Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2003 Spire Security. All rights reserved. security i SPRE Expert’s guide for effective patch management Pete Lindstrom, CISSP Research Director Spire.

Similar presentations


Presentation on theme: "© 2003 Spire Security. All rights reserved. security i SPRE Expert’s guide for effective patch management Pete Lindstrom, CISSP Research Director Spire."— Presentation transcript:

1 © 2003 Spire Security. All rights reserved. security i SPRE Expert’s guide for effective patch management Pete Lindstrom, CISSP Research Director Spire Security, LLC www.spiresecurity.com petelind@spiresecurity.com

2 © 2004 Spire Security. All rights reserved. 2 Agenda  Vulnerability Lifecycle  When to Patch Decision  Patch Management Process  Example + ROI  Key Criteria for Automated Patch Management

3 © 2004 Spire Security. All rights reserved. 3 Vulnerability Lifecycle 1.Vulnerability Created (latent) 2.Vulnerability Discovered 3.Vulnerability Disclosed 4.Patch Released 5.Exploit & Intrusions 6.Patches Applied

4 © 2004 Spire Security. All rights reserved. 4 less Vulnerability Lifecycle vulnerability created vulnerability discovered vulnerability disclosed patch released exploit zone patches applied “responsible” disclosure more Time patch zonesafe zone bigger is bettersmaller is better Can I mitigate? FOCUS HERE

5 © 2004 Spire Security. All rights reserved. 5 Decision: When to Patch  Too soon may lead to failures caused by the cure.  Too late may lead to compromised systems.  The answer: Compare the costs of patching/not patching and patch when it is cheaper.  “Timing the Application of Security Patches for Optimal Uptime” – Beattie et.al. http://nxnw.org/~steve/papers/lisa2002-time-to-patch.pdf http://nxnw.org/~steve/papers/lisa2002-time-to-patch.pdf

6 © 2004 Spire Security. All rights reserved. 6 Decision Options Am I at risk? Can I turn it off?Can I block it? Can I patch it? mitigateeliminate remediate

7 © 2004 Spire Security. All rights reserved. 7 Timing Virus/WormExploit DateVuln DateDays MyDoom1/26/04nonen/a Blaster8/11/037/16/0326 days Sobig8/18/03nonen/a WebDAV3/10/033/17/03*-7 days Slammer1/25/037/24/02170 days Slapper9/13/027/30/0245 days Nimda9/18/013/29/01 & 5/16/01 125 days Code Red7/16/016/18/0128 days

8 © 2004 Spire Security. All rights reserved. 8 Cost Elements  Cost to apply patches  Cost to recover from failed patches  Cost to recover from incidents and breaches

9 © 2004 Spire Security. All rights reserved. 9 Cost to Patch  IT time to identify, assess, test, apply, validate patches.  End user lost productivity.  Risk-adjusted cost of patch failure.  Patch + r(Recover)

10 © 2004 Spire Security. All rights reserved. 10 Cost to Not Patch  Lost productivity for the end user  Lost productivity for IT support personnel  Loss of revenue (direct)  Legal/regulatory costs  Intellectual property losses  Loss of stored assets (financial) …all risk adjusted

11 © 2004 Spire Security. All rights reserved. 11 Adjusting for Risk  Look at past history: oWhat % of systems hit in past? oWhat % of patches fail on what % of systems?  Guesstimate using reasonable numbers.  Use industry averages… oh, none exist.

12 © 2004 Spire Security. All rights reserved. 12 An Example  2,000 Systems  $70/hr IT support  1 hour to patch / 2 hours to recover  10% likelihood of patch failure  20% likelihood of compromise (pre-exploit)

13 © 2004 Spire Security. All rights reserved. 13 A Simple Example  Pre-exploit, manual patching  Cost to Patch: o2,000 x 70 = $140,000 oFail: 10% x 2,000 x 70 = $14,000 oTotal cost: $154,000  Cost not to Patch: o2,000 x 140 x 20% = $56,000  Decision: Don’t Patch

14 © 2004 Spire Security. All rights reserved. 14 A Simple Example (2)  Post-exploit, manual patching oIncreases risk of compromise to 80%  Cost to Patch: o2,000 x 70 = $140,000 oFail: 10% x 2,000 x 70 = $14,000 oTotal cost: $154,000  Cost not to Patch: o2,000 x 140 x 80% = $224,000  Decision: Patch

15 © 2004 Spire Security. All rights reserved. 15 A Simple Example (3)  Pre-exploit, automated patching  Assume 1 patch per month  Cost to Patch: oSoftware Costs = $48,000 o1/12 of $48k = $4,000 oFail: 10% x 2,000 x 70 = $14,000 oTotal cost: $18,000  Cost not to Patch: o2,000 x 140 x 20% = $56,000  Decision: Patch

16 © 2004 Spire Security. All rights reserved. 16 A Simple Example - ROI  Compare two patch scenarios:  Manual process: $154,000  Automated process: $18,000  ROI: $136,000

17 © 2004 Spire Security. All rights reserved. 17 Patch Management Process  Identify – new patches.  Assess – applicability to environment.  Test – patches for need and interoperability.  Apply – patches to all appropriate systems.  Review – patch progress and history.

18 © 2004 Spire Security. All rights reserved. 18 Key Features – Automated Patch Mgt  Platform Coverage  Research Depth  Workflow  Controlled Rollout  Validation  Rollback

19 © 2004 Spire Security. All rights reserved. 19 Platform Coverage / Research  Operating Systems  Packaged Applications  Custom Applications  Vendor Information Pass-thru  Independent Analysis  Independent Testing

20 © 2004 Spire Security. All rights reserved. 20 Workflow  Task Assignments  Scheduling  Approval System  Connect to CRM

21 © 2004 Spire Security. All rights reserved. 21 Controlled Rollout  Group by system type or function  Queuing of patches  Bandwidth throttling  Store and forward

22 © 2004 Spire Security. All rights reserved. 22 Validation/Rollback  Progress report  Verify patch application  Rollback for patch failures  Final report and review

23 © 2004 Spire Security. All rights reserved. 23 Architecture  Communications  Agent/Agentless  Push/Pull  Hierarchies/Peers oServers oadministration

24 © 2004 Spire Security. All rights reserved. 24 Deployment Options  Scripts  Remote control solutions (Auto Update or internal)  Asset/Inventory solutions  Patch Management solutions

25 © 2004 Spire Security. All rights reserved. 25 Patch Management Solutions  Shavlik  Ecora  Patchlink  Bigfix  Altiris  GFILanguard http://www.ntbugtraq.com/patchresults.asp

26 © 2004 Spire Security. All rights reserved. 26 Microsoft Options  Windows Update  Microsoft Baseline Security Advisor (MBSA)  Software Update Services (SUS)  Systems Management Server (SMS)  Office Update  Microsoft Update/SUS 2.0

27 © 2003 Spire Security. All rights reserved. security i SPRE Pete Lindstrom petelind@spiresecurity.com www.spiresecurity.com Agree? Disagree?

28 © 2004 Spire Security. All rights reserved. 28 For more information Thank you for joining us today. For more info on patch management, including an archive of this webcast and Pete’s presentation without audio, visit our Featured Topic: searchsecurity.com/featuredtopic/patchmanagement


Download ppt "© 2003 Spire Security. All rights reserved. security i SPRE Expert’s guide for effective patch management Pete Lindstrom, CISSP Research Director Spire."

Similar presentations


Ads by Google