{"id":48692,"date":"2023-07-31T12:29:01","date_gmt":"2023-07-31T16:29:01","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=48692"},"modified":"2023-07-31T14:56:24","modified_gmt":"2023-07-31T18:56:24","slug":"legacy-it-update-troubles-and-mitigations","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/legacy-it-update-troubles-and-mitigations\/48692\/","title":{"rendered":"How to protect legacy IT systems"},"content":{"rendered":"<p>The popular \u201cif it ain\u2019t broke, don\u2019t fix it\u201d principle has reigned supreme in the computing world since the year dot. However, it has become an unaffordable luxury. The proliferation of cyberattacks \u2014 including on scientific and medical organizations \u2014 presents both IT and infosec services with a real dilemma. To protect critical hardware against attacks, its software must be updated. After all, outdated software means easy-to-exploit vulnerabilities, primitive or non-existent encryption, and rudimentary access control \u2014 every cybercriminal\u2019s dream. But updating this software often entails major outlays, plus risks playing havoc with business processes. Is it really that complicated, and, either way, how can the issue be solved?<\/p>\n<h2>The risks of updating<\/h2>\n<p>Many systems have been running smoothly for years \u2014 sometimes decades. They\u2019re not updated because their business owners worry that updates may disrupt the systems irrecoverably. Such fears are not unfounded. The people who installed and initially set systems up may be long retired, and the documentation might be lost or never existed at all. Sometimes this manifests itself in extreme forms; for example, the U.S. Internal Revenue Service still uses 1970s computers and <a href=\"https:\/\/www.washingtonpost.com\/politics\/2023\/02\/24\/irs-technology-gao-report-archaic\/\" target=\"_blank\" rel=\"nofollow noopener\">programs in the near-dead COBOL language<\/a>. Maybe the hardware supplier was sold or taken over, closed the business, or went bust. That, too, is nothing unusual: this year ATM giant <a href=\"https:\/\/www.reuters.com\/legal\/atm-maker-diebold-nixdorf-files-bankruptcy-cut-2-bln-debt-2023-06-01\/\" target=\"_blank\" rel=\"nofollow noopener\">Diebold Nixdorf<\/a> filed for bankruptcy.<\/p>\n<p>In all such cases, there\u2019s no tech support to call should an update go awry.<\/p>\n<p>Moreover, long-serving hardware forms connections with other company systems, and these interconnections can be obscured and\/or poorly documented. As a consequence, a system shutdown could cause cascading failures or malfunctions in other systems that are hard to anticipate and prevent. Recovering from such an incident could take days or weeks, and the downtime cost could be huge.<\/p>\n<h2>Restrictive upgrade costs<\/h2>\n<p>Even if the system isn\u2019t too interconnected and is well documented, updating can still be out of the question due to the exorbitant costs involved. For example, the need to decommission a legacy operating system in an MRI machine may require the purchase of a new device. The cost (around half a million dollars) is very high in itself. But the problem isn\u2019t limited to the price tag of the scanner. Its installation requires a crane, and maybe the dismantlement of part of the wall, and the walls of the room would have to be shielded with a Faraday cage. Thus, that\u2019s no longer an IT upgrade but a major construction project. If the system is deeply entwined with legacy equipment and equally obsolete software, replacing the hardware would require recoding or buying new software, which can be another lengthy and expensive project.<\/p>\n<h2>Compensatory measures<\/h2>\n<p>Just as expensive vintage cars are kept in a garage, and valuable paintings in a special atmosphere-controlled container, so too do systems that are neither replaceable nor fully upgradeable require a special approach to maintenance. Every possible measure must be taken to reduce the attack surface. Below is a short list of possible compensatory measures to protect legacy IT systems:<\/p>\n<p><strong>Network segmentation. <\/strong>Segregating vulnerable legacy equipment into a separate network segment will help minimize the risk of cyberattacks. You should strive for a high degree of isolation \u2014 up to and including physical separation of the network and switching equipment. If this isn\u2019t realistic, be sure to regularly check that firewalls and routers are configured to maintain proper isolation from the \u201cnormal\u201d network. It\u2019s also important to track commonplace violations of regulations by employees \u2014 such as accessing both an isolated and shared network through different network interfaces from one computer.<\/p>\n<p><strong>Encryption.<\/strong> For systems that exchange information with other computers using outdated protocols, it\u2019s recommended to create VPN-tunnels based on the latest encryption and authentication algorithms. Data exchange outside the tunnel should be blocked.<\/p>\n<p><strong>Upgrades.<\/strong> Even if an upgrade to a modern system is out of the question, this doesn\u2019t mean you can\u2019t install any updates at all. A step-by-step upgrade to the latest available versions of core software and regular database updates for installed <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/embedded-systems?