The intricacies of cybersecurity update procedures

Cyber Security
In case of a failed software update process, it can result in severe implications, as witnessed today with widespread blue screens of death attributed to a faulty update by CrowdStrik

The complexities of cybersecurity update processes

Cyber Security

In case of a failed software update process, it can result in severe implications, as witnessed today with widespread blue screens of death attributed to a faulty update by CrowdStrike

The complexities of cybersecurity update processes

Cybersecurity often revolves around agility; a cyber threat actor devises a malevolent attack strategy or code, cybersecurity firms respond to the new threat and if necessary, modify and implement methods to identify the threat. This adaptation may involve updating cloud detection systems and/or upgrading endpoint devices to furnish the required safeguard against the threat. And agility is crucial as the cybersecurity sector exists to shield, identify, and counter threats as they arise.

The protocols cybersecurity firms establish to prevent clashes between an update and the operating system or other products are usually substantial, with automated test surroundings replicating real-world scenarios of diverse operating systems, various iterations of system drivers, and the like.

In certain cases, this oversight may be conducted by individuals, a final approval that all processes and procedures have been adhered to and no conflicts exist. There might also be external entities, like an operating system provider, in this equation testing independently of the cybersecurity provider, striving to prevent any major downtime, as witnessed presently.

In an ideal scenario, a cybersecurity team would receive the update and trial it in their internal setting, ensuring no incompatibility. Upon confirming the update poses no issues, a phased rollout of the update would commence, perhaps one department at a time. This approach diminishes the likelihood of any substantial disruption to business operations.

This approach is insufficient for cybersecurity product updates; they need to deploy at the same pace as the dissemination of a threat, typically almost instantaneously. A failed update process can be catastrophic, as is being demonstrated today by a software update by CrowdStrike, resulting in blue screens of death and complete infrastructure failure.

This does not imply incompetence on the part of the vendor; it is more likely an unfortunate situation, a convergence of updates or configurations leading to the incident. Of course, unless the update has been tampered with by a malicious actor, which does not seem to be the case in this instance.

What lessons can we draw from this incident?

Primarily, all cybersecurity providers are likely reassessing their update procedures to ensure there are no loopholes and to explore ways to fortify them. To me, the fundamental lesson is that when a company attains a significant market position, their dominance can instigate a quasi-monoculture event, where a single issue can impact many.

Any cybersecurity expert will mention terms like ‘defense in depth’ or ‘layers of defense’ – this pertains to leveraging multiple technologies and often multiple providers to thwart potential attacks; it’s also about resilience in the architecture and not depending solely on one vendor.

We must not lose sight of who should be held accountable when incidents like this occur; if cyber criminals and state-sponsored attackers did not generate cyber threats, we wouldn’t need real-time protection.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.