Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
A strong patching regime protects operating systems, applications and devices. It is critical preventative strategy. The Essential Eight Framework provides guidance on how you can establish this discipline and also how you can create a road map to build maturity in this area.
Let’s take a look at the complications of running an IT system that often lead to making bad patching decisions and explore a few ideas of how you can make improvements inside your own business.
Adversaries continue to exploit vulnerabilities within our systems and applications, and there is one very good reason why: we let them. If this continues, attackers will continue to be successful in their criminal endeavours. The Australian Centre for Cyber Security (ACSC) places the utmost importance on patching these vulnerabilities since they report countless examples of adversaries using these entry points to access extra sensitive data, and to persist their remote access activities within their targets. The 2020 Verizon Data Breach Investigations Report states that whilst organisations are getting better at patching, poor asset management can hide big problems; it is the forgotten assets that never get patched that can create dangerous holes in your defences.
WannaCry educated many on the importance of patch management and although it was an operating system vulnerability and relied on the appropriate patch not being installed, it demonstrated a shift in the timeframes we are used to. The amount of time between the patch’s release to address this known vulnerability and WannaCry’s release was significantly compressed. Microsoft released their patch in the March and WannaCry hit the news in the May of the same year. That’s just two months, which should now be considered the new norm.
This means that if application patches are not applied quickly, there is sufficient evidence to show that systems are at risk. Furthermore, the time available to complete your patching exercise is now under pressure, so security and infrastructure teams need to act fast.
One caveat that needs to be stated is that you need to complete a risk assessment before rushing out to patch everything. If, for example, the system in question is a medical allergies database, recording where patients have a lethal anaphylactic shock reaction when exposed to certain irritants, patching that at the wrong time could put patients at risk. This is an extreme example, but one to illustrate the severity of loss of some services, so prioritising this one over others in terms of patching is recommended.
Patching is the systematic implementation of security updates and fixes to the applications and operating systems within your environment. These include commercial applications, such as Adobe Acrobat Reader, or custom in-house applications developed for a specific business purpose.
Your approach to patching can vary, depending on the nature of the application. Broadly speaking, applications with one or more of the following attributes prove difficult to continually update, so need careful planning and testing:
The deployment window needs to be agreed by all stakeholders, and any outages need to be firmly approved before users lose functionality. Oftentimes, technical staff are asked to be available to support the patching team, should something go wrong, so scheduling needs to consider all people aspects too.
Even a small investment in planning will pay dividends when implementing and maturing your patch management process, so start with the plan and most issues will be eradicated.
The allergy database example has one or more of the attributes that complicate the patching process. Surgeons use this application to confirm whether someone has an allergy to anaesthetic drugs prior to surgery. If the service goes down at the wrong time, or if information is accidently altered through corruption, the impact could be disastrous. For this reason, the business often takes the ‘risk free’ option of not patching at all. However, security teams should state their case that the impact of a compromise could be much, much worse.
It is the outliers, the business-critical applications that must never go offline, that skew the business’s approach to patching. Success depends on the ability to leverage your business relationships and influence appropriate outcomes. The following steps assist in overcoming the blockers you’ll face when proposing a more mature application patching regime:
If applications and operating systems aren’t patched, organisations remain vulnerable. However, patching with undue care can have catastrophic consequences. While the latter is bad, organisations remain paralysed by the rigour required to assess a patch’s impact, and unfortunately go without because it’s easier.
The reality of the situation is that there may be challenges to maturing your patching process, yet the more the process is practised the easier it becomes. Taking the easy option won’t protect you when the next version of WannaCry infects your business, so get your patching regime off the ground and keep your users and business safe.
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.