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">protection systems<\/a> will be preferable to mothballing.<\/p>\n<p><strong>Micro-segmentation of processes.<\/strong> If a business process on a legacy system allows fragmentation, it\u2019s a good idea to leave on it only those parts of the process that cannot possibly be transferred to newer equipment. Transferring even part of the workload to a modern upgradeable platform will make it easier to protect what\u2019s left. For example, MRI images cannot be taken outside the scanner, but they can be uploaded to the clinic\u2019s server, viewed and analyzed on newer computers.<\/p>\n<p><strong>Closed list of applications.<\/strong> The previous tip keeps the range of work carried out on legacy equipment to a minimum. Applications and processes that are part of such jobs can be added to the allowlist, and all others to the denylist. This will significantly lower the risk of running malware or just third-party software that impacts system stability. Such \u201cdefault deny\u201d scenario can be implemented using <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/embedded-systems?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">specialized security solutions<\/a>, that are able to operate on systems with limited resources.<\/p>\n<p><strong>Virtualization. <\/strong>In cases of legacy software running on legacy hardware, the use of virtual machines may solve two problems: it allows at least to upgrade the hardware and to implement a number of compensatory measures (such as modern access control and encryption) at the virtualization system and the host system levels. This tip can work well even for some very old information processing systems.<\/p>\n<p><strong>Minimization of access and privileges.<\/strong> Access to legacy equipment (more specifically, to its computer hardware) should be granted to the minimum necessary number of employees with extremely limited privileges. If the system architecture does not allow the required configuration of rights and users, you can try to implement these restrictions at an earlier access stage (during login to the VPN or virtual machine, etc.), as well as restrict access through purely administrative measures (locks and security).<\/p>\n<p>Of course, this will require careful evaluation of the applicability of each measure and the risks related to the smooth and secure operation of the technology being implemented.<\/p>\n<h2>Future-proofing<\/h2>\n<p>Applying compensatory measures to legacy equipment is by no means purely an infosec task. Infosec experts need to have a complete list of obsolete equipment in a company and to keep track of when its replacement is initiated for business reasons. This is a good time to upgrade in line with the latest security requirements.<\/p>\n<p>More importantly, you need to ensure that systems being put in place today \u2014 which will someday themselves become obsolete \u2014 don\u2019t inherit the same problems. For this, all infosec requirements need to be factored in when purchasing hardware and software: regular and easy updating of software components; documentation of bugs and vulnerabilities; and, ideally, a secure-by-design philosophy.<\/p>\n<p>For software developed in-house or open-source forks (which are becoming more popular with companies), it\u2019s vital to set stringent requirements for code documentation. In an ideal scenario, document production should become as much a part of the DevSecOps pipeline as autotests.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?<\/p>\n","protected":false},"author":2722,"featured_media":48693,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[4445,398,192,4228,131,4494],"class_list":{"0":"post-48692","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-legacy","10":"tag-patches","11":"tag-protection","12":"tag-strategy","13":"tag-tips","14":"tag-upgrades"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/legacy-it-update-troubles-and-mitigations\/48692\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/legacy-it-update-troubles-and-mitigations\/25980\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/legacy-it-update-troubles-and-mitigations\/21400\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/legacy-it-update-troubles-and-mitigations\/28662\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/legacy-it-update-troubles-and-mitigations\/26292\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/legacy-it-update-troubles-and-mitigations\/35813\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/legacy-it-update-troubles-and-mitigations\/26580\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/legacy-it-update-troubles-and-mitigations\/32265\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/legacy-it-update-troubles-and-mitigations\/31948\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/legacy\/","name":"legacy"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=48692"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48692\/revisions"}],"predecessor-version":[{"id":48696,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48692\/revisions\/48696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48693"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=48692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=48692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=48692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}