[Servercert-wg] Ballot SC29: System Configuration Management

Neil Dunbar ndunbar at trustcorsystems.com
Mon Mar 30 04:38:39 MST 2020


On 30/03/2020 11:07, Dimitris Zacharopoulos (HARICA) via Servercert-wg 
wrote:

> We had an internal discussion at HARICA and focused mainly on the OS 
> security patching process. Here are some of the team's observations:
>
>  1. Security patches, especially for 0-day exploits, should be applied
>     as soon as possible. Human review in most cases adds unnecessary
>     delay and increases the risk of the CA being vulnerable to attacks.
>
It's not at all clear to me that this is the case. However, it might 
help to understand what the notion of "review" means in this case. I 
suspect that we're coming at this word from different angles.

Emergency Change Orders are a well known phenomenon in most workflows. 
Now - they _should_ be painful (ie, a senior manager or director should 
be approving the change) because that acts as a discouragement to 
fast-track proper testing via the ECO mechanism.

>  1. Human review doesn't scale as the number of Systems increase.
>     Automation is the only way to handle large number of Systems.
>
Well, no one is asking for a per-system review. If you host a curated 
mirror of your vendor's upstream patches, then the current automation 
systems would work with virtually no alteration - just a repository change.
>
>  1. Human review of patches for so many different OS components,
>     sometimes without enough details or the source code available, is
>     too difficult to be done correctly and humans do make mistakes.
>
Of course - so do OS vendors! But again - what do we mean by "review". I 
don't understand it to be a line-by-line formal code analysis. The issue 
at hand is whether the OS vendor is addressing a security issue which 
the CA is likely to suffer from, and that the patches produced don't 
introduce any extra vulnerability which the CA cannot tolerate.

To accept a patch - at least to me - means that you are aware of the 
issue which the patch seeks to address (ie, you've looked at the 
changelog); you've determined that you are likely to suffer from the 
asserted vulnerability; you decide that the exploit of the vulnerability 
is an unacceptable risk; that you believe that the vendor has sufficient 
QA processes in place not to introduce further unacceptable 
vulnerabilities while deploying the updated software; and that you know 
how to roll back the change in the event that it either does not work or 
introduces unacceptable changes in your systems. [There are probably 
more steps in there, but those are the major ones, to my thinking].

Put another way - if you knew that a patch addressed a vulnerability in 
the Bluetooth stack on a host, but you have no Bluetooth equipment in 
your array, then isn't patching something with no avenue of exploitation 
a source of risk? And if so, is that risk then acceptable? It may, or 
may not be, but I think an auditor would at least want to see that 
someone had made that judgement call.

>  1. The risk of being non-functional is of lesser importance and
>     potential impact, compared to the risk of remaining vulnerable
>     while waiting for a human review.
>
> We believe that OS patches, digitally signed by the software vendor 
> and provided through secure channels, MUST be allowed as a dully 
> approved Change Management Policy practice, to be applied without 
> employing a human review process. Such updates and patches are 
> beforehand thoroughly tested by the software vendors themselves and 
> the CA staff should be discouraged to duplicate such a process with 
> dubious results.
>
Again - I don't think anyone is asking for the CAs to _duplicate_ the QA 
processes of the software vendor - merely to be assured that the patches 
which are going to be installed are proportionate to the risk being 
mitigated.

For the vast majority of (non-emergency) patches which get applied - 
surely we apply them to test systems before we go live on production? 
Isn't that part of a proper review?

And I would be horrified to learn if CAs are installing software right 
now _without_ ensuring that software's authenticity and integrity!

> The recommended change in 1.h:
>
> "Ensure that the CA’s security policies encompass a Change Management 
> Process, following the principles of documentation, approval and 
> testing, and to ensure that all changes to Certificate Systems, 
> Issuing Systems, Certificate Management Systems, Security Support 
> Systems, and Front-End / Internal-Support Systems follow said Change 
> Management Process;"
>
> doesn't seem to clearly allow this practice. We cannot support a 
> ballot that enforces manual human review in applying OS patches which 
> puts systems at risk, even for a short amount of time.

I think that it does allow the practice, even for urgent changes - most 
Change Management Systems encompass the notion of Emergency Change 
Orders. The review can be as little as "we cannot accept the 
vulnerability existing a moment longer; the vendor has produced patch X; 
fire up an ECO and phone the Chief Operating Officer because the risk of 
not deploying the patch is greater than the risk of deploying it".

I guess that my question then boils down to this: other high risk or 
high accountability institutions have rigorous change order management 
processes, which encompass emergency changes too - isn't the onus on CAs 
to explain why their business is so radically different so as not to be 
a proper fit for such widespread processes?

Regards,

Neil

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cabforum.org/pipermail/servercert-wg/attachments/20200330/b8fe5030/attachment-0001.html>


More information about the Servercert-wg mailing list