700 large companies, top advertisers, leading retailers, well-known consumer product companies, and major advertising agencies. The Notice describes advertising practices involving endorsements that the FTC found were deceptive in past lawsuits. The recipients were picked because they are top marketers and agencies, not because they are suspected of doing something wrong. But they are now all on notice that, if they use any of these deceptive practices in the future, they can face penalties of up to $43,792 per violation.
What kinds of advertising crosses the line? Among other things, companies that use endorsements
- Can’t misrepresent that an endorser is an actual, current, or recent user of a product
- Can’t misrepresent that endorsers’ experiences represent people’s typical experiences
- Can’t use an endorsement without good reason to believe the endorser still holds the views expressed
- Can’t use an endorsement to make deceptive claims about how a product performs, and
- Can’t fail to disclose an unexpected relationship between the endorser and the advertiser, like a business or family relationship, a payment, or a gift of a free product.
The Notice could apply not only to a company’s own ads but also to its use of influencers, fake reviews, and reviews by customers with connections to the company.
When shopping for a product or service, you’ll want to evaluate any reviews carefully.
- Consider the source of the reviews. What do you know about the reviewer? Or about the site or platform where you’re reading the reviews?
- Look at more than one source. Good places to start are well-known websites that have credible and impartial expert reviews.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
by Scott Muniz | Oct 12, 2021 | Security, Technology
This article is contributed. See the original author and article here.
Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review Microsoft’s October 2021 Security Update Summary and Deployment Information and apply the necessary updates.
by Contributed | Oct 12, 2021 | Technology
This article is contributed. See the original author and article here.
Because of the retirement of Azure AD Graph has been announced, all applications using the service need to switch to Microsoft Graph, which provides all the functionality of Azure AD Graph along with new functionality. This also apply to the Azure command-line tools (Azure CLI, Azure PowerShell, and Terraform) and we are currently updating our tools to use Microsoft Graph and make it available to you as early as possible to give you enough time to update your code.
Impact on existing scripts
Our principle is to minimize the disruption to existing scripts. Therefore, whenever possible, we will keep the same command signature so that a version upgrade of your tool will be sufficient with no additional effort.
In few cases, the behavioral difference of the Microsoft Graph API from the AzureAD Graph API will induce a breaking change. For example, when creating an Azure AD application, the associated password can no longer be set at creation time. If you want to specify this secret, it must be updated afterward. Along with the preview versions of the tools, we will publish a full list of these breaking changes and instructions how to update your commands.
Azure vs Microsoft Graph command-line tools
AzureAD capabilities in the Azure command-line tools are provided to simplify the getting started experience for script developers, hence the limited scenarios covered with those commands.
While we plan keep supporting a subset of the AzureAD resources in the upcoming releases of our tools, we will implement new Graph capabilities as it pertains to fundamentals like authentication. For resources not supported with the Azure CLIs tools, we recommend using the Microsoft Graph tools: either the Microsoft Graph SDK PowerShell modules or the Microsoft Graph CLI.
Availability and next steps
To help you plan your migration work before the deadline, we are sharing our current timeline:
- October 2021
- Public preview of Azure CLI using MSAL (pre-requisite to migrating to MS Graph)
- Public preview of Azure PowerShell using Microsoft Graph API
- Each tool documentation will have guidance on how to install and test the previews.
- December 2021:
- General availability of Azure PowerShell using Microsoft Graph
- Update of Azure services documentation and scripts using outdated commands
- January 2022:
- Preview of Azure CLI using Microsoft Graph
- Q1 2022:
- GA of Azure CLI using Microsoft Graph
For Terraform, HashiCorp has already completed the migration to Microsoft graph with the AzureAD provider v2. Additional information here: https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/guides/microsoft-graph
Please comment on this article or reach out to the respective teams if you have any questions for Azure CLI (@azurecli) or Azure PowerShell (@azureposh).
Additional resources
While we update the official documentation for Azure tools, you can use the following resources for additional guidance on migrating to Microsoft Graph.
Further information regarding the migration to MSAL and its importance in the migration to MS Graph:
The content provided for Terraform, is very useful to understand the API changes:
Open issues in the respective repositories if you face any:
Let us know what you think in the comment section below.
Damien
on behalf of the Azure CLIs tools team
by Scott Muniz | Oct 12, 2021 | Security, Technology
This article is contributed. See the original author and article here.
Apple has released a security update to address a vulnerability—CVE-2021-30883—in multiple products. An attacker could exploit this vulnerability to take control of an affected system. This vulnerability has been detected in exploits in the wild.
CISA encourages users to review the Apple security page for iOS 15.0.2 and iPadOS 15.0.2 and apply the necessary updates as soon as possible.
Recent Comments