BigFix Software Integration
How BigFix software helps manage IT/OT convergence by safely applying proven technology safely into OT environments.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
In many aspects of life, there are many ways to accomplish the same goal, and some tactics may be better than others in the long-term, depending on the end-game objectives. One of the low-hanging fruits that offers a concrete and understandable (and consistently noted in cybersecurity best practice guides) risk reduction is the disabling of USB sticks or USB mass storage devices as an attack vector.
To answer the question of why one might disable USB access, let’s look at a few of my observations:
After researching the topic and conferring with my colleagues, we all voice the opinion that USB stick-related cybersecurity controls are rather trivial to implement, so:
To answer the first question, the answer has a few related components:
In regards to your organization’s needs, USB media devices could be required in some instances. However, knowing where systems have USB media exposure improves the accuracy of risk management activities, generates the opportunity to control system and information access, and reduce cybersecurity risk exposure via USB.
To answer the second question without explicitly calling out the technologies that can perform application or device whitelisting (now a part of Carbon Black, a VMware company), you can essentially “live off the land” with Verve Asset Management (VAM) and BigFix to manage patching, policy, log fetching, and gather detailed asset information. By combining these solutions, you will accomplish a similar effect efficiently using native Microsoft Windows functionality and BigFix “fixlets” to compound value using a small set of tools.
So let’s explore the question of USB device visibility from the perspective of a technology administrator or a C-level executive in a facility with minimal cybersecurity maturity:
“Hi <site admin>, coming down the pipe will be some compliance requirements about minimizing USB access to critical OT infrastructure, can you tell me what we are doing today? And on what systems USB access is enabled?”
“Well boss, most of those systems are self-managed, and we use USB sticks to transfer files from the corporate-network designated machine to the other systems in the facility”
“OK, that was not the answer I was hoping for, but we can aim to improve by starting with getting visibility on those self-managed assets and assessing the risks to them. In the meantime, can you get me a list of the systems, their OS, and controls by next week – I have a meeting with the Risk Management team? Thanks <site admin>”.
This conversation between the <site admin> and the executive is not as contrived as you may think. There have been many arguments on whether or not to manage, not manage, or prevent USB device access, but the critical steps being noted here are:
One of the differentiating factors of the Verve Asset Management solution is the nature to easily onboard commodity (e.g., Windows-based), and non-commodity (e.g., embedded) to make effective change. Assuming a standard Verve deployment beginning with BigFix agent’s distributed and being installed on Windows systems, this solution can:
To understand what this looks like, this image was created to display a BigFix fixlet that analyzes relevant hosts and determines if USB storage is disabled, as well as also auto-run functionality (this is particularly important for those legacy Windows XP systems). This step won’t be important for executives, but for your awareness, this BigFix fixlets enable vast amounts of powerful functionality that can be used to secure your organization. As an example, this could be the USB device control being discussed in this article, specific investigation of remote desktop service configurations, and also patch validation & remediation
Eliminating the need for your site administrators having to resort to the common method of manually checking systems and reporting the information within an Excel document, BigFix feeds the resulting information into VAM, and can be reflected in reporting: tabular-wise or visualized.
Verve reporting allows us to see which systems may or may not have USB mass media or autorun disabled. Simply said, Verve arms the site administrator and organization executives with a quick way to leverage accurate information on their assets and make informed decisions on next steps regarding USB device controls. By extension, these same BigFix fixlets can be used to push overall policy to OT systems or specific designated systems when granularity is required.
USB devices can be controlled with minimal effort on hosts running most Windows operating systems. Verve can not only be used to obtain detailed asset information, but can also enable accurate decision making and enforcement.
How BigFix software helps manage IT/OT convergence by safely applying proven technology safely into OT environments.
Learn MoreLearn how the Verve Security Center extends BigFix into OT OS-based devices for integrated IT OT endpoint management
Learn MoreIT endpoint management tools used in ICS security bridge the gap between IT and OT cyber security in a safe, automated way to address skill shortages and OT safety-first principles.
Learn More