Time
2 hours 41 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
hi
00:00
and welcome back
00:02
to part three off enterprise security areas off cybersecurity, architectural fundamentals.
00:10
In this session,
00:12
I would cover vulnerability and Pech management availability management
00:18
and a bit off supply chain security.
00:22
All of these are pretty big. Top it by himself, but I'll just cover the basics of each area.
00:29
Let's begin with vulnerability and patch management.
00:33
So what's the difference? Well,
00:36
vulnerability management.
00:39
It's the psych lickle practice off identifying, classifying, re mediating and mitigating vulnerabilities.
00:46
This includes V A testing, and it also covers zero days off vulnerabilities found in the wall.
00:54
While Pech management covers the life cycle off reviewing and applying patches to system.
01:00
This is needed to cover assessment,
01:03
testing, deployment and, in case of any failures, the rollback process.
01:10
As you can imagine, patches are usually issue to fix vulnerabilities found in products. Hence, there is usually a very close association off these two practices.
01:23
Now I will not go through all the different vulnerabilities there are that you know the track could be introducing. But today I'll focus on the threat itself on vulnerability management.
01:37
Today, people either by Intel feet or subscribe to various vulnerability assessment systems like tenable or RePet seven.
01:49
Although these service's gets you the vulnerabilities very fast,
01:53
there are still the chance off zero day vulnerabilities found.
01:59
The other tread would be people walking around certain fixes, thus negating the control measures you have in place to counter the vulnerabilities. Now, in terms of Pech management,
02:13
the biggest threat is usually insufficient. Testing. Off patches have been many cases off pech, causing other failures in the system.
02:23
And in some cases it is the urgency off the fixes that reduce the testing cycle in order to push the patch out as quickly as possible.
02:32
This can lead to patch failure, which could affect the system or introduce other new vulnerabilities that were not there in the first place.
02:44
Another big problem with patch failure
02:46
is when you try to roll back to a previous state and fails, you'll get into an unusable condition.
02:54
Therefore, pech management is justice important as vulnerability management
03:00
to have a good vulnerability management. You should subscribe to Intel feeds that help you prioritize some off these vulnerabilities,
03:10
and it pays to have environment to validate some of these vulnerabilities because it's always present in every system that it's reported. It
03:21
especially if the vulnerability is because off certain configurations that might not be used in your organization.
03:28
And you should always have a good communication plan around the systems to inform all the stakeholders. If something is found
03:37
in terms of patch management, that paste of multiple environments to really thoroughly test all the patches that you're going to apply to the systems and for the testing,
03:47
it's a good practice to have realistic test data
03:51
to ensure that the tests ISS as close to production as possible.
03:55
You also spent a good amount of time to prepare your rollback procedures and to test the robot procedures in case of patch failures.
04:04
The use of virtual technology has made this much easier with snap shotting off image and roll back to certain point in time.
04:14
Another very good technique to employ is the use of virtual patching
04:19
virtual patching. It's a technique that blocks the exploit from its signature at the network level. All the holes I PS level.
04:29
This is very useful for O T systems, where it's not so easy to schedule our downtime toe, apply a patch. The use of virtual patching is highly encourage
04:41
in environments where scheduling of patching is very difficult.
04:46
This will at least help ensure that run abilities are blocked, even if your system is not actually patched.
04:55
Now, remember, cybersecurity is C i N A. So availability is part off cyber security management
05:02
and availability. Management usually refers to two areas. High availability and disaster recovery.
05:12
High availability is concerned with up time,
05:15
and this is usually managed within the same environment as your primary system,
05:21
and this has a direct impact on your patch management strategy.
05:29
This is because many systems need a reboot after a Petch,
05:32
although not all systems do.
05:36
While disaster recovery, it's about business continuity, and it's is usually in a secondary site.
05:45
Disaster recovery affects a design based on the R. T 00 and O P O.
05:49
Who,
05:50
which is the restore time objective. Time taken to get back and running
05:57
and the wrist are point objective, which is at what stage the data restored to
06:02
the smaller the numbers of thes, the higher the costs off the solution.
06:09
And in many cases, since your recovery site it's a remote location.
06:14
This has great dependencies on your network, Ben, with that directly effects your costs.
06:21
And since it's about business continuity,
06:25
these numbers are usually dictated by the business. Check with the business owners of their systems on their recovery objective and right size. Your solution to meet the business objectives.
06:39
Now the treads to high availability could be an unstable application
06:44
a lot beyond the capacity plan.
06:46
Miss Configuration All simple equipment failure
06:51
for D Our. It's usually when a sightless destroyed a very large scale and prolonged power outage. All natural disasters such as earthquakes,
07:01
environmental trip modeling thus play a part in a lot. Off the out scenarios
07:09
knots some off the control measures you can have to achieve. Hit J
07:15
could be the use of a good look. Balancer
07:17
employer. Stateless design for the applications.
07:20
Make use of reliable messaging
07:24
that can guarantee delivery
07:26
and redundancy for everything
07:29
to counter equipment failure.
07:30
Obviously, this comes at a cost.
07:33
Some techniques to help with the old design could be taking regular snapshots.
07:40
Half transaction locks that can be replayed
07:43
or even old fashioned to face commits to remote database so that we can guarantee that the remote database would be the same as your primary production database.
07:54
Okay, moving on to supply chain security.
07:57
This covers the upstream and downstream effects of components in the system.
08:01
This is extremely difficult to manage and current I t landscape as nobody builds everything from scratch, and in many cases, vulnerabilities are introduced. True vulnerabilities in your sub components.
08:16
Some off the more common supply chain security treads of the use of open source libraries.
08:22
A scene in the open SSL case a few years ago.
08:26
Hardware supplier. For example. Intel's meltdown. When spectral vulnerabilities,
08:31
the use of shed libraries can cause vulnerabilities to cross over system.
08:37
Same for common tools and even the Kampala use as you can read the details from the link supplied.
08:46
What can we do about this? Well, always planned for alternative sauce in case vulnerabilities are found,
08:52
make sure you have update plans from your component supplier
08:58
and always plan for the worst case. Not if it happens, but when it happens
09:05
and do pay attention to Intel. Feats on exploits in Southern libraries that you might be using
09:13
for open source libraries do employ technologies like sauce composition analysis to make sure that the libraries are clean before you put them into your applications.
09:26
Now wrapping up
09:28
in this session recovered the basics of vulnerability and patch management
09:31
talked about high availability and disaster recovery for availability management and some of the areas to pay attention to in supply chain security.
09:43
This is a very good source of information regarding this. I have shut to Ling's for further reading, one on configuration inventively T management and the other in the best practice in the cyber supply chain risk management area.
09:58
Do take the time to read these documents.
10:01
Well, this concludes the basic enterprise security areas
10:07
in the next session, I would cover on a very important topic
10:11
which is cool out security. If we have the time, please join me. Thank you.

Up Next

Fundamentals of Cybersecurity Architecture

This cyber security architecture class aims to give an appreciation of the various aspects of consideration that goes into a proper security architecture.

Instructed By

Instructor Profile Image
Ian Loe
Sr. Vice President at NTUC Enterprise Co-operative Limited
Instructor