Page 73 - Cyber Defense eMagazine - September 2017
P. 73

Patching the Iron Tail is Easier Said than Done

               Challenges with Patching Industrial Control Systems Leave Significant Risk

               Everyone  knows  that  you  should  patch  your  application  servers  as  often  as  possible.  You
               should  also  brush  your  teeth,  eat  your  broccoli  and  call  you  mother.  But  all  good  intentions
               aside, we know that in practice, patching servers falls woefully behind in many organizations,
               even ones with efficient and security-minded IT. There are good reasons why patching gets put
               off – it’s often difficult, time consuming, disruptive, or even impossible.

               Given the substantial number of known and unknown vulnerabilities affecting users, applications
               and critical infrastructure, conventional wisdom is that patching vulnerabilities should be on the
               top of your security to-do list. But in reality, there is a disconnect between security strategies
               and  practical  reality.  According  the  Gartner,  “the  lofty  goal  of  ‘patch  everything,  all  the  time,
               everywhere’  is  not  only  rarely  fulfilled,  it  is  causing  friction  between  IT  security  and  IT
               operations.”


               The Hidden Costs of “Doing the Right Thing”
               The risks of falling behind on patching are highly publicized. For example, the recent WannaCry
               attacks exploited the Windows SMBv1 vulnerability, with the EternalBlue tools originally created by
               the NSA. This vulnerability affected Windows XP systems, which Microsoft would have you believe
               have all been long since retired, and no longer receive patches. Yet this attack and others like it,
               painfully  exposed the fact  that millions  of Windows XP  systems  are  still  running  legacy, mission-
               critical applications.

               This caused lots of soap-box lecturing that unpatched servers were the culprit, and organizations
               need  to  take  security  more  seriously.  But  this  kind  of  finger-pointing,  ignores  the  practical
               decision making and security tradeoffs that many businesses face. While no organization wants
               to be the victim of the next cyberattack, the abstract security fear can easily take a back seat to
               the more immediate labor and disruption costs of “doing the right thing”. Faced with this, even
               the most diligent teams find it easy to kick the can down the road, and deal with more immediate
               day-to-day priorities.

               In fact, in many cases, patching is viewed more as a liability, than a best practice. In areas like
               industrial control systems (ICS), and healthcare, the risk of unexpected results from patches,
               unpredictable downtime, or even forced system reboots can be enormous and are avoided if at
               all possible. In many industries where equipment is supposed to be “built to last” for 20+ years,
               the  use  of  out-of-date  and  un-patchable  operating  systems  (such  as  Windows  XP)  is
               widespread, and these legacy, embedded applications are difficult or impossible to upgrade.

               Frankly, it’s fair to question the premise that effective security should be dependent on constant
               patching. Despite decades of investment in security and patch management tools, the overall
               security situation seems to be getting worse – not better. Security based on best practices that
               routinely get ignored seems a best impractical, and at worst, delusional.





                    73   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   68   69   70   71   72   73   74   75   76   77   78