PATCHING LESSONS LEARNED: An Interesting Perspective WHO WE ARE - - - PowerPoint PPT Presentation

patching lessons learned an interesting perspective who
SMART_READER_LITE
LIVE PREVIEW

PATCHING LESSONS LEARNED: An Interesting Perspective WHO WE ARE - - - PowerPoint PPT Presentation

Cyber Security | Compliance | Industrial Computing PATCHING LESSONS LEARNED: An Interesting Perspective WHO WE ARE - MISSION We ensure the success of our customers by developing innovative technology solutions that optimize and protect


slide-1
SLIDE 1

Cyber Security | Compliance | Industrial Computing

PATCHING LESSONS LEARNED: An Interesting Perspective

slide-2
SLIDE 2

WHO WE ARE -

MISSION

We ensure the success of our customers by developing innovative technology solutions that optimize and protect critical infrastructure

HISTORY

4 Company was started in 1981. Happy 36th birthday to us! 4 25+ years of experience in the design, manufacture, and lifecycle management of industrial HMIs and SCADA devices 4 11+ years of experience working with cyber security in the energy industry 4 ISO 9001:2008 certified 4 In 2013, we were awarded a $4.3M cooperative agreement by the Department of Energy in the Cybersecurity for Energy Delivery Systems (CEDS) Program 4 In 2014, we merged the computing and cyber security businesses under the name of FoxGuard Solutions 4 Total employees = ~110

Cyber Security | Compliance | Industrial Computing 2

www.foxguardsolutions.com

slide-3
SLIDE 3

WHAT WE DO - FoxGuard serves as a solution provider for mission-critical applications in Critical Infrastructure and Key Resource (CIKR) sectors. Our Solutions Fall Into Three Primary Categories: 1. Cyber Security 2. Compliance 3. Industrial Computing Hardware

Cyber Security | Compliance | Industrial Computing 3

www.foxguardsolutions.com

slide-4
SLIDE 4

PATCH & UPDATE MANAGEMENT PROGRAM -

Patch & Update Data Aggregator/Web Portal

4 Provides users a with single location to find information about patches and updates applicable to energy delivery industrial control system devices 4 The portal serves as a repository for Hash Authentication information, patch discovery evidence and device End of Support (EOS) documentation

Patch & Update Authentication

4 Our aggregated Hash Files from vendors provide users a central location to help verify the integrity of downloaded patches and updates prior to deployment 4 The Hash Authentication Tool allows customers receiving aggregated patch data via customized reports to authenticate that reports have not been compromised

Validation Techniques

4 Provides users with proven methodologies to validate patches and updates before deployment 4 Users may self-perform, set up their own validation lab, contract validation services or take a combined approach

Query Engine

4 The Query Engine will support multiple device types and across various energy delivery ICS vendors 4 Enables users to query IT and OT equipment to determine relevant baseline information such as Make, Model, Firmware Version and Serial Number – this information is critical for accurate patch discovery 4 The Query Engine will offer an easy to use user interface supporting a Patch Gap Analysis Dashboard simplifying the process of determining your current patch status and gaps Cyber Security | Compliance | Industrial Computing 4

www.foxguardsolutions.com

slide-5
SLIDE 5

PATCH & UPDATE MANAGEMENT PROGRAM -

Cyber Security | Compliance | Industrial Computing 5

www.foxguardsolutions.com

slide-6
SLIDE 6

FOXGUARD SECURITY SOLUTIONS AROUND THE WORLD

4 FoxGuard Solutions builds customized programs that function as an extension of the customer’s organization, enabling them to provide easy to use, easy to manage cyber security to their controls while ensuring their reliability. 4 FoxGuard is currently managing & 114 Companies 181 Sites 36 States 30 Countries

