PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.

Slides:



Advertisements
Similar presentations
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Change Manager.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Boost your network security with NETASQ Vulnerability Manager.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Computer Security: Principles and Practice
1 Secure Your Business PATCH MANAGEMENT STRATEGY.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Remedy, a BMC Software company Change Management Maximize Speed and Minimize Risk in the Change Process.
Software Asset Management
5205 – IT Service Delivery and Support
IT ASSET MANAGEMENT (From Booz-Allen & Hamilton).
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
IT:Network:Microsoft Applications
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
SEC835 Database and Web application security Information Security Architecture.
The Evergreen, Background, Methodology and IT Service Management Model
Entré NetMonitor Proactive IT monitoring, Management and support Think DIFFERENT about IT.
The Microsoft Office 2007 Enterprise Project Management Solution:
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Talking points Attacks are more frequent, more aggressive, require more time to repair and prevent Machines get compromised in 2003 for the same reasons.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
Service Transition & Planning Service Validation & Testing
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Copyright Security-Assessment.com 2004 Vulnerability Management Explained By Peter Benson.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Appendix C: Designing an Operations Framework to Manage Security.
Auditing IT Vulnerabilities IT vulnerabilities are weaknesses or exposures in IT assets or processes that may lead to a business risk or security risk.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Microsoft Management Seminar Series SMS 2003 Change Management.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CSCE 548 Secure Software Development Security Operations.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
GRC: Aligning Policy, Risk and Compliance
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
1 What will be the Coming Super Worms and Viruses By Alan S H Lam.
Managed IT Solutions More Reliable Networks Are Our Business
Critical Security Controls
Patch Management Patch Management Best Practices
Compliance with hardening standards
Putting It All Together
Putting It All Together
Leverage What’s Out There
Speaker’s Name, SAP Month 00, 2017
Transforming IT Management
Skybox Cyber Security Best Practices
Cybersecurity Threat Assessment
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004

Code Red – July 2001 July 19, 2001 – 159 hosts infected

Code Red – July hours later – 4,920 hosts infected

Code Red – July hours later (24 total) – 341,015 hosts infected

SQL SLAMMER WORM JANUARY 2003 same spread in TEN MINUTES Slammer was nasty. In the first minute of its life, it doubled the number of machines it infected every 8.5 seconds. (Just to put that in perspective, the Code Red virus concerned experts because it doubled its infections every 37 minutes. Slammer peaked in just three minutes, at which point it as scanning 55 million targets per second.) [thank goodness there are natural limits to this kind of growth and thank goodness Slammer didn't have a really nasty payload]

Early 2004 Status Update Automated attacks are successfully exploiting these software vulnerabilities, as increasingly sophisticated hacking tools become more readily available and easier to use. Since 1995, over 15,000 security vulnerabilities in software products have been reported. Attacks such as viruses and worms that once took weeks or months to propagate over the Internet now take only hours, or even minutes. Patch Management is a critical strategic means of dealing with these increasing vulnerabilities. Requires Management support, standardized policies, minimizing dedicated resources, risk assessment and testing.

Challenges What to patch first??? Two myths: –The threat of attack from insiders is less likely and more tolerable than the threat of attack from outsiders. –A high degree of technical skill is required to successfully exploit vulnerabilities, making the probability of attack unlikely. Threat profile and potential risks continue to increase Virus/Worm can now be delivered through common entry points, automatically executed, and then search for exploitable vulnerabilities on other platforms.

Challenges New vulnerabilities released daily Widespread publicity leads to releases of exploits Vendors must provide quick turnaround on patches

Business-Centric Approach Patch Management is a Process, not a Tool Link Business Objectives to Network Solutions –Quantify value of new initiatives –Optimize existing infrastructure –Identify best solutions –Employ proven best practices and methodologies –Foster collaborative culture –Institute formal quality program from outset

Cost of Patching Cost to Patch = (Hours x Rate x Systems) + (Patch Failure% x (Hours x Rate x Systems)) So, if it takes an army of $70/hour technicians one hour to patch a system, and there are 2,000 systems, the cost is $140,000. If you estimate that 5 percent of the patches fail, and figure an average of two hours of recovery time (which includes help desk and IT support activities), that's 100 systems at $140 each -- another $14,000. Another source quotes $234 per patch per desktop for a medium to large US organization

Cost of NOT Patching Lost productivity for the end user Lost productivity for IT support personnel Loss of revenue (direct) Legal/regulatory costs Intellectual property losses Loss of stored assets (financial)

What to do: Analysis Baseline production systems Gather comprehensive hardware and software inventory Use the information to define standard software baselines Perform an audit to determine deviations from baseline Install service packs and necessary software updates An accurate software inventory is vital Base lining provides additional benefits that streamline patch management. Develop consistent standard software images Perform risk assessment to identify and assign value to assets to determine patching priorities

What to do: Analysis Assess each computer for patches required –Scan for new vulnerabilities Automate as much as possible Occur on a regular basis – daily, weekly –Promptly notify administrators of new vulnerabilities Enables faster response and proactive remediation –Aggregate results across the environment Simplifies analysis

What to do: Keep Track Patch Monitoring and Discovery –Build procedures for monitoring patches as they are released. –Include monitoring of all appropriate security intelligence sources required to identify any exposures or vulnerabilities that may impact the organization.

What to do: Test Most important aspects of patch management Bugs can occur in all software – patches are no exception Patches may introduce unintended consequences and break existing software Structured Patch Evaluation testing methodology Define risks for testing servers and desktops –Usefulness may depend on security policies in place –Optimize based on complexity, resources and time Match system configurations of test computers to production computers Test vulnerability and system/application stability Investigate, evaluate and test patches in accordance with business objectives, security and IT operational goals.

What to do: Distribute Policy based distribution –More efficient management Less administrative overhead Faster remediation –Ensures configuration for business continuity In a 6-12 month period, 20% of computers become unpatched. Reinstalls software if uninstalled Targeted Distribution –Flexible targeting based on prioritization –Develop tools and templates to integrate with your change management policy. –Develop procedures for the patch to go from testing, to implementation, including updating standard builds as needed.

What to do: Monitoring Ongoing monitoring Detailed reporting covering the entire patch process –Scan results –Distribution process –Installation status Patch Maintenance Develop tracking and reporting mechanisms Develop security awareness processes

Benefits Proactively identify and remediate IT security vulnerabilities Focuses IT and security on the right set of problems to address Improved service performance and availability by optimizing business and systems processes Adds value to ongoing business initiatives, business continuity, reducing operating costs, and security mandates