Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

Six steps to effective patch management

  • John Livingston
  • May 2, 2022
Courtesy of: Verve Industrial
Courtesy of: Verve Industrial
Total
0
Shares
0
0
0
0

Patch management in an operational technology (OT)/industrial control system (ICS) setting is full of challenges. From proprietary hardware and software to a lack of staff, inadequate or non-existent testing equipment, and regulatory reporting and system maintenance, many organizations struggle to determine what is in scope. This results in unmanaged patches.

What is OT/ICS patch management?

Software patching is often thought of as a basic cyber security process. On the surface, it appears to be a straightforward practice: simply apply updates to your OT systems.

The software updates are provided by the vendors that are intended to close any security or functional holes in your systems. This is so basic on paper that it is often overlooked or neglected by many security teams and system operators.

Patch management is defined as a comprehensive cycle of ensuring baseline data, identifying available patches and known vulnerabilities, reviewing patches for applicability and OEM-vendor approval, designing deployment or mitigation strategies, executing patch deployment and confirmation and re-establishing baselines.

But as it turns out, patching is not so straightforward after all.  In fact, it is likely the single most time-consuming task that the North American power industry faces in adhering to regulatory expectations.

This is due to a combination of factors, most notably:

  • Lack of automatic inventory/monitoring of end systems
  • Difficulty in monitoring patch releases for all systems/applications
  • Time and expertise to review, approve or mitigate patches in a workflow
  • Testing and individually assigning patches to groups of endpoints
  • Time to deploy on each device and confirm update working as appropriate
  • Time to document changes and update baselines

Because of these patch management challenges, we created a six-step, end-to-end patching process. These will significantly reduce the time and complexity and improve the quality and compliance-readiness by integrating each of the critical steps in a single-flow process.

Six steps to effective OT/ICS patch management

Step 1: Establish baseline OT asset inventory

The first problem many organizations face is gathering a comprehensive asset inventory to understand what assets they have plugged in, where they are located, and what software is deployed.  Some organizations have managed to compile a reasonable list of assets, either manually or through the extension of existing corporate tools or agent-based technologies.

However, almost all industrial operator networks struggle to connect on a regular basis (let alone automatically) to the non-Windows machines. In a typical operational network, these proprietary systems constitute up to 75% of all assets.

Step 2: Gather software patch and vulnerability information

The second challenge is the ability to monitor what patches are available and required. The core components of Windows, Linux, Unix, Office, and other products like Adobe are straightforward (either from Microsoft or the OEM vendor-approved MS patches). Third-party apps, however, usually require a manual review of the vendor’s website to look for new updates.

Operators need to research patches to determine what, if any, security components are addressed. The sheer volume of these apps makes the task exponentially difficult. In fact, one of our clients in the power industry is currently monitoring just under 300 third-party apps that fall into this category at just one facility.

But patch availability is only half of the equation. Effective patch management requires robust vulnerability assessment capabilities. Traditional IT tools with scan-based approaches are not effective and/or safe for OT/ICS systems due to the sensitive nature of the devices and their firmware

Therefore, a specific OT/ICS vulnerability assessment is required to use the data available from the robust software and asset inventory described above.

Step 3: Identify vulnerability relevancy and filter to assign to endpoints

One of the most challenging elements of patching is using the asset inventory to determine which assets should apply which updates – or filtering in other words.

Many companies gather lists of potential patches available for software, but linking it back to assets to ensure whether that particular patch is relevant becomes a logistical headache and labor burden.

Step 4: Review, approve and mitigate patch management

Many patch management processes end there and leave the approval and action to another set of tools or processes.

Step 5: Test and deploy vulnerability patches

Testing software patches in cybersecurity is often a luxury that clients do not have time to conduct.

Many people manage the administrative review and approval of patches then leave it to engineers to support and manage the deployment of the approved packages, allowing company staff to focus on their operational tasks instead of repetitive compliance tasks.

Step 6: Profile and document systems pre- and post-patching

One of the more tedious regulatory and managerial tasks related to patch management is the requirement to baseline systems before and after the application of a patch. Any changes to that baseline need to be captured and entered into corporate change management workflows in order to secure the new configuration and maintain compliance.

– This originally appeared on Verve Industrial’s website. Verve Industrial is a CFE Media and Technology content partner.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

John Livingston

John Livingston, CEO, Verve Industrial.

Related Topics
  • CFE Content
  • Featured
Previous Article
Courtesy of: Verve Industrial
  • IT/OT

Four benefits of OT endpoint security asset management

  • Rick Kaun
  • April 29, 2022
Read More
Next Article
SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
  • Networks

IDS developed for industrial control systems

  • Southwest Research Institute
  • May 3, 2022
Read More
You May Also Like
Courtesy of CFE Media and Technology
Read More

Three risks to consider before taking your business’s accounting to the cloud

Courtesy: Brett Sayles
Read More

Technique offers faster security for non-volatile memory tech

Read More

How industrial control systems can be secure in the cloud

Image of IT/OT convergence on a control panel
Read More

New concepts to reduce the risk of ransomware in IIoT environments

Courtesy: CFE Media and Technology
Read More

How to mitigate cloud security threats

Read More

IoT security: The threat before us

Courtesy: EU Automation
Read More

Is your IoT network putting you at risk of cyberattack?

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More

Securing cloud data is a challenge for many companies

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT