Patch Management Good Practice Guideline

Size: px
Start display at page:

Download "Patch Management Good Practice Guideline"

Transcription

1 Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-INFR Prog. Director Chris Wilber Status Approved Owner James Wood Version 1.0 Author Gary Croft Version Date 02/10/2009 Patch Management Good Practice Guideline Crown Copyright 2010

2 Amendment History: Version Date Amendment History /03/2009 First draft for comment /04/2009 Second draft including comments /05/2009 Third draft including comments passed for final review /10/2009 Approved Forecast Changes: Anticipated Change When Annual Review October 2010 Reviewers: This document must be reviewed by the following: Name Signature Title / Responsibility Date Version Infrastructure Security Team James Wood Head of IT Security Approvals: This document must be approved by the following: Name Signature Title / Responsibility Date Version James Wood Head of IT Security 02/10/ Distribution: NHS Connecting for Health Information Governance Website Document Status: This is a controlled document. Whilst this document may be printed, the electronic version maintained in FileCM is the controlled copy. Any printed copies of the document are not controlled. 2

3 Related Documents: These documents will provide additional information. Ref no Doc Reference Number Title Version 1 NPFIT-SHR-QMS-PRP-0015 Glossary of Terms Consolidated.doc Latest 2 NPFIT-FNT-TO-IG-GPG-0033 Glossary of Security Terms ( rasec/gpg) Latest Glossary of Terms: List any new terms created in this document. Mail the NPO Quality Manager to have these included in the master glossary above [1]. Term Acronym Definition 3

4 Contents 1 About this Document Purpose Audience Content Disclaimer Introduction Background What is Patch Management? Functional Non-Functional Upgrades Vulnerability Disclosure Responsible Disclosure Partial Disclosure Full Disclosure No Disclosure What should be patched? Operating Systems Applications Firmware Patch Management Process Awareness Asset and Inventory Management Notifications WARP Vulnerability Management Systems Analysis Testing Preparation Change Management Emergency Change Management Deployment Monitoring

5 7 Other Considerations Mitigations Hardening Systems Patching Schedules Unsupported Systems Security Incident Management

6 1 About this Document 1.1 Purpose The purpose of this document is to offer advice and guidance relating to PatchManagement in NHS or other healthcare environments. Detailed technical knowledge of the techniques presented is not required. Guidance includes: - The reasons that good Patch Management is beneficial. Suggestions on implementing good Patch Management. 1.2 Audience This document has been written for readers within any NHS or healthcare provider organisation who have a general familiarity with IT applications and infrastructure issues. 1.3 Content This document comprises the following sections / topics: - Introduction Background What is Patch Management? Vulnerability Disclosure What should be patched? Patch Management Process Other Considerations 6

7 1.4 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by NHS Connecting for Health. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. Any party relying on or using any information contained in this document and/or relying on or using any system implemented based upon information contained in this document should do so only after performing a risk assessment. It is important to note that a risk assessment is a prerequisite for the design of effective security countermeasures. A correctly completed risk assessment enables an NHS organisation to demonstrate that a methodical process has been undertaken which can adequately describe the rationale behind any decisions made. Risk assessments should include the potential impact to live services of implementing changes. This means that changes implemented following this guidance are done so at the implementers risk. Misuse or inappropriate use of this information can only be the responsibility of the implementer. 7

8 2 Introduction The following information provides a knowledge-based framework that will help maintain good practice values within an organisation. This guide details good practice, and by following it some of the consequences of non-compliance should be avoided. After reading this document the reader should understand: - The basics of Patch Management, the various types of techniques available to achieve this and their advantages, as well as any shortcomings in terms of security. Good practice for any NHS or healthcare provider organisation implementing Patch Management within its organisation, or building upon existing Patch Management approaches. 2.1 Background The NHS in England is composed of numerous individual organisations, ranging from large complex setups to smaller organisations with limited resource and capability. Due to the working practices between these organisations trust relationships may exist to interconnect the Wide Area Networks (WAN) or Local Area Networks (LAN) which could lead to resulting patch management approaches (or lack of) having a wider impact than the initial immediately affected organisation. N3 is a private Wide Area Network (WAN) and access is therefore strictly limited to authorised endpoints. Any organisation wishing to connect to N3 is responsible for ensuring that their N3 connection does not compromise the security measures already in place within the WAN. This is agreed to by signing the Information Governance Statement of Compliance 1 by all connected organisations. N3 faces numerous potential threats to security, possibly from inadequately protected partner networks, or connections to uncontrolled external networks such as the Internet. These threats are continually evolving in both strength and frequency. Therefore ongoing vigilance against these threats, and the maintenance of strict security standards, are essential to the continuing success of N3 which is considered UK Critical National Infrastructure (CNI)

