1 Enforcing Compliance: A Patch Management Strategy That Works.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

<<replace with Customer Logo>>
SL21 Information Security Board Mission, Goals and Guiding Principles.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Best Practices – Overview
Computer Security: Principles and Practice
Implementation. We we came from… Planning Analysis Design Implementation Identify Problem/Value. Feasibility Analysis. Project Management. Understand.
Stephen S. Yau CSE , Fall Security Strategies.
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
ITIL: Why Your IT Organization Should Care Service Support
TELLEFSEN AND COMPANY, L.L.C. SEC Regulation SCI and Automation Review Policy Compliance March 2013 Proprietary and Confidential.
Change Management Chris Colomb Trish Fullmer Jordan Bloodworth Veronica Beichner.
Network security policy: best practices
ITIL Process Management An Overview of Service Management Processes Presented by Jerree Catlin, Sue Silkey & Thelma Simons.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Patch Management Strategy
© 2006 Jupitermedia Corporation Webcast TitleThe True Value of Change Management 1 March 23, :00pm EST, 11:00am PST George Spafford, President, Spafford.
> Blueprint Kickoff >. Introductions Customer Vision & Success Criteria Apigee Accelerator Overview Blueprint Schedule Roles & Responsibilities Communications.
Change Advisory Board COIN v1.ppt Change Advisory Board ITIL COIN June 20, 2007.
© 2007 Jupitermedia Corporation Understanding the ITIL Trinity of Configuration, Change and Release Management June 28, :00pm EDT, 11:00am PDT George.
Release & Deployment ITIL Version 3
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
The Evergreen, Background, Methodology and IT Service Management Model
HIPAA COMPLIANCE WITH DELL
Microsoft Project Management Enterprise Services Framework Review Role of MSF in Project Management Role of MOF in Project Management.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
COMP-14: Automating your deployments using ANT Gary S Clink Business Consultant.
ITIL Process Management An Overview of Service Management Processes Thanks to Jerree Catlin, Sue Silkey & Thelma Simons University of Kansas.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Module 14: Configuring Server Security Compliance
Event Management & ITIL V3
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Change and Patch Management Controls
Assessment Workshop Title of the Project (date). Project Title Assessment Workshop October 25, 2015© Company Name All rights reserved2 Agenda Purpose.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
IMFO Annual Conference – 2015 S21: Good Governance & Oversight B2B.
Construction, Testing, Documentation, and Installation Chapters 15 and 16 Info 361: Systems Analysis and Design.
© 2007 Jupitermedia Corporation Using Network Behavior Analysis (NBA) and Service Asset and Configuration Management (SACM) to Improve Management Information.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
The Implementation of BPR Pertemuan 9 Matakuliah: M0734-Business Process Reenginering Tahun: 2010.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
State of Georgia Release Management Training
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
HDI South Florida $$$ ITIL JEOPARDY $$$ Jeopardy Game Show.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
ITIL: Service Transition
ITIL: Why Your IT Organization Should Care Service Support
ITIL: Why Your IT Organization Should Care Service Support
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Assessment Workshop Title of the Project (date)
Drew Hunt Network Security Analyst Valley Medical Center
IS4680 Security Auditing for Compliance
ITIL: Why Your IT Organization Should Care Service Support
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
Presentation transcript:

1 Enforcing Compliance: A Patch Management Strategy That Works

2 Copyright Notices ITIL® is a registered trademark of the UK Office of Government Commerce. ITIL® is a registered trademark of the UK Office of Government Commerce. Visible Ops is the trademark of the IT Process Institute ( Visible Ops is the trademark of the IT Process Institute ( All other trademarks and company names are the property of their respective owners. All other trademarks and company names are the property of their respective owners. This webinar is the property of Spafford Global Consulting, Inc. This webinar is the property of Spafford Global Consulting, Inc.

3 Overview Patching Challenges Patching Challenges Policies and Procedures Policies and Procedures Change Management Change Management Release Management Release Management Metrics Metrics Questions and Answers Questions and Answers

4 Question Do you have a Change Management process? Do you have a Change Management process? 1. Yes 1. Yes 2. We are in the process of developing one 2. We are in the process of developing one 3. No 3. No

5 Question How familiar are you with the Information Technology Infrastructure Library (ITIL) as it pertains to Service Support? How familiar are you with the Information Technology Infrastructure Library (ITIL) as it pertains to Service Support? 1. Not familiar 1. Not familiar 2. Have heard of it 2. Have heard of it 3. Somewhat familiar 3. Somewhat familiar 4. Familiar 4. Familiar 5. Very familiar, refer to it routinely. 5. Very familiar, refer to it routinely.

