Department of Defense standardizes on Windows 10

yinan

Golden Member
Jan 12, 2007
1,801
2
71
Most of the time, even if those settings are not disabled ( which they are ), they couldn't get home if they wanted to. Air gapped networks.
 

SparkyJJO

Lifer
May 16, 2002
13,357
7
81
Or maybe there were just a bunch of mole hills turned into mountains and there isn't near the kind of security risk that some people think there is.
 

Anteaus

Platinum Member
Oct 28, 2010
2,448
4
81
Or maybe there were just a bunch of mole hills turned into mountains and there isn't near the kind of security risk that some people think there is.

I get your point, though risk is subjective. The level of the risk is only as large as the people who exploit it make it. In the case of this thread, unprompted data leakage of any kind in some of the security environments that the DoD is likely use a Windows PC can be a huge deal. This is less about Microsoft about being malicious (which I agree with you about) and more about general network security.

I just asked the question initially because I wondered if the DoD might have required MS to provide a custom build that might have adhered to a specific security requirement. Modifying a bit of code to honor a DoD contract, even if only a custom patch, is well within the realm of possibility if it means getting the contract or not. Even if they don't require modification, I'm all but certain that MS would be more transparent with them about what type of data that Windows 10 transmits than they would be with the average user.
 

yinan

Golden Member
Jan 12, 2007
1,801
2
71
I get your point, though risk is subjective. The level of the risk is only as large as the people who exploit it make it. In the case of this thread, unprompted data leakage of any kind in some of the security environments that the DoD is likely use a Windows PC can be a huge deal. This is less about Microsoft about being malicious (which I agree with you about) and more about general network security.

I just asked the question initially because I wondered if the DoD might have required MS to provide a custom build that might have adhered to a specific security requirement. Modifying a bit of code to honor a DoD contract, even if only a custom patch, is well within the realm of possibility if it means getting the contract or not. Even if they don't require modification, I'm all but certain that MS would be more transparent with them about what type of data that Windows 10 transmits than they would be with the average user.

If you think they provide more help to the government than the average business you are very funny. More often than not they provide worse.
 

quikah

Diamond Member
Apr 7, 2003
4,180
729
126
I get your point, though risk is subjective. The level of the risk is only as large as the people who exploit it make it. In the case of this thread, unprompted data leakage of any kind in some of the security environments that the DoD is likely use a Windows PC can be a huge deal. This is less about Microsoft about being malicious (which I agree with you about) and more about general network security.

I just asked the question initially because I wondered if the DoD might have required MS to provide a custom build that might have adhered to a specific security requirement. Modifying a bit of code to honor a DoD contract, even if only a custom patch, is well within the realm of possibility if it means getting the contract or not. Even if they don't require modification, I'm all but certain that MS would be more transparent with them about what type of data that Windows 10 transmits than they would be with the average user.

I believe they need to do a Common Criteria certification. I am not sure if there are other audits that need to be completed for government to start using it. MS has been certifying their stuff for a long time now. https://msdn.microsoft.com/en-us/library/dd229319.aspx

Here is the Windows 10 CC cert report:
https://www.niap-ccevs.org/st/st_vid10677-st.pdf
 

Anteaus

Platinum Member
Oct 28, 2010
2,448
4
81
I believe they need to do a Common Criteria certification. I am not sure if there are other audits that need to be completed for government to start using it. MS has been certifying their stuff for a long time now. https://msdn.microsoft.com/en-us/library/dd229319.aspx

Here is the Windows 10 CC cert report:
https://www.niap-ccevs.org/st/st_vid10677-st.pdf

Interesting.

The DoD actually is getting a custom implementation of Windows 10. It probably doesn't count as a custom build, but it is definitely not configured the same as you or I would see after a clean install. It is described as "security hardened" which presumably means that all non-intentional network radiation (did I just invent a phrase? :p) is probably deactivated in the install image.

http://iasecontent.disa.mil/stigs/p...ration_to_Windows_10_Secure_Host_Baseline.pdf
https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_SecureHostBaseline_Web.pdf
 

yinan

Golden Member
Jan 12, 2007
1,801
2
71
The install bits are the same, there are just GPOs and other things applied to the image. The gov't goes to the same volume download sites as everyone else.
 

LPCTech

Senior member
Dec 11, 2013
679
93
86
Im sure the DOD "I.T. guys" can modify things however they require, to make it secure.
 

yinan

Golden Member
Jan 12, 2007
1,801
2
71
The security requirements and recommendations are available for anyone to implement. They really aren't a secret.
 

Brian Stirling

Diamond Member
Feb 7, 2010
3,964
2
0
I bet the DOD has some help from the folks at the NSA and NRO to control what gets sent and to whom. If they aren't using them in this way and lots of other ways they're not doing there job.


Brian
 

yinan

Golden Member
Jan 12, 2007
1,801
2
71
All of these things are easy to control, even for home users. Just deny everything by default at the firewall level and only whitelist certain things. The DISA STIG is freely available to anyone who wants to download it, but the install bits are just downloaded from the MS volume license site. Plus on the airgapped networks, there isn't a route from there to microsoft.com so even if stuff wasn't turned off it couldn't get there.