Cyber Security | Compliance | Industrial Computing 6

www.foxguardsolutions.com

slide-7
SLIDE 7

COMPANIES USING FOXGUARD -

Cyber Security | Compliance | Industrial Computing 7

www.foxguardsolutions.com

slide-8
SLIDE 8
  • PATCHING. -

How Hard Can It Be? -

Harder than you think. Trust us. &

Cyber Security | Compliance | Industrial Computing 8

www.foxguardsolutions.com

slide-9
SLIDE 9

WHAT IS A PATCH? -

P A T C H UPDATE UPGRADE FIRMWARE ENHANCEMENT SERVICE BULLETIN

– Feature Enhancements And / Or Security Patches – Focus Is On The Security Patches, As These Address Vulnerabilities To Their

Company (Not To Mention Compliance Requirements)

Cyber Security | Compliance | Industrial Computing 9 www.foxguardsolutions.com

slide-10
SLIDE 10

WHAT NEEDS PATCHES & UPDATES - OPERATING 3RD PARTY SYSTEMS APPLICATIONS NETWORK DEVICES FIELD DEVICES SUPPORTED ASSETS

Cyber Security | Compliance | Industrial Computing 10 www.foxguardsolutions.com

slide-11
SLIDE 11

WHY? - Why is Patch Management important? -

4 Energy Utilities are high-risk targets 4 Patches are crucial

4 189 known vulnerabilities in ICS in 2015* 4 26 had exploits available* 4 170 had patches available*

4 NERC CIP says so

4 CIP-007-6 R2.1, R2.2, R2.3, R2.4 4 Large fines for failure to comply

*Kaspersky Labs Industrial Control Systems Vulnerabilities Statistics

Cyber Security | Compliance | Industrial Computing 11

www.foxguardsolutions.com

slide-12
SLIDE 12

THE STRUGGLE -

Current State

4 Existing solutions: 4 Are fragmented with limited coverage 4 Do not provide standardized actionable output 4 Have widely varying capability sets 4 Changing/increasing compliance scope

Cyber Security | Compliance | Industrial Computing 12 www.foxguardsolutions.com

slide-13
SLIDE 13

COMPLIANCE VS. SECURITY -

Compliance -

Cyber Security | Compliance | Industrial Computing 13

www.foxguardsolutions.com

slide-14
SLIDE 14

COMPLIANCE VS. SECURITY -

Compliance -

Cyber Security | Compliance | Industrial Computing 14

www.foxguardsolutions.com

slide-15
SLIDE 15

COMPLIANCE VS. SECURITY -

Cyber Security | Compliance | Industrial Computing 15

www.foxguardsolutions.com

slide-16
SLIDE 16

COMPLIANCE VS. SECURITY -

Compliance -

Cyber Security | Compliance | Industrial Computing 16

www.foxguardsolutions.com

slide-17
SLIDE 17

COMPLIANCE VS. SECURITY - Security

4 Installing patches mitigates risks from vulnerabilities 4 Increased reliability of services may occur as a result of patching 4 “Air-gapped” is not enough 4 Compliance only mandates “security patches” be installed, but non-security

patches may offer functionality that leads to security features.

4 Near real-time application of patches and/or mitigation 4 Zero Day is a real thing. (Forever Day is a real thing too. Security holes that

remain unpatched. – Unfixed vulnerabilities – usually with legacy applications.)

Cyber Security | Compliance | Industrial Computing 17

www.foxguardsolutions.com

slide-18
SLIDE 18

LESSON #1 - Understanding IT vs. OT is Critical

4 OT devices are not and SHOULD NOT be treated as IT devices

– Need expertise to understand and manage the differences &

4 Not all vendors report current patch status every month so you

must contact them directly. (Keep track of these vendors.)

4 Regular patch notification for some OT vendors is a new &

concept &

Cyber Security | Compliance | Industrial Computing 18 www.foxguardsolutions.com

slide-19
SLIDE 19

LESSON #2 - Public AND Private Patches – Which are Which?

