6 steps firms can take to defend against Spectre and Meltdown.jpg
6 steps firms can take to mitigate Spectre and Meltdown risks
“Spectre" and "Meltdown" are the code names given to different strains of a new class of security attacks that target an underlying exploitable design implementation inside the majority of computer chips manufactured over the last 20 years. Security researchers revealed three major variants of attacks in January 2018. The first two are referred to as Spectre, the third as Meltdown, and all three variants involve speculative execution of code to read what should have been protected memory and the use of subsequent side-channel-based attacks to infer the memory contents. Gartner has identified six steps security leaders can take to mitigate risk.

Ensure that all code is trustworthy.jpg
Ensure that all code is ‘trustworthy’
“Modern operating systems and hypervisors depend on structured, layered permission models to deliver security isolation and separation,” Gartner researchers say. “Because this exploitable design implementation is in hardware — below the OS and the hypervisor — all software layers above are affected and vulnerable. However, memory can only be read, but not altered. Exploitation of the flaw requires untrusted code to be introduced and executed on the target system, which should be extremely difficult on a well-managed server or appliance such as a network or storage appliance. There is also an advantage in not rushing to "panic patch." Early patches created conflicts with some antivirus offerings and locked up Windows desktops. Some conflicted with the use of AMD microprocessors, so that the systems would not boot. Other early patches had performance impacts that have been improved by subsequent patches.”
Perform a thorough risk assessment of all systems and devices.jpg
Perform a thorough risk assessment of all systems and devices
Take advantage of application control and whitelisting.jpg
Take advantage of application control and whitelisting
“The vulnerabilities are not directly remotely exploitable,” Gartner researchers explain. “A successful attack requires the attacker to execute code on the system. As such, application control and whitelisting on all systems greatly reduce the risk of unknown code execution. However, shared infrastructure as a service (IaaS) infrastructure is particularly vulnerable until the cloud providers update their underlying firmware and hypervisor layer (which the leading providers have done). Strong separation of duties (SOD) and privileged account management (PAM) reduce the risk of the introduction of untrusted code."
Devise a strategy with prioritized phases.jpg
Devise a strategy with prioritized phases
When devising a remediation strategy, Gartner recommends breaking the strategy into prioritized phases, because the risk, performance implications and potential hardware upgrades required will vary greatly among use cases. Start with systems that represent the most risk — desktops, virtual desktop infrastructure (VDI), smartphones and externally facing servers.
Understand when patching is recommended and when it isnt.jpg
Understand when patching is recommended and when it isn’t
“Information security leaders need to be prepared for scenarios in which the appropriate decision is not to patch,” Gartner researchers say. “In some cases, this will be due to lack of patches on older systems. In other cases, the impact on performance is not offset by the reduction in risk, so patches will not be applied. Even for some well-managed servers, the decision may be made to forgo patches to protect performance until future patches have demonstrably acceptable impacts. However, for server workloads, when the performance characteristics allow, Gartner recommends patching and firmware upgrades.”

Implement restrictions against unknown or untrusted code.jpg
Implement restrictions against unknown or untrusted code
“For systems that are not patched or only partially patched, multiple mitigating controls can reduce risk,” according to Gartner researchers. “The single most important issue to address is restricting the ability to place unknown or untrusted code onto the device. By reducing this, risks are significantly lowered, because attacks require local code execution. For all systems, this means taking a "default deny" approach, and application control and whitelisting greatly reduce the risk. To the extent that public attacks become known, traditional endpoint protection platforms and network-based intrusion prevention systems also mitigate the risk.”