Virtual Patching with Device Security
Virtual patching provides network-level protection for OT and
IoT devices that cannot be easily patched due to operational
constraints.
Where Can I Use This? | What Do I Need? |
|
One of the following subscriptions:
Device Security subscription for an advanced
Device Security product (Enterprise,
OT, or Medical)
Device Security X subscription
|
Virtual patching provides the capability to mitigate risks in OT
and IoT environments where operational constraints make it
difficult to patch devices. With virtual patching, you can deploy
network-level protections through your next-generation firewall
rather than applying patches directly to the vulnerable devices.
Virtual patching maps CVEs to existing threat signatures. From
there, you can review the vulnerability and create security
policies that block malicious traffic targeting the
vulnerability.
Some OT and IoT environments face significant patching challenges
due to a variety of factors. Legacy systems often lack vendor
support for updates, critical infrastructure requires extended
maintenance windows that conflict with security timelines, long
operating periods extend the time between maintenance windows, or
updates may require long recertification cycles. Virtual patching
addresses these issues by providing the ability to prevent the
exploitation of vulnerabilities at the network level.
Virtual patching integrates asset discovery, risk assessment, and
automated policy deployment features within Device Security.
You can identify vulnerable devices, assess their risk levels, and
receive guided recommendations for deploying compensating controls.
Device Security verifies that appropriate threat signatures
exist for specific vulnerabilities and helps you create
least-privilege security policies with vulnerability protection
profiles. When you deploy these policies, you can extend the
operational life of legacy systems while meeting regulatory
compliance that requires documented risk mitigations.
To use Virtual Patching effectively in Strata Cloud Manager, you
need NGFW deployments with the latest Advanced Threat Protection
version, a Device Security license, and Strata Cloud Manager
for policy management.
When using Panorama for NGFW management, you can do Virtual Patching by attaching
the Vulnerability Protection Profile to the
Security policy rules in Panorama. In this case,
Device Security provides asset visibility, vulnerability
identification, and threat signature mapping, while Panorama
provides the policy management and enforcement
capabilities.