4 Approximately half of all EDS have “Private” patches 4 Not readily available on the Internet 4 Must securely track credentials 4 Understand requirements for obtaining this information 4 Private Portal, Current Support Contract, Call,

Newsletter, etc.

Cyber Security | Compliance | Industrial Computing 19 www.foxguardsolutions.com

slide-20
SLIDE 20

LESSON #3 - Patch Analysis Accuracy is Difficult -

4 Documenting the process (where to go, how to mine, etc.) is an

  • n-going effort

4 The mining procedure changes with each vendor 4 Vendors are known to change their process 4 Some products can be intricate and time consuming to find details 4 Ex. Cisco – 4 Security bugs are listed individually 4 Security ratings are buried within Release Notes 4 Multiple CVE’s may be listed

Cyber Security | Compliance | Industrial Computing 20

www.foxguardsolutions.com

slide-21
SLIDE 21

LESSON #3 -

Cyber Security | Compliance | Industrial Computing 21

www.foxguardsolutions.com

slide-22
SLIDE 22

LESSON #4 - Asset Analysis is Complicated

4 On-Going effort – Keeping it “current” is hard 4 Sub-components 4 Numerous distinct software packages on HMI/SCADA devices 4 Vendor Ownership of Asset (may have many vendors that distribute a &

product) &

4 Support Provider (may be different from initial Vendor) 4 Obtaining sufficient information in order to patch properly 4 IT Contractors may help but are not bullet proof 4 Aggregate lists may not be sufficient – Each asset may be different, even if

it seems the same (i.e., serial number, patch status)

Cyber Security | Compliance | Industrial Computing 22

www.foxguardsolutions.com

slide-23
SLIDE 23

LESSON #4 -

Cyber Security | Compliance | Industrial Computing 23

www.foxguardsolutions.com

slide-24
SLIDE 24

LESSON #5 - Security vs. Non-Security Determination takes Knowledge -

4 Not all vendors provide security rating 4 Need the resources and expertise to determine, if a vendor doesn’t

provide

4 CVE Information and CVSS Scores are helpful, but are not always

provided &

4 Vulnerabilities are not always updated by the vendor

Cyber Security | Compliance | Industrial Computing 24 www.foxguardsolutions.com

slide-25
SLIDE 25

LESSON #6 - A Patch is not a Patch is not a Patch

4 Several types of patches: 4 Cumulative – One installation includes previous installation (Microsoft’s

new model)

4 Independent – Each patch can be installed independent from others

(Current patch status may be difficult to track)

4 Primary/Dependent – Must have a previous installation before installing

the latest (Keep track of what installed)

4 Patches can be changed/rereleased/retracted 4 Back Dating patches is possible (Vendor releases today but is dated three

months ago.)

Cyber Security | Compliance | Industrial Computing 25 www.foxguardsolutions.com

slide-26
SLIDE 26

LESSON #6 -

October 24, 2016 Three Patches December 2, 2016

Cyber Security | Compliance | Industrial Computing 26 www.foxguardsolutions.com

slide-27
SLIDE 27

LESSON #6 -

October 24, 2016 Four Patches December 28, 2016

Cyber Security | Compliance | Industrial Computing 27 www.foxguardsolutions.com

slide-28
SLIDE 28

LESSON #7 - Maintaining Evidence is Hard

4 Types of Documentation 4 Patch Documentation 4 Proof you checked 4 Record status at the time you checked 4 EOS Documentation 4 Not every product lives forever 4 Audit-ready documentation must be created 4 Indicate change in status over the course of product lifetime 4 Time Consuming 4 What is appropriate – “Audit-worthy” 4 Maintaining – Keeping up to date, as well as storage of documents 4 Audit trail

