patching lessons learned an interesting perspective who
play

PATCHING LESSONS LEARNED: An Interesting Perspective WHO WE ARE - - PowerPoint PPT Presentation

Cyber Security | Compliance | Industrial Computing PATCHING LESSONS LEARNED: An Interesting Perspective WHO WE ARE - MISSION We ensure the success of our customers by developing innovative technology solutions that optimize and protect


  1. Cyber Security | Compliance | Industrial Computing PATCHING LESSONS LEARNED: An Interesting Perspective

  2. WHO WE ARE - MISSION We ensure the success of our customers by developing innovative technology solutions that optimize and protect critical infrastructure HISTORY 4 Company was started in 1981. Happy 36 th birthday to us! 4 25+ years of experience in the design, manufacture, and lifecycle management of industrial HMIs and SCADA devices 4 11+ years of experience working with cyber security in the energy industry 4 ISO 9001:2008 certified 4 In 2013, we were awarded a $4.3M cooperative agreement by the Department of Energy in the Cybersecurity for Energy Delivery Systems (CEDS) Program 4 In 2014, we merged the computing and cyber security businesses under the name of FoxGuard Solutions 4 Total employees = ~110 www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 2

  3. WHAT WE DO - FoxGuard serves as a solution provider for mission-critical applications in Critical Infrastructure and Key Resource (CIKR) sectors. Our Solutions Fall Into Three Primary Categories: 1. Cyber Security 2. Compliance 3. Industrial Computing Hardware www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 3

  4. PATCH & UPDATE MANAGEMENT PROGRAM - Patch & Update Data Aggregator/Web Portal Provides users a with single location to find information about patches and updates applicable to 4 energy delivery industrial control system devices The portal serves as a repository for Hash Authentication information, patch discovery evidence and 4 device End of Support (EOS) documentation Patch & Update Authentication Our aggregated Hash Files from vendors provide users a central location to help verify the integrity of 4 downloaded patches and updates prior to deployment The Hash Authentication Tool allows customers receiving aggregated patch data via customized reports 4 to authenticate that reports have not been compromised Validation Techniques Provides users with proven methodologies to validate patches and updates before deployment 4 Users may self-perform, set up their own validation lab, contract validation services or take a combined 4 approach Query Engine The Query Engine will support multiple device types and across various energy delivery ICS vendors 4 Enables users to query IT and OT equipment to determine relevant baseline information such as Make, 4 Model, Firmware Version and Serial Number – this information is critical for accurate patch discovery The Query Engine will offer an easy to use user interface supporting a Patch Gap Analysis Dashboard 4 simplifying the process of determining your current patch status and gaps www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 4

  5. PATCH & UPDATE MANAGEMENT PROGRAM - www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 5

  6. FOXGUARD SECURITY SOLUTIONS AROUND THE WORLD 4 FoxGuard Solutions builds customized programs that function as an extension of the customer’s organization, enabling them to provide easy to use, easy to manage cyber security to their controls while ensuring their reliability. 4 FoxGuard is currently managing & 114 Companies 181 Sites 36 States 30 Countries www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 6

  7. COMPANIES USING FOXGUARD - www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 7

  8. PATCHING. - How Hard Can It Be? - Harder than you think. Trust us. & www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 8

  9. WHAT IS A PATCH? - UPDATE P A UPGRADE T FIRMWARE ENHANCEMENT C H SERVICE BULLETIN – Feature Enhancements And / Or Security Patches – Focus Is On The Security Patches, As These Address Vulnerabilities To Their Company (Not To Mention Compliance Requirements) www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 9

  10. WHAT NEEDS PATCHES & UPDATES - OPERATING 3 RD PARTY SYSTEMS APPLICATIONS SUPPORTED ASSETS NETWORK FIELD DEVICES DEVICES www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 10