9 3 What is Patch Management? Patch Management is the ability to implement patches in a timely manner using strategies and plans as appropriate to ensure systems and services continue to be available and secure for the purposes of the business function(s) they provide. Patching (sometimes also known as a fix ) is a technique used to correct a problem (often known as a bug ) in a computer program. This is typically done by obtaining a repair program from the vendor which the original computer program was purchased from. Patches can be summarised into the two categories: Functional Non-Functional 3.1 Functional This typically involves correcting features or functionality of a computer program. Functional patches may involve changes to the look and feel of certain areas of a product or areas that may not work as intended but which do not affect the overall security of the application. From a purist point of view, it may be noted that functional problems may affect the ability to undertake certain tasks which can align with availability targets. However, security generally would focus on more significant impacts such as complete unavailability e.g. denial of service, or integrity of the computer program rather than reduced functionality. If a system requires a functional patch in order to increase it s ability (or restore ability if lost following an upgrade or other reason) to undertake certain tasks or efficiencies, it would be considered good practice to implement this by following Service Management 2 disciplines such as Problem and Change Management. Additionally, when patching systems that have clinical use or functionality, the clinical impacts should be considered within a clinical safety assessment or similar methodology. 3.2 Non-Functional These types of patch are released for several purposes, many of which are security related. The focus of this document will therefore mainly consider these. In the case of patches released to repair or mitigate a specific security vulnerability found in a system in live service. The severity of the vulnerability generally dictates the timescale for availability, ultimately leading to deployment and subsequent correction of the vulnerability. The addition of the patch usually will not affect functionality or have affects to users of systems or services, however, this should be confirmed via pre-deployment testing and/or post implementation testing, where systems have 2 The IT Infrastructure Library (ITIL) v3 is considered to be the standard for Service Management. More information can be found here: 9

10 clinical impact or use, appropriate levels of testing rigour should be applied to all patches. 3.3 Upgrades The activity of upgrading a system, i.e. moving to a new release of computer code, may include many previous functional and non-functional patches, while at the same time adding new features or functionality not available previously. It is considered poor security practice to rely on upgrades to apply nonfunctional patches. It is most likely that patches will be released in the time before upgrades are available which could place significant risk on organisational assets. Once an upgrade is available this may negate the need to apply previous nonfunctional patches. Non-functional patches made available beyond this date should then be applied as and when they are released. Upgrades may comprise of interim release such as Services Packs which complement major releases of Microsoft Windows OS, or a move to a complete major release. 10

11 4 Vulnerability Disclosure For the purposes of the rest of this document, the majority of the content will be focused in respect to Non-Functional patches to potential information security vulnerabilities. These vulnerabilities may be disclosed in a number of ways or not at all. It is important to understand these concepts as they can influence risk management decisions. Vulnerabilities may be found by various types of individuals, groups and organisations and the methods used to disclose discovered vulnerabilities can vary considerably. It should also be noted that the availability of non-vendor patches or interim fixes may differ between disclosure methods and must be considered fully before any potential implementation. 4.1 Responsible Disclosure Vulnerabilities disclosed in this way are reported to the vendor(s) of the products concerned. The individual, group or organisation which discovered the vulnerability works with the vendor to ensure that the vulnerability is satisfactorily resolved. Using a responsible disclosure methodology, no details of the vulnerability are released publicly by either the vendor or the discoverer of the vulnerability until a corresponding patch is made available. This approach gives a window of opportunity to address the problem and release a patch to the affected communities. The vendor and the discoverer of the vulnerability both conduct a co-ordinated release of the patch and vulnerability details simultaneously once the patch is available. The discoverer of the vulnerability is credited publicly with discovering the vulnerability by the vendor. For an individual, group or organisation this can be good publicity. In the last few years, there has been much more of a focus on responsible disclosure for economic reasons. A number of organisations (such as TippingPoint 3 ) have started paying individual security researchers and groups for sole rights to a newly discovered vulnerability via bounty programmes and then working with the vendor of the affected product on the researcher or groups behalf. This allows researchers and groups to remain anonymous to the product vendor if they so wish but also allows them to get paid for their work. Previously, many security researchers worked on discovering vulnerabilities in products purely for the intellectual challenge of doing so and without any financial motive. Another argument for such bounty programmes is that they discourage potentially less ethical security researchers from selling discovered vulnerabilities to criminals who would use the vulnerabilities to compromise systems for financial gain. 3 The Zero Day Initiative from TippingPoint is one such example of a bounty programme. See: for more information. 11

