Industrial Internet Security Framework v 1.0 | Page 112
Security Framework
11: Security Configuration and Management
To author and deliver the policy, as well as during the extraction of the events, the metadata
about the policy and about the events must be carefully guarded. Access control over these must
be strictly enforced or the best security implementations will be rendered vulnerable to
compromise. Security metadata from any data monitoring requires policies defining how it is
handled and who has ownership and access to it. There may be privacy implications to some
security data collected.
11.5.1 SECURE SOFTWARE PATCHING AND FIRMWARE UPDATE
As the amount and complexity of software increases, so does the number of defects, some of
which will be exploitable vulnerabilities. Others may cause unpredictable system failures, timing
issues, reduction in system performance, reliability or other unknown problems. Once
discovered, these defects can often be fixed by patching. If over-the-air updates are
implemented, network-related vulnerabilities that affect the integrity of the over-the-air process
should be addressed first.
IEC TR 62443-2-3:2015 ‘Patch Management in the IACS Environment’1 defines relevant
terminology, lays out patching requirements for both asset owners and product suppliers, and
defines a schema for patch information exchange. It also provides guidance for qualifying,
verifying and deploying software patches in operational systems.
Sometimes it is not possible to update an endpoint. For example, if an endpoint is too important
to continued operation to risk any modifications. Some updates may invalidate a certification or
compliance with a standard until the requisite safety assessment is rerun.
A wide range of methods provides software and firmware updates to endpoints. Some endpoints
require direct physical access to the device to update it (i.e., by attaching a serial cable or a USB
drive). Others allow users to download an update from a remote location and install it locally via
command line or agent commands. Clearly, automatic upgrades are easier for administrators,
more easily validated to ensure the integrity of the update and its provenance, more likely to be
applied and easier to verify that they were applied. As a result, they are more efficient and less
costly than update approaches requiring physical intervention at each device.
Software and firmware updates add security, safety, reliability or functionality features,
especially in brownfield scenarios. Systems with strong safety and availability requirements often
use a staging area to test updates prior to updating all the endpoints. Without confidence that
they work, software updates will be ignored, as the operational risk is too great.
Secure update of endpoints can be implemented using software or a combination of software
and hardware—with hardware features adding additional layers of protection, integrity and
trust. Using hardware containers such as an HSM, TPM or other TEE is strongly recommended.
Keys used in upgrades can be managed by a third-party certificate authority and updated as
needed. The same mechanism used to update firmware or software securely can also be used
for updating system configurations and ensuring that the software is from the expected source.
1
See [IEC-62443-23]
IIC:PUB:G4:V1.0:PB:20160926
- 112 -