ITBusiness.ca

Windows XP end of support – Mitigating the security concerns

Only a few more days now, and Windows XP will officially be end of life.  April 8, 2014 will be the last day that Windows XP or Office 2003 receive any bug fixes of any sort.  Of greatest concern, this means they will both stop receiving fixes for security vulnerabilities.  If a vulnerability is found any time after April 8, then attackers will enjoy its use for the foreseeable future.

“But I have to keep Windows XP”

I’ve heard all sorts of reasons why people will be running Windows XP past April 8, but if I get rid of the foolish reasons, it boils down to the following list:

Dispelling a few of these reasons

This article is supposed to be about mitigating XP security issues while you have it, so I won’t spend a lot of time harping on about this, but if you are keeping XP for support reasons, I hate to be the one to point out that the platform the legacy application is sitting on isn’t supported, so I don’t understand the support argument.  If it’s a control system or its business critical and it can’t be made to work on Windows 7 or newer, then I understand you may need a bit more time to finance and solution a transition plan.

If you are purely trying to keep XP going as long as possible to save money, then let me be the first to promise you that keeping XP alive once life support is pulled on April 8 it is going to cost a whole tonne more money than migrating, even if it does mean a large purchase of hardware and software licenses.

Mitigation techniques – From best to worst

1. CLEAR WINNER: Terminal Services 2003 / Citrix XenApp

2. Air gap (Unplug either the PC or the network it is on)

3. Network isolation

4. Quasi-Isolation

5. Depend on End-Point Protection (HIPS/AV)

6. Prayer

7. Virtualization

Time to Move

Depending on your specific situation and functionality requirements, you can use some, all, or a blend of the above seven mitigation techniques to continue with Windows XP past its support date. It remains to be seen exactly what flaws will be uncovered and what attack vectors are required to exploit them.  Only time will tell.  In the interim, the best strategy is to accelerate your migration to a newer operating system. If that isn’t possible right away – layer on as much defence as you can and hope for the best.

Exit mobile version