Security Patching.

Slides:



Advertisements
Similar presentations
Steve Lewis J.D. Edwards & Company
Advertisements

4/14/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
The State of Security Management By Jim Reavis January 2003.
Dashboard Company Settings Controlled Online Accounting.
Patch Management In Solaris and Red Hat. What is a Patch A collection of fixes to a problem Three main categories: Security Bugs in the system that provide.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Monitor Linux OS health & performance Monitor log files Monitor JEE app servers Monitor line-of-business applications Monitor databases and web.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Patch Management Strategy
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Vulnerabilities. flaws in systems that allow them to be exploited provide means for attackers to compromise hosts, servers and networks.
FNAL Configuration Management Jack Schmidt Cyber Security Workshop May th 2006.
Tim Vander Kooi Systems
UNM IT Managed Workstations. Benefits of Managed Workstations  Standard software with uniform configuration ensures end users have the same set of applications.
Agency Security Update Service (ASUS) Mike Bolger KSC CIO.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Patch Management Only part of the solution….. Bob Isaak Mar 04, 2004.
Harris Schneiderman Account Manager Kloud Solutions.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Eyes Off Glass Dinesh Gode Sr. Technical Specialist Oct 9, 2007.
A Networked Machine Management System 16, 1999.
TIF-Security Update Robert Ono, IT Security Coordinator October 2010.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Overview-TPV Service Delivery
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Zscaler Support Best Practices Guide Version September 27, 2016.
Phase 4: Manage Deployment
Lesson 19: Configuring and Managing Updates
Understanding The Cloud
Cybersecurity - What’s Next? June 2017
OCP Hardware Management
Critical Security Controls
Backup, Archive & Recovery
CompTIA Security+ SY0-401 Real Exam Question Answer
Overview – SOE PatchTT November 2015.
Overview – SOE PatchTT December 2013.
HPE OneView for Microsoft System Center
Replace with Application Image
Shifting from “Incident” to “Continuous” Response
Figure 6-4: Installation and Patching
Chapter 7 Electronic Business Systems
Panda Adaptive Defense Platform and Services
IS3440 Linux Security Unit 8 Software Management
Enterprise Program Management Office
Increase and Improve your PC management with Windows Intune
Microsoft Virtual Academy
Chapter 7 Electronic Business Systems
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Microsoft Virtual Academy
IT Management Services Infrastructure Services
Security in the Real World – Plenary Day One
Implementing Security Patch Management
Objectives. Objectives Objectives Content Configure Microsoft Azure monitor.
OSL150 – Get Hands on with Ivanti Endpoint Security
Anatomy of a Common Cyber Attack
Risk-Based Vendor Management
John Taylor, Deputy CISO Martin Myers, IT Architect
Presentation transcript:

Security Patching

Benefits of Security Patching Mitigates software vulnerabilities, reducing risk of system exploitation Maintains software and systems at vendor baseline, reducing future performance issues Reduces risk of theft of Sensitive information (e.g., personal, proprietary, controlled) Reduces risk of malware injection into proprietary products Important part of system and software maintenance

Know Which Security Patches are Needed Identify Operating System and applications by version on the network Use vendor proprietary tools to identify systems that require patches Sign-up with vendors for notification of new security patches for specific versions in use - eliminates wasted labor reviewing patch advisories for versions not in use Purchase a security service that tracks and sends vulnerability alerts for security patches released by vendors – includes risk data for SLA decisions: Ex: https://www.riskbasedsecurity.com/ Sign-up with cyber-security organizations to receive vulnerability newsletters Ex: https://www.sans.org/newsletters/at-risk Ex: https://www.us-cert.gov/ncas/alerts Monitor cyber-security websites that discuss vulnerabilities Ex: https://nvd.nist.gov/ Ex: https://cve.mitre.org/

Use Automation to Test & Deploy Patches System Center Configuration Manager (SCCM) Use to deploy Microsoft and other vendor security patches Use to identify applicable systems – target list Use to generate compliance reports on patched percent Vendor proprietary automation tool to identify and patch systems using enterprise admin console & agent on systems SCCM – Microsoft: https://www.microsoft.com/en-us/cloud-platform/system-center-configuration-manager Red Hat Satellite Server https://access.redhat.com/products/red-hat-satellite Deploy patches to test development group/s – identify groups for specific products If no issues, approve PRODUCTION patch deployment across the network

Company Policy & Communications Identify standard security patching schedules so internal customers can plan work around patching tasks High risk vulnerabilities – test immediately and patch once testing is complete Via announcements, make employees aware of security patching prior to patch deployment Let employees know whether patching will require reboot of system Coordinate patching of servers with server stakeholders