Patching – two critical Essential Eight mitigation strategies
A strong patching regime protects operating systems, applications and devices. It is critical preventative strategy. The Essential Eight Framework provides guidance on how you can establish this discipline and also how you can create a road map to build maturity in this area.
Let’s take a look at the complications of running an IT system that often lead to making bad patching decisions and explore a few ideas of how you can make improvements inside your own business.
Patching – Adversaries target vulnerabilities
Adversaries continue to exploit vulnerabilities within our systems and applications, and there is one very good reason why: we let them. If this continues, attackers will continue to be successful in their criminal endeavours. The Australian Centre for Cyber Security (ACSC) places the utmost importance on patching these vulnerabilities since they report countless examples of adversaries using these entry points to access extra sensitive data, and to persist their remote access activities within their targets. The 2020 Verizon Data Breach Investigations Report states that whilst organisations are getting better at patching, poor asset management can hide big problems; it is the forgotten assets that never get patched that can create dangerous holes in your defences.
Measure your security controls with the Essential 8 Auditor…. watch the 3.5 minute video
The Wannacry Lesson
WannaCry educated many on the importance of patch management and although it was an operating system vulnerability and relied on the appropriate patch not being installed, it demonstrated a shift in the timeframes we are used to. The amount of time between the patch’s release to address this known vulnerability and WannaCry’s release was significantly compressed. Microsoft released their patch in the March and WannaCry hit the news in the May of the same year. That’s just two months, which should now be considered the new norm.
This means that if application patches are not applied quickly, there is sufficient evidence to show that systems are at risk. Furthermore, the time available to complete your patching exercise is now under pressure, so security and infrastructure teams need to act fast.
The importance of risk assessment
One caveat that needs to be stated is that you need to complete a risk assessment before rushing out to patch everything. If, for example, the system in question is a medical allergies database, recording where patients have a lethal anaphylactic shock reaction when exposed to certain irritants, patching that at the wrong time could put patients at risk. This is an extreme example, but one to illustrate the severity of loss of some services, so prioritising this one over others in terms of patching is recommended.
Patching – What is it?
Patching is the systematic implementation of security updates and fixes to the applications and operating systems within your environment. These include commercial applications, such as Adobe Acrobat Reader, or custom in-house applications developed for a specific business purpose.
Tailor your patching to suit the environment
Your approach to patching can vary, depending on the nature of the application. Broadly speaking, applications with one or more of the following attributes prove difficult to continually update, so need careful planning and testing:
- Large geographical deployment;
- Heavily specialised application;
- Critical up-time requirements;
- Incredibly sensitive information.
The deployment window needs to be agreed by all stakeholders, and any outages need to be firmly approved before users lose functionality. Oftentimes, technical staff are asked to be available to support the patching team, should something go wrong, so scheduling needs to consider all people aspects too.
Even a small investment in planning will pay dividends when implementing and maturing your patch management process, so start with the plan and most issues will be eradicated.
Patching – Kickstart your regimen
The allergy database example has one or more of the attributes that complicate the patching process. Surgeons use this application to confirm whether someone has an allergy to anaesthetic drugs prior to surgery. If the service goes down at the wrong time, or if information is accidently altered through corruption, the impact could be disastrous. For this reason, the business often takes the ‘risk free’ option of not patching at all. However, security teams should state their case that the impact of a compromise could be much, much worse.
How to manage outliers
It is the outliers, the business-critical applications that must never go offline, that skew the business’s approach to patching. Success depends on the ability to leverage your business relationships and influence appropriate outcomes. The following steps assist in overcoming the blockers you’ll face when proposing a more mature application patching regime:
- Identify and categorise applications – the first step is to understand the nature of the applications within your environment. The Standard Operating Environment (SOE) team is often your best source of the truth when it comes to expertise in managing applications. Alternatively, check your Configuration Management Database (CMDB) as it should have all the supporting information you need to help you understand the application’s criticality. Lastly, you can talk to users and procurement teams to understand the importance of the service the application provides.
- Identify application owners – These are the key stakeholders within the process, who you should develop trust and build relationships with as you seek approval. However, if the outcome of the previous step is an unwieldy list, be mindful that approvals will eventually be required, so it may be necessary to organise delegated authority to a handful of key decision makers. Always seek to develop trust and build relationships.
- Consensus – Educate stakeholders and engender a universal understanding between application owners, risk managers, functional managers and users of the process, demonstrating that patching is not optional.
- Formally agree the patching window – The inability to negotiate an appropriate deployment window is often the primary reason why applications don’t get patched. It may be necessary to hold a workshop to reach an agreement. Avoid using standard change windows for this activity, as it increases the opportunity for objections due to other business imperatives.
- Socialise the outcomes – Once agreed, create a schedule of patching windows across a rolling monthly and yearly basis. This garners support across the business and provides the ability for other technical teams to plan around this activity.
- Baseline the applications – Utilising the list of applications from step 1, understand the versions of everything installed and what the target version is. This determines the extent of the work required to complete the upgrade.
- Raise changes with service management – Effective planning saves time. Raise the change with your service desk, giving enough notice to plan communications and draw attention to your schedules.
- Pilot deployment – Test patch deployment in a development (dev) environment prior to rolling out to production systems. If you don’t have a dev environment, roll the patches out to a small pilot group before you attempt general release.
- User Acceptance Testing (UAT) – Work with application owners and assign someone to do regression testing. Ensure tests are documented for predictable and repeatable outcomes.
- Detail and socialise the process and seek feedback – This step ensures stakeholders understand the process. It builds strong bonds and limits the opportunities for reprisal if something goes wrong.
- Improve and automate – If the patching process can be demonstrated as low risk, then make it less bureaucratic. Understand what tools can perform these activities and seek funding.
Patching – Practise makes perfect
If applications and operating systems aren’t patched, organisations remain vulnerable. However, patching with undue care can have catastrophic consequences. While the latter is bad, organisations remain paralysed by the rigour required to assess a patch’s impact, and unfortunately go without because it’s easier.
The reality of the situation is that there may be challenges to maturing your patching process, yet the more the process is practised the easier it becomes. Taking the easy option won’t protect you when the next version of WannaCry infects your business, so get your patching regime off the ground and keep your users and business safe.