12 4.2 Partial Disclosure The partial disclosure methodology is characterised by some high-level details of the vulnerability being divulged to the general public. This is often via a security researcher s web site or blog or possibly via one of the well known security mailing lists such as Bugtraq. 4 Via this route, the vendor is notified of the vulnerability as well (or is notified directly by the discoverer of the vulnerability) and will often produce a security bulletin detailing some mitigating actions which can be taken prior to a patch being released. If the mitigating actions are followed, they can often lead to a loss of functionality in the product containing the vulnerability. Therefore, a risk assessment should be performed to determine level of exposure to the vulnerability and vulnerability severity versus the consequence of lost functionality for users of the product. Some security researchers and groups follow the partial disclosure methodology because they feel it encourages the vendor to produce a patch for a vulnerability more quickly than if they notified the vendor directly. On occasions, the security researcher or group will give the vendor a time limit for producing the patch, which if not achieved by the vendor, will see the researcher or group release full details of the vulnerability to the public potentially creating risks with little or no mitigation immediately available. 4.3 Full Disclosure Security researchers and groups who practice the full disclosure methodology feel that all systems should be open to scrutiny and that information on vulnerabilities in systems should be made available to all. This for example allows customers to determine their level of exposure themselves and put mitigating actions in place without vendor timescales driving these activities. A downside is that by releasing full details to everyone, this information also makes it into the hands of more nefarious individuals. Vulnerabilities reported in this way are therefore reported to everyone at the same time via either security related mailing lists, security websites or blogs. This provides opportunities for potential attackers to exploit these vulnerabilities before vendors release patches and affected organisations are able to apply them. Upon discovering vulnerabilities disclosed in this way, a vendor will often produce guidance for customers in the form of a security bulletin which details possible mitigations which can be put in place prior to a patch being released. Note that potential mitigations may involve disabling certain functional aspects of a product. In these instances, a risk assessment should be performed to determine level of exposure to the vulnerability and vulnerability severity versus the consequence of lost functionality for users of the product. Other mitigations may be possible in the short term before a patch is made available. For example, technologies such as Intrusion Prevention Systems i may assist as interim measures however, they should not be solely relied upon. 4 Information about the Bugtraq mailing list: 12

13 4.4 No Disclosure In some circumstances vulnerabilities are developed often for financial gain. In this scenario an organisation or person may choose to use vulnerability for its own purposes (sometimes illegal) and not make it known to any outside communities. A slight variation on this theme is that the same organisation or person may choose to auction a discovered vulnerability to the highest bidder. This again could be used for illegal activities, or it may be purchased by the vendor of the system concerned or an intrusion prevention system provider to enhance its own products. A zero-day (or zero-hour) vulnerability is one that is unknown to both the vendor of the affected product and the general public and for which no security update exists. Zero-day vulnerabilities often receive active exploitation in the wild and exploitation of the vulnerability is often how they are discovered. Finally, once a patch is released, it is possible for an attacker to reverse engineer and analyse the patch to discover the full details of the vulnerability and subsequently develop techniques so as to be able to exploit any remaining un-patched systems, therefore timely patch management is very important. 13

