OT Patch Management: A Step-by-Step Guide
Your comprehensive guide to OT patch management: Challenges, strategies, and best practices for securing industrial systems.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Over the past decade, Verve Industrial Protection worked with clients across a range of OT/ICS environments – from water to power to oil & gas to manufacturing – to assist them with patching software and managing vulnerabilities. With our extensive experience in patch management, we developed a range of learnings that we leverage in our work, and that others in industrial environments can benefit from when it comes to patching OT systems.
First, Art Manion from CERT/CC presented a framework at the S4x19 conference to discuss what to patch and when that is referred to “Never, Next, Now”. We would generally agree with the positions presented in that framework as well as the subsequent articles by Dale Peterson on this approach.
A simple structure of different classes of assets for patching makes sense. As one of the commenters noted, patches are often only applied annually during outages which limits the effectiveness relative to traditional IT patching. This would be Dale’s translation of “Never” to “Annual” (during outages).
This article, however, focuses on what to do when you decide to patch. What are our learnings that provide a framework of “how”? Questions such as: Which patches should you apply on devices that are in the “Now” or “Next” categories? How do you apply patches safely? Which software patches are “security-related” and how do you capture all of those? What should you do with patches that are not reviewed by OEM vendors?
Verve provides a comprehensive ICS/OT endpoint management and security platform that includes automated vulnerability and patch identification, along with security services such as vulnerability assessment, patch review, and patch deployment. In conducting this work, we address these hard challenges of “how” we effectively, efficiently, and safely deploy the right patches to address vulnerabilities in our clients’ environments.
This sounds simple. IT security professionals will tell you to just scan it with a vulnerability assessment tool. Or, if you have an OEM-vendor relationship, use their “approved” patch list. Or, check the vendor’s website for patches labeled “security”. Or manually or automatically identify CVEs for the software/firmware on your devices and access the patches that address those CVEs.
A simple vulnerability assessment suggests the need for a patch, even though your particular system may not require that patch for a variety of reasons. The patch may not be “relevant” for that machine as other patches supersede it. Or, the configuration of the device may make the patch irrelevant because the device is not set up to run certain services or capabilities. For instance, many networking device vulnerabilities would imply the need for a patch, but further reading would find that the patch is only necessary if the device has certain enabled configurations. Several key recommendations flow from this:
Four issues must be considered in the patch management process:
Control systems patching challenges do not stop at the need to reboot. In many cases, changes to software at one part of the process have implications on other parts of the process. Worse, a “Now” or “Next” device patch could force a “Never” device patch. So, you need to know the implications of applying such patches to a control system.
This can become complex and require deep knowledge of the OEM patching process. For instance, an update to the OEM’s engineering software may force updates to controller firmware or I/O cards, making it impossible for the standard software to work again unless these devices are updated.
Controller firmware updates may not have been in the original plan or may require an outage, but now loading a single OEM-approved patch results in the loss of all engineering capability until the firmware updates are completed on the controller and IO cards.
Verve has worked across OEM vendor environments for over 25 years. We have a history of how these systems work together. We learned from these experiences that OEM release notes do not always include these integrated effects.
In some cases, the only way to understand it is to actually review the code/scripts of what the patch is doing. Some will rely on “approved” patches as the solution. Our experience is “approved” does not necessarily work through all of the other elements and necessary considerations in many specific environments. A detailed review and testing are required to have a patch deployment progress safely and as planned.
Patching is a critical component of ICS cyber security. The “Now, Next, Never/annual” is a good framework of when and what assets to patch. However, identifying specific patches to deploy and how to deploy them (or mitigate them with compensating controls) separates successful and operationally safe patching programs from those that are less successful at mitigating vulnerabilities.
Verve’s 25+ years of vendor-agnostic OT systems management services along with the only endpoint management platform built for ICS enables us to help our clients deliver cross-vendor patching success, without risking critical processes.
Learn more about Verve’s patch management solution for operational technology.
Your comprehensive guide to OT patch management: Challenges, strategies, and best practices for securing industrial systems.
Learn MoreWhen a software patch isn't an option, here's how to control your industrial environment to manage risk.
Learn MoreCommon challenges to vulnerability management in OT cyber security and ways to overcome them to create safer industrial and operational environments.
Learn More