iTnews
  • Home
  • News
  • Technology
  • Security

CrowdStrike promises more testing of security content updates

By Ry Crozier
Jul 24 2024 3:50PM

File that crashed Windows machines worldwide mistakenly passed validation.

CrowdStrike will add layers of extra testing around future file updates, stage global deployments and give customers more control, after a buggy update bricked millions of Windows machines.

CrowdStrike promises more testing of security content updates

The endpoint detection and response (EDR) vendor published a preliminary post-incident report into last Friday’s sensor configuration update to Windows systems. 

The vendor said the bad update mistakenly passed a validation check that was inherently trusted, given it had run similar checks successfully on four previous occasions this year.

“Due to a bug in the content validator, one of two [file updates] passed validation despite containing problematic content data,” CrowdStrike said.

The company said it routinely ships two types of security content configuration files for its Falcon EDR customers: one with new sensor releases, the other “at operational speed”.

Sensor releases are exposed to “extensive QA” and testing, and “customers then have the option of selecting which parts of their fleet should install the latest sensor release (‘N’), or one version older (‘N-1’) or two versions older (‘N-2’),” the vendor said.

The configuration file update that caused Windows machines to crash was of the kind released at “operational speed" - a capability "used by threat detection engineers to gather telemetry, identify indicators of adversary behaviour and perform detections and preventions.”

This particular update type is “created and configured” through the company’s cloud-based Falcon platform. A “content validator that performs validation checks on the content before it is published” is part of that system.

However, aside from this validation step, the process lacks some of the more rigorous quality assurance and testing that occurs for content in the sensor release process.

It also lacks the customer control, explaining why the file was instantly applied to Windows endpoints running CrowdStrike.

CrowdStrike said it will fix this with more testing of these file types in future, including local developer testing, stress testing and stability testing.

It will also “implement a staggered deployment strategy … in which updates are gradually deployed to larger portions of the sensor base, starting with a canary deployment”; and “provide customers with greater control over the delivery of … updates by allowing granular selection of when and where these updates are deployed.”

CrowdStrike also committed to releasing a full root cause analysis once its investigations are complete.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
crowdstrikehowsecuritysoftware

Related Articles

  • GPS spoofers 'hack time' on commercial airlines, researchers say GPS spoofers 'hack time' on commercial airlines, researchers say
  • AGL runs retail technology transformation in two phases AGL runs retail technology transformation in two phases
  • In Pictures: Skybox and BT security roundtable In Pictures: Skybox and BT security roundtable
  • Browser vulnerability can be used to breach local networks Browser vulnerability can be used to breach local networks

Partner Content

Transforming Education: South Australia's Digital Identity Journey with Okta
Partner Content Transforming Education: South Australia's Digital Identity Journey with Okta
SOCO Reveals Microsoft AI with Power Platform Use Cases at Upcoming Government Event
Partner Content SOCO Reveals Microsoft AI with Power Platform Use Cases at Upcoming Government Event
‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World
Partner Content ‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World
Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
Partner Content Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration

Sponsored Whitepapers

Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
How to Put AI at the Heart of Business Growth
How to Put AI at the Heart of Business Growth
Streamline Your Processes and Reduce Managed File Transfer Expenses
Streamline Your Processes and Reduce Managed File Transfer Expenses
Maximise Your Azure Investment with Fusion5
Maximise Your Azure Investment with Fusion5
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance

Events

  • Integrate Integrate
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia's sweeping security uplift plans for myGov

Services Australia's sweeping security uplift plans for myGov

Medibank allegedly missed EDR alerts before data breach

Medibank allegedly missed EDR alerts before data breach

Northern Beaches Council reviews security stack to shore up widening perimeter

Northern Beaches Council reviews security stack to shore up widening perimeter

CrowdStrike rejects Delta Air Lines claims over outage

CrowdStrike rejects Delta Air Lines claims over outage

Digital Nation

State of Security 2023
State of Security 2023
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.