Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
A strong patching regime protects operating systems, applications and devices. It is critical preventative strategy. The Essential Eight Framework provides guidance on how you can establish this discipline and also how you can create a road map to build maturity in this area.
Let’s take a look at the complications of running an IT system that often lead to making bad patching decisions and explore a few ideas of how you can make improvements inside your own business.
Adversaries continue to exploit vulnerabilities within our systems and applications, and there is one very good reason why: we let them. If this continues, attackers will continue to be successful in their criminal endeavours. The Australian Centre for Cyber Security (ACSC) places the utmost importance on patching these vulnerabilities since they report countless examples of adversaries using these entry points to access extra sensitive data, and to persist their remote access activities within their targets. The 2020 Verizon Data Breach Investigations Report states that whilst organisations are getting better at patching, poor asset management can hide big problems; it is the forgotten assets that never get patched that can create dangerous holes in your defences.
WannaCry educated many on the importance of patch management and although it was an operating system vulnerability and relied on the appropriate patch not being installed, it demonstrated a shift in the timeframes we are used to. The amount of time between the patch’s release to address this known vulnerability and WannaCry’s release was significantly compressed. Microsoft released their patch in the March and WannaCry hit the news in the May of the same year. That’s just two months, which should now be considered the new norm.
This means that if application patches are not applied quickly, there is sufficient evidence to show that systems are at risk. Furthermore, the time available to complete your patching exercise is now under pressure, so security and infrastructure teams need to act fast.
One caveat that needs to be stated is that you need to complete a risk assessment before rushing out to patch everything. If, for example, the system in question is a medical allergies database, recording where patients have a lethal anaphylactic shock reaction when exposed to certain irritants, patching that at the wrong time could put patients at risk. This is an extreme example, but one to illustrate the severity of loss of some services, so prioritising this one over others in terms of patching is recommended.
Patching is the systematic implementation of security updates and fixes to the applications and operating systems within your environment. These include commercial applications, such as Adobe Acrobat Reader, or custom in-house applications developed for a specific business purpose.
Your approach to patching can vary, depending on the nature of the application. Broadly speaking, applications with one or more of the following attributes prove difficult to continually update, so need careful planning and testing:
The deployment window needs to be agreed by all stakeholders, and any outages need to be firmly approved before users lose functionality. Oftentimes, technical staff are asked to be available to support the patching team, should something go wrong, so scheduling needs to consider all people aspects too.
Even a small investment in planning will pay dividends when implementing and maturing your patch management process, so start with the plan and most issues will be eradicated.
The allergy database example has one or more of the attributes that complicate the patching process. Surgeons use this application to confirm whether someone has an allergy to anaesthetic drugs prior to surgery. If the service goes down at the wrong time, or if information is accidently altered through corruption, the impact could be disastrous. For this reason, the business often takes the ‘risk free’ option of not patching at all. However, security teams should state their case that the impact of a compromise could be much, much worse.
It is the outliers, the business-critical applications that must never go offline, that skew the business’s approach to patching. Success depends on the ability to leverage your business relationships and influence appropriate outcomes. The following steps assist in overcoming the blockers you’ll face when proposing a more mature application patching regime:
If applications and operating systems aren’t patched, organisations remain vulnerable. However, patching with undue care can have catastrophic consequences. While the latter is bad, organisations remain paralysed by the rigour required to assess a patch’s impact, and unfortunately go without because it’s easier.
The reality of the situation is that there may be challenges to maturing your patching process, yet the more the process is practised the easier it becomes. Taking the easy option won’t protect you when the next version of WannaCry infects your business, so get your patching regime off the ground and keep your users and business safe.
The UK market has its own regulators, security standards and challenges. And while rulings from SEC in the US or the Australian Prudential Regulation Authority (APRA) in Australia don’t apply to UK companies, for the most part, the observations are undoubtedly relevant and the resulting advice instructive. It would be wrong to think UK financial […]Read more
<<< Part 2a: Australia’s Essential Eight: Beyond Endpoint Control <<< Part 2b: Activating UK NCSC & US NIST Guidelines: Beyond Endpoint Control Part 4: Systematic Measurement of Cyber Controls >>> As much as we invest into cyber security controls, external threats are inevitable. In a recent Notifiable Data Breaches Report from the Office of the […]Read more
Keen campers, scouts and even the Swiss Army know – that a good penknife is indispensable. This simple device has mitigated many a disaster at one point in time or another. Whether it’s to cut through a bit of string, tighten a screw or simply to solve the problem of no bottle opener in the […]Read more
Supply chain risk is an area of cyber security that demands the ongoing attention of every enterprise; because it can make the difference between being resilient or not. It’s no surprise that insurers warn that the vulnerability of supply chains is potentially a systemic risk that can quickly propagate across supply chain dominated industries. Organisations […]Read more
It took a “tripartite cyber assessment” by the Australian Prudential Regulation Authority (APRA) to identify that a sample of financial organisations had inadequate cyber security: poor security control management, a lack of business recovery planning and inadequate 3rd party risk assessment. Why were there gaps? Where is the failure? Clearly the common practice of unsubstantiated […]Read more
The discussion over data-driven vs qualitative cyber security assessment has been going for some time. Nowadays, it is at the top of the priority list for many security and senior executive teams. Managing cyber security has always been a noble ambition but without reliable measurement, the lack of actionable information makes evidence-based management decisions almost […]Read more
Attack Surface Management (ASM) characterises a business’s security risks as the monitoring and risk mitigation of a constantly changing and vulnerable “risk-surface”. Importantly, this attack surface extends to both internal and external assets and services. Some ASM solutions deliver clear visibility across both Internet facing and internal assets. Others do not. Instead, they assess external […]Read more
The UK Government has released its annual “Cyber Security Breaches Survey 2023”. It provides some valuable insights into how cyber security is currently being managed in the UK, by a range of organisations. It also speaks to how current competing economic priorities are impacting the effectiveness of some cyber security management efforts. The full report […]Read more
Solving the mismatch between cyber security reporting and directors’ requirements You are undoubtedly familiar with the headlines; you may have even become in part desensitised to them: ‘Cyber-attacks are increasingly damaging’, or ‘large amounts of personal data are most at risk’. The important take-away, however, is that modern day thieves can easily gain access to […]Read more
A system to address the untrustworthy security environment Zero trust approaches to security have been talked about for a while; but in recent times they have certainly gained more currency. As a model for protecting data and services, the simplicity of the concept is its biggest strength – assume, as a default position, there is […]Read more
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.