Cyber Security | Compliance | Industrial Computing 28 www.foxguardsolutions.com

slide-29
SLIDE 29

LESSON #8 - Your Calendar with Many Sources is Timely to Manage -

Cyber Security | Compliance | Industrial Computing 29 www.foxguardsolutions.com

slide-30
SLIDE 30

LESSON #9 - Time & Resource Intensive

4 Patch Discovery takes MANY hours every month 4 Contact vendors 4 Who to call? 4 Email? 4 Website? 4 Newsletter? 4 Automatically provided? 4 Maintain timeline for each vendor – 35 days? 4 Documentation, documentation, documentation

Cyber Security | Compliance | Industrial Computing 30 www.foxguardsolutions.com

slide-31
SLIDE 31

LESSON #10 - Validation is Intricate

4 Scope 4 What to test, What level of detail (registry change applied to which

patch, file versions, specific changes in a shared XML file, etc.

4 Resources 4 People -Need the right people with the right training to understand this

process

4 Equipment – Needs to have access to a representative system

(production/lab, physical/virtual

4 Test Equipment – Need equipment different from what you need in &

production in order to test the system &

Cyber Security | Compliance | Industrial Computing 31 www.foxguardsolutions.com

slide-32
SLIDE 32

LESSON #10 - Validation Standard

Cyber Security | Compliance | Industrial Computing 32 www.foxguardsolutions.com

slide-33
SLIDE 33

WHY YOU SHOULD CARE? - The Risks:

4 Safety: 4 Improperly Patched - “Brick” a device or Create a false sense of

security

4 Temporal Vulnerability with a missed patch – The longer you go

without patching, the greater your vulnerability/risk

4 Reliability: 4 Impact on The Grid? Reliability is critical. 4 Efficiency: 4 Stay focused on the job at hand and leave patching to the experts 4 Compliance Risks – Fines for non-compliance

Cyber Security | Compliance | Industrial Computing 33 www.foxguardsolutions.com

slide-34
SLIDE 34

ONE MORE TIME - The Lessons:

4 Understanding IT vs. OT is Critical 4 Public AND Private Patches – Which are Which? 4 Patch Analysis Accuracy is Difficult 4 Asset Analysis is Complicated 4 Security vs. Non-Security Determination takes Knowledge 4 A Patch is not a Patch is not a Patch 4 Maintaining Evidence is Hard 4 Your Calendar with Many Sources is Timely to Manage 4 Time & Resource Intensive 4 Validation is Intricate

IS YOUR PROGRAM ORGANIZED? ARE YOU READY?

Cyber Security | Compliance | Industrial Computing 34 www.foxguardsolutions.com

slide-35
SLIDE 35

THE BENEFITS OF A HEALTHY PATCHING PROGRAM

End User Benefits

4 Centralizes patch and update information 4 Supports programmatic equipment querying using automation and a common toolset 4 Simplifies association between software and available patches / updates 4 Lower cost with scalability of the program 4 More accurate information 4 Recurring delivery of information

Cyber Security Advancements

4 Promotes end user awareness around patching, presence of vulnerabilities and

change management processes &

4 Provides common security classification in absence of vendor classification 4 Considers named sub-components and libraries to provide more comprehensive

security assessment &

4 Reduces likelihood of incorrect patch application 4 Standardizes presentation of patch information to end user

Cyber Security | Compliance | Industrial Computing 35 www.foxguardsolutions.com

slide-36
SLIDE 36

QUESTIONS? -

QUESTIONS?

FoxGuard Solutions Offers:

4 Patch Management 4 Security Services 4 Integrated Security Solutions 4 Industrial Computers 4 And Many Other Custom Solutions

For more information please contact:

Michele Wright Lindsey Hale Product Manager Program Manager (540) 382 – 4234 x244 (540) 382 – 4234 x108 mwright@foxguardsolutions.com lhale@foxguardsolutions.com Cyber Security | Compliance | Industrial Computing 36

www.foxguardsolutions.com

slide-37
SLIDE 37

NEED MORE HELP -

Cyber Security | Compliance | Industrial Computing 37

www.foxguardsolutions.com

WANT TO LEARN MORE?