<section title="12.4. Product Patching and Updating"><subsection title="Objective"><paragraph
    title="12.4.1."


><![CDATA[<p>To ensure security patches are applied in a timely fashion to manage software and firmware corrections, vulnerabilities and performance risks.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.4.2."


><![CDATA[<p>This section covers information on patching both evaluated and non-evaluated software and IT equipment.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Vulnerabilities and patch availability awareness"><paragraph
    title="12.4.3.R.01."

    tags="Technical,Product Security,Vulnerability Analysis"


><![CDATA[<p>It is important that agencies monitor relevant sources for information about new vulnerabilities and security patches. This way, agencies can take pro-active steps to address vulnerabilities in their systems.</p>]]></paragraph>
<paragraph
    title="12.4.3.C.01."

    tags="Technical,Product Security,Vulnerability Analysis"


    classification="All Classifications"
    compliance="Should"
    cid="3444"
><![CDATA[<p>Agencies SHOULD monitor relevant sources for information about new vulnerabilities and security patches for software and IT equipment used by the agency.</p>]]></paragraph>
</block>
<block title="Patching vulnerabilities in products"><paragraph
    title="12.4.4.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>The assurance provided by an evaluation is related to the date at which the results were issued. Over the course of a normal product lifecycle, patches are released to address known security vulnerabilities. Applying these patches should be considered as part of an agency’s overall risk management strategy.</p>]]></paragraph>
<paragraph
    title="12.4.4.R.02."

    tags="Technical,High Assurance Products,Product Security"


><![CDATA[<p>Given the potential threat vectors and the value of the classified information being protected, high assurance products MUST NOT be patched by an agency without specific direction from the GCSB. If a patch is released for a high assurance product, the GCSB will conduct an assessment of the patch and might revise the product’s usage guidance. Likewise, for patches released for HACE, the GCSB will subsequently conduct an assessment of the cryptographic vulnerability and might revise usage guidance in the consumer guide for the product.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.01."

    tags="Technical,Product Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3448"
><![CDATA[<p>Agencies MUST apply all critical security patches as soon as possible and within two (2) days of the release of the patch or update.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.02."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3449"
><![CDATA[<p>Agencies MUST implement a patch management strategy, including an evaluation or testing process.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.03."

    tags="Technical,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="3450"
><![CDATA[<p>Agencies MUST NOT patch high assurance products or HACE without the patch being approved by the GCSB.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.04."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3451"
><![CDATA[<p>Agencies SHOULD apply all critical security patches as soon as possible and preferably within two (2) days of the release of the patch or update.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.05."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3452"
><![CDATA[<p>Agencies SHOULD apply all non-critical security patches as soon as possible.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.06."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3453"
><![CDATA[<p>Agencies SHOULD ensure that security patches are applied through a vendor recommended patch or upgrade process.</p>]]></paragraph>
</block>
<block title="When security patches are not available"><paragraph
    title="12.4.5.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>When a security patch is not available for a known vulnerability, there are a number of approaches to reducing the risk to a system. This includes resolving the vulnerability through alternative means, preventing exploitation of the vulnerability, containing the exploit or implementing measures to detect attacks attempting to exploit the vulnerability.</p>]]></paragraph>
<paragraph
    title="12.4.5.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3455"
><![CDATA[<p>Where known vulnerabilities cannot be patched, or security patches are not available, agencies SHOULD implement:</p><ul>
<li>controls to resolve the vulnerability such as:
<ul>
<li>disable the functionality associated with the vulnerability though product configuration;</li>
<li>ask the vendor for an alternative method of managing the vulnerability;</li>
<li>install a version of the product that does not have the identified vulnerability;</li>
<li>install a different product with a more responsive vendor; or</li>
<li>engage a software developer to correct the software.</li>
</ul>
</li>
<li>controls to prevent exploitation of the vulnerability including:
<ul>
<li>apply external input sanitisation (if an input triggers the exploit);</li>
<li>apply filtering or verification on the software output (if the exploit relates to an information disclosure);</li>
<li>apply additional access controls that prevent access to the vulnerability; or</li>
<li>configure firewall rules to limit access to the vulnerable software.</li>
</ul>
</li>
<li>controls to contain the exploit including:
<ul>
<li>apply firewall rules limiting outward traffic that is likely in the event of an exploitation;</li>
<li>apply mandatory access control preventing the execution of exploitation code; or</li>
<li>set file system permissions preventing exploitation code from being written to disk;&nbsp;</li>
<li>allow and deny listing to prevent code execution; and</li>
</ul>
</li>
<li>controls to detect attacks including:
<ul>
<li>deploy an IDS;</li>
<li>monitor logging alerts; or</li>
<li>use other mechanisms as appropriate for the detection of exploits using the known vulnerability.</li>
</ul>
</li>
<li>controls to prevent attacks including:
<ul>
<li>deploy an IPS or HIPS; or</li>
<li>use other mechanisms as appropriate for the diversion of exploits using the known vulnerability, such as honey pots and Null routers.</li>
</ul>
</li>
</ul>]]></paragraph>
</block>
<block title="Firmware updates"><paragraph
    title="12.4.6.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>As firmware provides the underlying functionality for hardware it is essential that the integrity of any firmware images or updates are maintained.</p>]]></paragraph>
<paragraph
    title="12.4.6.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3460"
><![CDATA[<p>Agencies MUST ensure that any firmware updates are performed in a manner that verifies the integrity and authenticity of the source and of the updating process or updating utility.</p>]]></paragraph>
</block>
<block title="Unsupported products"><paragraph
    title="12.4.7.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>Once a cessation date for support is announced for software or IT equipment, agencies will increasingly find it difficult to protect against vulnerabilities found in the software or IT equipment as no security patches will be made available by the manufacturer after support ceases.</p>]]></paragraph>
<paragraph
    title="12.4.7.R.02."

    tags="Technical,Product Security"


><![CDATA[<p>Once a cessation date for support is announced agencies should assess the timeline, investigate new solutions that will be appropriately supported and establish a plan to implement the new solution.</p>]]></paragraph>
<paragraph
    title="12.4.7.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3465"
><![CDATA[<p>Agencies SHOULD assess the security risk of continued use of software or IT equipment when a cessation date for support is announced or when the product is no longer supported by the developer.</p>]]></paragraph>
</block>
</subsection>
</section>