14 5 What should be patched? 5.1 Operating Systems Sometimes referred to as OS, this is an interface between hardware and applications; it is responsible for the management and coordination of activities and the sharing of the limited resources of the computer. Examples of operating systems are Microsoft Windows and Linux. 5.2 Applications Some applications come included with an OS, while others are added as need arises. Common user applications include Microsoft Office applications and Adobe Acrobat, system applications may include Web servers and Databases. 5.3 Firmware These are typically coded instructions that are stored in permanent or semipermanent memory. An example of this would include a computer BIOS which is loaded prior to an OS or application. Other examples may include the firmware used on network devices or in medical devices that serve important functions. In the case of Medical Devices it is advisable to seek manufacturer instructions if in doubt of the clinical safety impacts of applying patches to medical devices. Further guidance is issue from the Medicines and Healthcare Products Regulatory Agency (MHRA) MHRA Device Alert information is available from the mhra.gov.uk website

15 6 Patch Management Process There are many variants of patch management processes, however typically they include several of the following areas: Awareness Monitoring Analysis Deployment Testing Preparation Figure 1 A Typical Patch Management Process These are discussed in the next sections. 15

16 6.1 Awareness It is important for an organisation to be aware of its systems and be aware when patching is required, there are several ways to achieve this. In complex environments several strategies may have to co-exist Asset and Inventory Management 6 It is a fundamental requirement for good patch management (and for many other disciplines such as financial and licensing) to have some form of record which reflects what information assets are deployed within the organisation. This should also be a living record to reflect its evolving nature. There are commercial utilities which can aid this effort and methodologies that can be worked towards. ITIL 7 recommends the use of a Configuration Management Database to track an organisations assets. If the management and maintenance of an asset is outsourced beyond that of the host organisation, steps should be taken to ensure that patch management is undertaken to continue to safeguard these assets. The potential and actual risks relating to these assets cannot be outsourced Notifications Many vendors offer mailing lists, and alerting bulletins that can be subscribed to, often free of charge. Independent organisations such as SANS Internet Storm Centre, 8 BugTraq 9 and PatchManagement.org 10 also provide similar services. In larger organisations it is commonplace for the ICT department to subscribe specific addresses which can be accessed by multiple staff for continuity WARP A Warning, Advice and Reporting Point can often be a good way to share advice and information on computer based threats and vulnerabilities. WARP s can be community specific and therefore the content available can be tailored even more to the environment of the organisations and users of it. Further information is available on the WARP website

17 6.1.4 Vulnerability Management Systems There are many commercial and some free systems that allow an organisation to raise awareness of potential patching issues through automated tools. Commercial examples of this are Qualys 12 or BigFix 13 Vulnerability assessment tools such as Nessus 14 or Microsofts Baseline Security Analyser 15, can sometimes be used to perform more ad hoc scans, which may or may not integrate into automated management products. 6.2 Analysis When an organisation becomes aware of a potential vulnerability requiring patching, it needs to analyse and decide the relevance and consequences within its specific environment(s) in relation to the systems and services in place Risk Management There are many risk management approaches and tools that can be used to aid analysis. The NHS has access to the ISF 16 Risk Assessment Tools and the ISO standards via the Information Governance Toolkit 17 Further Risk Management advice and guidance can be found from the NHS Connecting for Health website 18. In some environments it may be appropriate to have an easy to use scoring matrix to identify the impact and the probability of a particular vulnerability being exploited hsinforiskmgt 17

18 (1) Not Critical (2) (3) (4) Less Critical Moderate Critical Highly Critical Impact/Criticality (5) Extremely Critical (1) (2) (3) (4) (5) Improbable Remote Occasional Probable Frequent Probability Figure 2 An example of a Vulnerability Assessment Scoring Matrix In the above scoring matrix, a patching policy (as an example) could be adopted to patch vulnerabilities placed in the Red area within 24 hours, or as soon as possible. Green scored vulnerabilities may be patched in the normal business as usual patching schedule, and Yellow dealt with on a case-by-case basis. This is by no means the only way to score vulnerabilities and other approaches may be more suitable in a given environment. Vendors and independent parties like SysAdmin, Audit, Network Security Institute (SANS) may provide risk ratings to inform the reader and give an indication as to how quickly they believe the patch should be applied. There also may be different impacts and probabilities in particular business areas, therefore several assessments may have to be done to understand the full exposure to the organisation. 6.3 Testing Prior to deploying any patches it is advisable to test them in a non-live environment, such as a test environment, designed to mimic the live environment as much as is practically possible. 18

