The implications of this discrepancy are substantial. If the attackers had access to more applications than initially stated by Microsoft, the scope of the attack would be significantly broader, potentially providing deeper insights into the operations of Western governments. This raises concerns about cybersecurity and transparency, not only for Microsoft but also for other cloud service providers.
To address security concerns, Microsoft has committed to making 31 critical security logs available to all customers, irrespective of payment plans or tiers, including the email log used by the U.S. State Department to detect the intrusion. The duration of retention for security logs is also being extended from 90 to 180 days, with implementation expected in September 2023.
The incident has sparked extensive discussions, with cybersecurity experts emphasizing the urgency for application owners to update their Azure SDK and application cache to prevent further vulnerabilities.