You are here

OT Vulnerability Management – When Patching isn’t Preferred (or even possible)

OT Vulnerability Management – When Patching isn’t Preferred (or even possible)

Created: Tuesday, December 1, 2020 - 13:54
Categories:
Cybersecurity, General Security and Resilience, Security Preparedness

Patching in the OT environment is a perpetual predicament, but passing over patches is permanently problematic. Simply ignoring a patch because it is impractical or impossible to implement is profoundly poor policy. So what are the preferred practices when patching isn’t possible? According to Verve Industrial, the options greatly depend on whether the system you intend to remediate has embedded vulnerabilities or a Windows/userspace application.

WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities highlights the need to embrace a holistic vulnerability management program that involves remediating, mitigating, or accepting a risk – even the risk posed by the inability to patch. If patching still has you perplexed, Verve discusses additional options and alternatives for patching OT systems. Read more at Verve Industrial.