Much of the critical (and dangerous) industrial infrastructure in the developed world is controlled and protected by computer-based automation systems. A malicious compromise of those systems gives the potential for serious harm to plant workers, the public, and the environment.
Safety is one of the most important differences between traditional IT and plant operations. Rebooting OT systems due to software updates can cause system crashes and create a potential for worker injury and loss of production.
For these reasons some organizations have put their IT departments in charge of supporting their computer-based industrial automation systems. This is not always the best approach due to differences in philosophy between traditional IT best practices and the operational requirements of an industrial plant or facility.
Moreover, patching in the OT environment can be an expensive method. If the risk can be reduced to an acceptable level by applying alternative controls – meaning if the attackers can be prevented from reaching the vulnerable assets – then the cost or effort of patching and applying alternative controls need to be compared to decide which approach is best.
It is not feasible to patch all the OT assets, thus, it is recommended to patch smartly.
A comprehensive inventory of all software, firmware, and hardware within the OT environment, including all the assets from the industrial demilitarized zone (level 3.5) to the cell/area zone (level 2-0) in the ISA/IEC-62443 Purdue model, is a critical piece of any OT patch management process. Once there is a clear picture of what is present, it will be easier to compare the known vulnerabilities to the inventory to quickly discover which patches matter to the OT environment.
To assign criticality to the OT asset, a system for assigning criticality scores needs to be established. This may already exist due to the regulation of the safety system. The criticality needs to be assigned considering business Impact i.e., the impact of lost accessibility, reliability, integrity, etc. to the business safety, profitability, etc.
It is not possible to deploy all the patches in all the OT assets at the same time. Also, it is not possible to patch one by one. It is recommended to prioritize patch deployment that is specially designed for the OT environment.
Run a diagnostics test to confirm the asset(s) has the required resources available for installing updates.
It is recommended to have:
The patch management policy should at a minimum include:
Polytron applies and adjusts these steps to meet the needs of each client and project. Our approach to security applies a design methodology for your network requirements to develop a physical framework to align to support your manufacturing strategy. Learn more about patch management and reducing risk with cybersecurity with the on-demand workshop here.