I had an interesting conversation today with the lead researcher for one of the increasing number of ICS cybersecurity companies. The conversation was interesting, informative, and completely off the record. One topic that did come up that I think bears some broader discussion within the community is the vulnerability reporting processes used by such companies. Not coordinated disclosures so much, but the public reporting of vulnerabilities by researchers after vendors have had a chance to address the vulnerabilities.
Research Companies
There are a number of companies in the ICS security realm that publish reports about vulnerabilities that they have discovered. The first thing that we as consumers of those reports have to remember is that these companies are not doing the vulnerability research to do this reporting. They are doing the research to support their business model of either providing threat identification for their customers and/or selling products that mitigate the effect of vulnerabilities/attacks on customer processes. This means that their reporting is as much part of their advertising as it is sharing information with the community. The balance between advertising and information sharing varies widely within the industry.
User Perspective
I told my caller today that I try to look at things, vulnerabilities in particular, from the operator perspective. And I would like to see more vulnerability reporting from the research community try to focus more on that type of reporting. I do not object to the detailed technical reporting that we see so often; with proof-of-concept code and details about how the researchers went about pulling the vulnerability apart. That is all valuable reporting, but it is more helpful to the research community and the response community than it is to the owner/operators of industrial control systems in the manufacturing world.
Vendors and various CERTs do a better job of providing user focused information in their advisories than the research community generally does, but I still think that more needs to be done at even this level. CISA’s NCCIC-ICS has the most consistent approach in this regard that I have seen. They generally provide a brief description of the skill level needed to exploit the vulnerability, the level of access needed and a brief description of the consequences. Unfortunately, the terminology they use is more than a little vague and seldom provides any useful information on how a successful attacker would implement the exploit. The main reason for that lack of detail is that NCCIC-ICS is not a research organization, but rather a coordination agency.
Researcher Advisories
Perhaps it is time for cybersecurity companies to begin preparing their own advisories in addition to their blog posts, white papers and reports. These new documents would address vulnerability disclosures from the perspective of affected owner/operators. It would include a link to more detailed information in the more typical vulnerability research reporting, but it would concentrate on describing the potential impact to organizations and would include discussion of potential mitigation measures.
The advertising wonks in these companies should jump on that mitigation measures portion of the advisory because it would provide an opportunity to explain to their customers (and potential customers) how their products would help to protect them from the vulnerabilities being described. In fact, this potential advertising advantage might lead cybersecurity organizations to provide advisories for vulnerabilities that were publicly reported by other organizations or even equipment vendors.
The preparation of these researcher advisories should not
take up too many administrative resources. Much of each advisory could be
pre-written as part of a standard format and most of the language could be cut
and paste boiler plate; just look at the NCCIC-ICS advisories to see how much
of the language is common to each advisory. Furthermore, much of the more variable
wordage could be included in the more traditional reporting, making those
documents more valuable as well.
No comments:
Post a Comment