  11. WHY? - Why is Patch Management important? - 4 Energy Utilities are high-risk targets 4 Patches are crucial 4 189 known vulnerabilities in ICS in 2015* 4 26 had exploits available* 4 170 had patches available* 4 NERC CIP says so 4 CIP-007-6 R2.1, R2.2, R2.3, R2.4 4 Large fines for failure to comply *Kaspersky Labs Industrial Control Systems Vulnerabilities Statistics www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 11

  12. THE STRUGGLE - Current State 4 Existing solutions: 4 Are fragmented with limited coverage 4 Do not provide standardized actionable output 4 Have widely varying capability sets 4 Changing/increasing compliance scope www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 12

  13. COMPLIANCE VS. SECURITY - Compliance - www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 13

  14. COMPLIANCE VS. SECURITY - Compliance - www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 14

  15. COMPLIANCE VS. SECURITY - www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 15

  16. COMPLIANCE VS. SECURITY - Compliance - www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 16

  17. COMPLIANCE VS. SECURITY - Security 4 Installing patches mitigates risks from vulnerabilities 4 Increased reliability of services may occur as a result of patching 4 “Air-gapped” is not enough 4 Compliance only mandates “security patches” be installed, but non-security patches may offer functionality that leads to security features. 4 Near real-time application of patches and/or mitigation 4 Zero Day is a real thing. (Forever Day is a real thing too. Security holes that remain unpatched. – Unfixed vulnerabilities – usually with legacy applications.) www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 17

  18. LESSON #1 - Understanding IT vs. OT is Critical 4 OT devices are not and SHOULD NOT be treated as IT devices – Need expertise to understand and manage the differences & 4 Not all vendors report current patch status every month so you must contact them directly. (Keep track of these vendors.) 4 Regular patch notification for some OT vendors is a new & concept & www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 18

  19. LESSON #2 - Public AND Private Patches – Which are Which? 4 Approximately half of all EDS have “Private” patches 4 Not readily available on the Internet 4 Must securely track credentials 4 Understand requirements for obtaining this information 4 Private Portal, Current Support Contract, Call, Newsletter, etc. www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 19

  20. LESSON #3 - Patch Analysis Accuracy is Difficult - 4 Documenting the process (where to go, how to mine, etc.) is an on-going effort 4 The mining procedure changes with each vendor 4 Vendors are known to change their process 4 Some products can be intricate and time consuming to find details 4 Ex. Cisco – 4 Security bugs are listed individually 4 Security ratings are buried within Release Notes 4 Multiple CVE’s may be listed www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 20

  21. LESSON #3 - www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 21

  22. LESSON #4 - Asset Analysis is Complicated 4 On-Going effort – Keeping it “current” is hard 4 Sub-components 4 Numerous distinct software packages on HMI/SCADA devices 4 Vendor Ownership of Asset (may have many vendors that distribute a & product) & 4 Support Provider (may be different from initial Vendor) 4 Obtaining sufficient information in order to patch properly 4 IT Contractors may help but are not bullet proof 4 Aggregate lists may not be sufficient – Each asset may be different, even if it seems the same (i.e., serial number, patch status) www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 22

  23. LESSON #4 - www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 23

  24. LESSON #5 - Security vs. Non-Security Determination takes Knowledge - 4 Not all vendors provide security rating 4 Need the resources and expertise to determine, if a vendor doesn’t provide 4 CVE Information and CVSS Scores are helpful, but are not always provided & 4 Vulnerabilities are not always updated by the vendor www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 24

  25. LESSON #6 - A Patch is not a Patch is not a Patch 4 Several types of patches: 4 Cumulative – One installation includes previous installation (Microsoft’s new model) 4 Independent – Each patch can be installed independent from others (Current patch status may be difficult to track) 4 Primary/Dependent – Must have a previous installation before installing the latest (Keep track of what installed) 4 Patches can be changed/rereleased/retracted 4 Back Dating patches is possible (Vendor releases today but is dated three months ago.) www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 25

  26. LESSON #6 - October 24, 2016 Three Patches December 2, 2016 www.foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend