<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>pfp Solutions Ltd</title>
	<atom:link href="https://pfp-solutions.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://pfp-solutions.com/</link>
	<description></description>
	<lastBuildDate>Sun, 18 Mar 2018 15:47:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Patching &#8211; digging up the foundations</title>
		<link>https://pfp-solutions.com/patching-digging-foundations/</link>
		
		<dc:creator><![CDATA[garsidea]]></dc:creator>
		<pubDate>Tue, 23 Jan 2018 18:21:42 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Patching]]></category>
		<guid isPermaLink="false">http://pfp-solutions.com/?p=139</guid>

					<description><![CDATA[<p>Today we saw the latest twist in the Meltdown and Spectre story with Intel formally withdrawing patches &#8211; http://www.bbc.co.uk/news/technology-42788169 and the main question is what does this teach us about patching. The best way of thinking about patches is a bit like a house. The closer the repair is to the foundations the greater the...</p>
<p>The post <a href="https://pfp-solutions.com/patching-digging-foundations/">Patching &#8211; digging up the foundations</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today we saw the latest twist in the Meltdown and Spectre story with Intel formally withdrawing patches &#8211;</p>
<p><a href="http://www.bbc.co.uk/news/technology-42788169">http://www.bbc.co.uk/news/technology-42788169</a></p>
<p>and the main question is what does this teach us about patching.</p>
<p>The best way of thinking about patches is a bit like a house. The closer the repair is to the foundations the greater the risk to the rest of the building. The closer to the roof &#8211; or in computer terms the interface the lower the risk.</p>
<p>Intel&#8217;s patches are effectively trying to dig up and relay the foundations of a house &#8211; without damaging the remaining structure. This is to say the least high risk &#8211; most would say this is unlikely to be complete without causing collateral damage.</p>
<p>This means two of the main paradigms of information security need to be balanced &#8211;</p>
<ul>
<li>The ongoing availability of systems</li>
<li>Protection of data and assets from attack</li>
</ul>
<p>Based on current reporting it would appear the threat to availability posed by the patches exceeds somewhat the threat to data and assets. Though this is potentially a fine balance &#8211; there is little news of an active exploit &#8211; and much news of issues resulting from the patches.</p>
<p>Though each company should and hopefully will have it&#8217;s own risk management strategy &#8211; this is maybe one where a deeper look is required.</p>
<p>The post <a href="https://pfp-solutions.com/patching-digging-foundations/">Patching &#8211; digging up the foundations</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meltdown &#8211; Issues with CPU microcode fixes and the need for risk assessments</title>
		<link>https://pfp-solutions.com/meltdown-issues-cpu-microcode-fixes-need-risk-assesments/</link>
		
		<dc:creator><![CDATA[garsidea]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 20:03:47 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Patching]]></category>
		<guid isPermaLink="false">http://pfp-solutions.com/?p=132</guid>

					<description><![CDATA[<p>Bearing in mind how little time there has been for testing it&#8217;s little surprise that the CPU patches being released are causing issues. The BBC story probably gives some insight. http://www.bbc.co.uk/news/technology-42733032 Why are these issues happening The main issue is that a release cycle which would normally take a couple of years is being crammed...</p>
<p>The post <a href="https://pfp-solutions.com/meltdown-issues-cpu-microcode-fixes-need-risk-assesments/">Meltdown &#8211; Issues with CPU microcode fixes and the need for risk assessments</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Bearing in mind how little time there has been for testing it&#8217;s little surprise that the CPU patches being released are causing issues. The BBC story probably gives some insight.</p>
<p><a href="http://www.bbc.co.uk/news/technology-42733032">http://www.bbc.co.uk/news/technology-42733032</a></p>
<h2>Why are these issues happening</h2>
<p>The main issue is that a release cycle which would normally take a couple of years is being crammed into just a few weeks. This would normally involve vendors testing their software with the new CPU and microcode &#8211; and then fixing any issues.</p>
<p>We are now seeing not just one new CPU model being introduced with the associated microcode. We are seeing a re-release of all recent models of CPU.</p>
<h2>The Impact</h2>
<p>The real question now for IT and security specialists is where the balance lies between the risk of patching and not patching. Processor exceptions (blue screen of death) may be annoying on desktops. If the same issues were to occur on servers then this would be extremely disruptive. Imagine for example a database server randomly re-booting, losing data &#8211; and taking 10-15 minutes to come back online.</p>
<p><script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script><br />
<ins class="adsbygoogle"
     style="display:block; text-align:center;"
     data-ad-layout="in-article"
     data-ad-format="fluid"
     data-ad-client="ca-pub-0873198132563251"
     data-ad-slot="9028175968"></ins><br />
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script></p>
<h2>The Need for Risk Assessment</h2>
<p>This is one scenario where a serious risk assessment needs to be performed before patching systems. The following need to be balanced &#8211;</p>
<ul>
<li>The risk of the exploit being used to compromise security</li>
<li>The risk of applying the patch compromising availability and reliability of services</li>
</ul>
<p>In looking at this once again IT and Information Security professionals need to look at possible modes of attack.  The main risk is with</p>
<ul>
<li>Browsers &#8211; and other interfaces on endpoints that interact with the internet</li>
<li>Hypervisors in multi-tenancy environments</li>
<li>Hypervisors where machines on different firewall segments are on the same physical host</li>
</ul>
<p>In any case the realistic risk of an attack needs to be balanced against a fairly high probability service disruption.</p>
<p>The best advice at the moment is probably to start patching the less mission critical services. The allows patch stability to be assessed &#8211; and starts to lower the attack surface area. The other priority is to lower the attach service area by removing unnecessary software and services.</p>
<p>The post <a href="https://pfp-solutions.com/meltdown-issues-cpu-microcode-fixes-need-risk-assesments/">Meltdown &#8211; Issues with CPU microcode fixes and the need for risk assessments</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Children and the GDPR</title>
		<link>https://pfp-solutions.com/children-and-the-gdpr/</link>
		
