[cabf_netsec] SC20 and OS Patch Management

Neil Dunbar ndunbar at trustcorsystems.com
Mon Feb 24 03:49:04 MST 2020


All,

As discussed in the F2F meeting, within the context of a Change 
Management Process for CAs, the question came up regarding OS and 
application patch management, and whether it was intended to be covered 
by SC20.

 From my perspective, the answer is an unequivocal "Yes", but I did want 
to take the temperature of the NetSec contributors before I open up 
SC20v2 for re-discussion on the public list.

What follows is _my_ intepretation of how OS/App patches could/should be 
handled: this does _not_ mean that there are not other, probably better, 
ways of handling them.

1. Upstream packages/patches need to come with a well-known source of 
authenticity and integrity. A fairly common example would be packages 
which are digitally signed by a private key; the public key counterpart 
of which is well known and well publicised (or even baked in at OS 
installation time). If you can't know that the package being installed 
is highly likely to be what you _think_ you are installing, then you 
don't have any real constraints on your changes, and you are just hoping 
that no malware sneaks in. [NB: OS/Application vendors can vary hugely 
in their signing key discipline, so its an open question as to just how 
strong a constraint this truly is]. Ideally both the individual packages 
and the overall repository manifest should be signed by the upstream vendor.

2. A CA has a channel by which it reviews security patches coming from 
the vendor (e.g. Red Hat's rhsa-announce, ubuntu-security-announce, RSS 
feeds, etc). Using this, the CA personnel can judge whether or not they 
could be affected by the security issue, and what the likely effect of 
patching is. (For example, if a Linux kernel has a vulnerability in a 
module which is not capable of being exercised in the CA's deployed 
systems, the CA could determine that the potential disturbance to 
customers is not acceptable, and refuse to curate the patched kernel). 
The decision to accept or reject the patch is recorded in a log (who did 
it, when, and with what result).

3. For each security notification which the CA decides they are 
affected, and where the risk of keeping the vulnerability is deemed 
unacceptable, any patch files covered by the security notification are 
marked and copied into an internal package repository [By "internal", I 
mean where the contents of the repository are purely determined by 
responsible CA personnel, and where access to the repository flows via 
trusted network connections]

4. At some point in the patch cycle, the CA deploys the patches to a 
stage server to determine the likely effect on production systems (The 
stage systems are kept as close as possible to the production 
platforms). The relevant monitoring systems (HIDS, file integrity 
monitors, etc.) will produce logs showing that files have been altered. 
Those logs are stored in preparation for the production deployment.

5. Assuming that no ill effects were noted on the staged deployment, a 
change ticket is opened up to note that productions systems A, B, C... 
are going to be patched in the normal cycle.

6. The relevant system administrators apply the patches (whether 
scripted, or individually is a matter for systems personnel) to the 
production systems, and perform such steps as needed to restore the 
production systems to full capability.

7. The monitoring systems of step 4 will record a set of file 
alterations to a log. These change entries are reconciled with the list 
produced in step 4 for the stage systems. Note: it's possible that 
because of scheduling differences and minor discrepancies between stage 
and production, the change logs won't be *identical*, but they should be 
substantively similar.

8. Assuming that no discrepancies in change logs are noted, the change 
ticket of step 5 is closed successfully. If there are change 
discrepancies, then an investigation would need to be launched within 24 
hours (per SC20), as this is an indication of a potential unauthorised 
change.

Observations/Open Questions:

1. The change ticket of step 5 can be instantiated from a ticket 
template. For example, if the CA does stage testing on Tuesdays, and 
production deployment on Thursdays, then the ticket could essentially be 
a template which says "Security Patching of Production Equipment", 
listing the systems being patched (and ideally the package deployment 
logs of the step 4 stage deployment). In other words, you don't need to 
generate a discrete change ticket for each package on every system you 
are patching, and get individual approval - that's way too much manual 
effort. A ticket generation on Wednesday with approval in place for 
Thursday, covering all systems is still an effective control.

2. Is it necessary for the internal repository manifest to be re-signed 
by the CA using an internal package key? If this is not done, an 
attacker could cause patches not to be applied by deleting the package 
files prior to deployment. On the other hand, one assumes that the 
internal repository is under the same monitoring regime as the rest of 
the CA's systems, so personnel would be alerted to the deletion (absent 
a log trail, this would be suspicious). However, re-signing the packages 
and repository does create a nice, self-sustaining  change log for the 
CA, who can demonstrate to their auditors that the package was curated 
at a given time. That said, software signing keys tend to be shared 
resources, so some additional evidence is required to show which 
individual made the call to accept the package (hopefully the log of 
step 2 is sufficient]

3. Where is the Change Management Process in the above list? I think it 
would be steps 2 and 3, rather than step 5 (Or rather, step 5 is just 
the request and approval after steps 2 and 3 have been followed).

4. Is it allowable for the connections to the internal repository to 
flow over potentially hostile network connections from a highly secure 
zone? Is something like a VPN sufficient to make the hostile network 
threat go away? Or should the repository belong purely within a high 
security network zone, per the rest of the NSRs. For example, if I have 
a repository hosted on S3, where the packages and manifests are signed 
by me, is there an unacceptable risk to the high security systems which 
a purely internal network location would address?

Anyway - I'd really value some thoughts and observations. If we're 
asking CAs to make changes to their internal processes, then it's well 
that we understand the depth, scope and complexity of those changes 
prior to voting.

Cheers,

Neil



More information about the Netsec mailing list