6 Patching Challenges Patches are time consuming to assess and apply. Patches are time consuming to assess and apply. Patches are released constantly. Patches are released constantly. They fail during installation. They fail during installation. They cause services to fail. They cause services to fail. One patch can undo another patch. One patch can undo another patch. They can introduce errors. They can introduce errors. Developing policies and procedures that work. Developing policies and procedures that work.

7 Policies and Procedures We want to use standards to reduce variation We want to use standards to reduce variation Standardization can help improve security and compliance postures while managing costs Standardization can help improve security and compliance postures while managing costs Policies and procedures need to be realistic and add value Policies and procedures need to be realistic and add value Shelfware achieves nothing – the policies and procedures must be feasible and make a positive difference (WIIFM) Shelfware achieves nothing – the policies and procedures must be feasible and make a positive difference (WIIFM) Getting started is the hardest part. Use your best and brightest people to develop policies and procedures. Getting started is the hardest part. Use your best and brightest people to develop policies and procedures. So … where do we start? So … where do we start?

8 Don’t rush to apply patches immediately! Uncontrolled change can do more harm than good! Many high-performing IT organizations do not rush their patches and, in fact, patch less frequently. Moreover, they do not patch production systems directly! They do so in pre-production.

9 Defense in Depth Think of the rings of walls in a castle. More walls equate to an overall better defensive posture. Think of the rings of walls in a castle. More walls equate to an overall better defensive posture. Processes, systems and people always have variation – go for layers. Processes, systems and people always have variation – go for layers. The idea is to layer controls in a cost effective fashion. The idea is to layer controls in a cost effective fashion. If the first control fails, then there is a second, etc. If the first control fails, then there is a second, etc. Compensating Controls Compensating Controls Firewall – perimeter and segments Firewall – perimeter and segments Network Segmentation Network Segmentation Intrusion Detection Systems Intrusion Detection Systems Log Monitoring / Alerting / Security Event Management (SEM) Log Monitoring / Alerting / Security Event Management (SEM) Antivirus/Anti-malware on clients, hosts, gateways Antivirus/Anti-malware on clients, hosts, gateways Integrity Management Systems Integrity Management Systems Control 3 Control 2 Control 1

10 What are we really talking about? Change and Release Management with support from Configuration Management

11 ITIL Definitions Change Management Is the set of standardized processes and tools used to handle change requests in order to support the business while managing risks. Change Management Is the set of standardized processes and tools used to handle change requests in order to support the business while managing risks. Release Management Uses formal controls and processes to safeguard the production environment. Release Management Uses formal controls and processes to safeguard the production environment. Configuration Management Focuses on tracking and documenting configurations and then providing this information to other areas including Change and Release Management. Configuration Management Focuses on tracking and documenting configurations and then providing this information to other areas including Change and Release Management.

12 Human Error is Huge! May 17, 2005 – Third annual CompTIA study shows human error still counts for the majority of security incidents – 79.3%. That number is virtually the same as May 17, 2005 – Third annual CompTIA study shows human error still counts for the majority of security incidents – 79.3%. That number is virtually the same as Comp TIA, Human error accounts for 80% of network availability issues. -- Stephen Elliott, Senior Analyst, Network and Service Management, IDC 2004 Human error accounts for 80% of network availability issues. -- Stephen Elliott, Senior Analyst, Network and Service Management, IDC 2004

13 Change Management is the organization’s last firewall against human error and malicious activity before production.

14 Phase I: Ungoverned Change time Change rate Failed changes and/or Number of unauthorized changes Unplanned work (Unplanned work > 100%) Source: IT Process Institute,

15 Phase I: Stabilized Patient time Change rate Failed changes or Num of unauth chgs Unplanned work Source: IT Process Institute,

16 What does this mean? If we can reduce the errors going into production, then unplanned work can be reduced. If we can reduce the errors going into production, then unplanned work can be reduced. If unplanned work is reduced, then projects can get done. If unplanned work is reduced, then projects can get done. If projects can get done, then, hopefully, IT is enabling the functional areas to move towards their objectives and the organization towards its goal. If projects can get done, then, hopefully, IT is enabling the functional areas to move towards their objectives and the organization towards its goal. By patching, or introducing change, IT should be adding value by enabling the business or assisting in the mitigation of risks. With uncontrolled change, IT adds risks. By patching, or introducing change, IT should be adding value by enabling the business or assisting in the mitigation of risks. With uncontrolled change, IT adds risks.