		<dc:creator><![CDATA[garsidea]]></dc:creator>
		<pubDate>Sun, 14 Jan 2018 19:45:23 +0000</pubDate>
				<category><![CDATA[Patching]]></category>
		<guid isPermaLink="false">http://pfp-solutions.com/?p=111</guid>

					<description><![CDATA[<p>The Information Commissioner has released new guidance on Children and the GDPR https://ico.org.uk/about-the-ico/consultations/children-and-the-gdpr-guidance/</p>
<p>The post <a href="https://pfp-solutions.com/children-and-the-gdpr/">Children and the GDPR</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Information Commissioner has released new guidance on Children and the GDPR</p>
<p>https://ico.org.uk/about-the-ico/consultations/children-and-the-gdpr-guidance/</p>
<p>The post <a href="https://pfp-solutions.com/children-and-the-gdpr/">Children and the GDPR</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Complete List Of CPUs Vulnerable To Meltdown / Spectre</title>
		<link>https://pfp-solutions.com/complete-list-cpus-vulnerable-meltdown-spectre/</link>
		
		<dc:creator><![CDATA[garsidea]]></dc:creator>
		<pubDate>Sun, 14 Jan 2018 19:40:08 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://pfp-solutions.com/?p=109</guid>

					<description><![CDATA[<p>TECHARP has published a complete list of the CPUs impacted by Meltdown and Spectre &#8211; https://www.techarp.com/guides/complete-meltdown-spectre-cpu-list/2/ &#160;</p>
<p>The post <a href="https://pfp-solutions.com/complete-list-cpus-vulnerable-meltdown-spectre/">Complete List Of CPUs Vulnerable To Meltdown / Spectre</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TECHARP has published a complete list of the CPUs impacted by Meltdown and Spectre &#8211;<br />
https://www.techarp.com/guides/complete-meltdown-spectre-cpu-list/2/</p>
<p>&nbsp;</p>
<p>The post <a href="https://pfp-solutions.com/complete-list-cpus-vulnerable-meltdown-spectre/">Complete List Of CPUs Vulnerable To Meltdown / Spectre</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Guide to Meltdown Added</title>
		<link>https://pfp-solutions.com/guide-meltdown-added/</link>
					<comments>https://pfp-solutions.com/guide-meltdown-added/#respond</comments>
		
		<dc:creator><![CDATA[garsidea]]></dc:creator>
		<pubDate>Sat, 13 Jan 2018 15:12:27 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://pfp-solutions.com/?p=105</guid>

					<description><![CDATA[<p>A guide to the Meltdown exploit has been added &#8211; Meltdown &#8211; How does it work</p>
<p>The post <a href="https://pfp-solutions.com/guide-meltdown-added/">Guide to Meltdown Added</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A guide to the Meltdown exploit has been added &#8211;<br />
<a href="https://pfp-solutions.com/meltdown-exploit">Meltdown &#8211; How does it work</a></p>
<p>The post <a href="https://pfp-solutions.com/guide-meltdown-added/">Guide to Meltdown Added</a> appeared first on <a href="https://pfp-solutions.com">pfp Solutions Ltd</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pfp-solutions.com/guide-meltdown-added/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
