Better Not Call Saul ft. Bryon Singh, RailWorks Corporation

Better Not Call Saul ft. Bryon Singh, RailWorks Corporation

By Steve Gold
Posted in Security
On December 19, 2023

If you’re a Mandy Patinkin fan like I am, you can quote many lines from The Princess Bride and have watched the acclaimed series Homeland, where he played CIA Director, Saul Berenson.

In Season 7 of Homeland, Saul Berenson’s phone gets hacked because it is running outdated software. This scenario highlights several key points relevant to the importance of regular updates and patches.

  1. Exploitation of Vulnerabilities: The show demonstrates how hackers can exploit vulnerabilities in systems that are not up-to-date. This is a realistic portrayal of what can happen when patches and updates, which often include security fixes, are not applied in a timely manner.
  2. Real-world Relevance: Homeland is known for its attempt to realistically depict modern intelligence and cybersecurity issues. The scenario of getting hacked due to missing updates reflects a genuine risk in today's digital world.
  3. Awareness of Cybersecurity Best Practices: By showcasing such a plot, the series indirectly educates viewers about the importance of regular software updates as a basic, yet crucial aspect of personal and organizational cybersecurity.

The main security function of this safeguard is “Protect.” It is important to distinguish between patch management and vulnerability management within the controls. While often conflated, they serve different purposes. Patch management focuses on the deployment of patches, which might not always address vulnerabilities. Conversely, vulnerability management aims to resolve vulnerabilities and reduce overall risk. It is important to note that security patches may require additional configuration post-deployment, a detail that patch management software might overlook, but is usually caught by continuous vulnerability management programs.

Implementing CIS Safeguard 7.3: Steps for Effective Automated Patch Management

  1. Evaluating Your Current IT Setup: It is important to have a clear understanding of your IT infrastructure. This knowledge is key to identifying the most suitable automation tools for your needs.
  2. Identifying Suitable Tools: The focus here is on finding automation tools that not only mesh well with your existing IT systems, but also align with the specific requirements of your organization.
  3. Establishing Patch Management Protocols: It is crucial to develop clear protocols for the testing, approving, and scheduling of patches. This step ensures a structured approach to patch management.
  4. Ongoing Surveillance and Documentation: Continuously monitoring the patch management process and maintaining detailed reports are fundamental to verify efficiency and effectiveness.
  5. Periodic Assessment and Refinement: Given the ever-changing nature of IT environments and emerging vulnerabilities, conducting regular assessments and updates of your patch management strategy is vital for maintaining its relevance and effectiveness.

Despite its many advantages, automated patch management presents its own challenges, like ensuring the compatibility of patches with systems or minimizing operational disruptions during deployment. These challenges can be met through comprehensive testing, strategic scheduling, and at times, manual oversight.

Here is a link to the Vulnerability Management Policy Template provided free of charge from the fine folks at the Center for Internet Security: https://www.cisecurity.org/insights/white-papers/vulnerability-management-policy-template-for-cis-control-7

Here are some details on this specific Control/Safeguard. If you want more information, DM me.

CIS Control 7 – Continuous Vulnerability Management

Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data.

Implementation Group 1

CIS Safeguard 7.3 - Perform Automated Operating System Patch Management

Perform operating system updates on enterprise assets through automated patch management on a monthly, or more frequent, basis.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.