17 Process References For a definitive reference, see ITIL’s Service Support Volume For a definitive reference, see ITIL’s Service Support Volume Microsoft’s Operations Framework Microsoft’s Operations Framework British Educational Communications and Technology Agency (BECTA) British Educational Communications and Technology Agency (BECTA) IT Process Institute’s Visible Ops Methodology IT Process Institute’s Visible Ops Methodology

18 A Basic Change Management Process Identify a potential change Identify a potential change Create Request For Change (RFC) Create Request For Change (RFC) Seek Approval to Proceed Seek Approval to Proceed Plan the Change Plan the Change Plan & Prepare Plan & Prepare Test Test Develop Rollback Plan Develop Rollback Plan Peer Review Peer Review Seek Approval to Implement Seek Approval to Implement Deploy Deploy Review Review

19 What is Release Management? “The focus of Release Management is the protection of the live environment and its services through the use of formal procedures and checks.” – ITIL Service Support “The focus of Release Management is the protection of the live environment and its services through the use of formal procedures and checks.” – ITIL Service Support Release management is often squeezed between the development environment and production. Release management is often squeezed between the development environment and production. Production Environment Test Environment Development Environment Release Management

20 Release Management Processes To plan and oversee rollouts To plan and oversee rollouts Acceptance Testing Acceptance Testing Design and implement procedures for the distribution and installation of changes. Design and implement procedures for the distribution and installation of changes. Automation can reduce variation and speed deployment in known environments. Automation can reduce variation and speed deployment in known environments. This means that change, release and configuration management must work together. This means that change, release and configuration management must work together. To ensure only authorized and tested “releases” are deployed. To ensure only authorized and tested “releases” are deployed. Ensures that all master copies of software is stored in the Definitive Software Library (DSL) Ensures that all master copies of software is stored in the Definitive Software Library (DSL) Ensures that the Configuration Management Database (CMDB) appropriately reflects new Releases. Ensures that the Configuration Management Database (CMDB) appropriately reflects new Releases.

21 A Sample Process Development/Engineering/Security identifies potential patches. Development/Engineering/Security identifies potential patches. Change Management reviews the RFCs for the patches and, if approved, do the planning, testing, etc. Change Management reviews the RFCs for the patches and, if approved, do the planning, testing, etc. Approved patches/changes are reviewed and consolidated into a given release. Approved patches/changes are reviewed and consolidated into a given release. Integration testing is performed and requires effective Configuration Management. Integration testing is performed and requires effective Configuration Management. Once tested and accepted, approved releases are stored in the Definitive Software Library (DSL). Once tested and accepted, approved releases are stored in the Definitive Software Library (DSL). Releases and schedules are communicated. Releases and schedules are communicated. Operations then reviews the Release, formally accepts and deploys the Release from the DSL. Operations then reviews the Release, formally accepts and deploys the Release from the DSL. The more automated the deployment, the better as it reduces the possibility of human error but necessitates solid Change and Configuration Management. The more automated the deployment, the better as it reduces the possibility of human error but necessitates solid Change and Configuration Management. Patch 1Patch 2Patch 3 Release Planning Integration Testing Authorized Release Change Management

22 Metrics to consider Total Number of Changes Total Number of Changes Total Number of Emergency Changes Total Number of Emergency Changes Total Number of Service Affecting Outages Total Number of Service Affecting Outages % of Successful Changes (Meaning they installed according to plan) % of Successful Changes (Meaning they installed according to plan) Mean Time To Repair Mean Time To Repair Availability Availability Unplanned work Unplanned work

23 In Summary Patches are changes and must follow the organization’s Change and Release Management processes. Patches are changes and must follow the organization’s Change and Release Management processes. The goal is to manage risks and add value – not just to patch for the sake of patching. The goal is to manage risks and add value – not just to patch for the sake of patching.

24 Thank you! George Spafford Daily News Archive