19 Patches should be obtained from reputable sources, in most instances this will be the vendor. The patch itself should be confirmed against published checksums or digitally signed to prove its authenticity. Unofficial patches can cause adverse affects or/and additional vulnerabilities. In some organisations it may not be feasible to maintain test environments, however it may be still possible to implement patches on lower impact systems to observe the results first, before deploying on more important systems this should be balanced in risk management terms as described in earlier sections in relation to the need to have the patch deployed in a timely manner. Again, in NHS organisations clinical safety may be a concern and specific guidance should be sought where applicable. 6.4 Preparation It is advisable to prepare well when rolling out patches, assuming a test environment has been used (as suggested in the previous section), this will given some confidence that adverse effects can be avoided. Testing however does not allow business impacts to be factored in and therefore other approaches are advisable to take into account some real world factors Change Management This is an activity recommended by ITIL to manage changes within an organisation. It could include a phased approach to the patch rollout, which would include advising system users and business functions of the need that this is to occur, which in turn can allow any problems or unforeseen items to be raised. It can also be used to co-ordinate activities during the deployment. A change management plan should also include steps for rollback, should problems be encountered Emergency Change Management Similar to Change Management, however this involves deployment within tight timescales and certain stages may be omitted. This could be required to patch a high potential impact vulnerability, it could also be required if a patch has had undesired consequences and requires rolling back. 6.5 Deployment Centralised Deployment In larger organisations this is often beneficial due to the number of devices that may require patching. It also means that patches can be obtained once either via the internet or other means and then distributed via the organisations LAN, which conserves often precious external bandwidth. 19

20 NHS Connecting for Health have negotiated a number of Enterprise Wide Agreements for NHS organisations in England (other terms may be available for Home Countries). Detail of the Novell ZenWorks product can be found here 19 Many NHS organisations also use Microsoft products. Detail regarding Microsoft Systems Management Server and Client Access Licensing can be found here 20 Microsoft also provides Windows Servers Update Services (WSUS). Network device vendors often provide bespoke management software to enable central deployment of patches that can have added benefits such as monitoring and alerting. For example Cisco provides CiscoWorks 21 software Auto-updates Some systems may be set to auto-update. When a patch becomes available it will be obtained (typically from the internet) and deployed automatically. This can be advantageous in some circumstances however it can also have undesirable results. This approach is also very bandwidth inefficient in large organisations. The N3 network provides a central N3 Internet Gateway for use by NHS organisations, a large percentage of its bandwidth is taken up by update/patching downloads from the internet. NHS organisations should make efforts to centralise their updates where practical to ensure patches are not downloaded multiple times within the same organisation and thus consuming bandwidth unnecessarily Single Instance patching In some circumstances it may be required to physically attend a device to deploy a patch, this is obviously more labour intensive than the central deployment or automated approaches. Reasons for using this approach may vary, however one reason could be the type of patch is to firmware or devices with limited network connectivity, which may mean this is the only realistic option available

21 6.5.4 Restarts or Service Stop Depending on the nature of the patch this may or may not be required. For more critical services it may be possible to place redundant devices into live temporarily before placing the patched devices back into live service. This should be described in associated Change Management plans and possibly done at non/least service affecting times to minimise disruption. Some patch management techniques allow a patch to be deployed, but not finalised until a restart is made. If a user is working on a recently patched device they may be given the opportunity to restart at a later time or whenever is convenient. This should be balanced against the risks of having an un-patched system left in that state for a longer amount of time. There are also occasional issues with system stability in systems which have been patched but have not yet been rebooted. It is not good security practice to allow end users to repeatedly delay the application of patches to their systems. Deployment systems such as Microsoft System Management Server and Novell ZenWorks allow users to defer the reboot of a patched system for a short period of time only e.g. up to four hours Devices that may not be on the network This concerns devices that may be patched by centralised or automated methods but are not on the organisations network at the point in time when deployment is needed, for example a laptop that is with a member of staff outside the office, or a desktop computer that is presently not switched on. Steps should be made to ensure that these types of devices are patched as soon as practically possible. Technologies such as Network Access Control (NAC) can ensure that when an un-patched device is reconnected to an organisations network it is picked up and the appropriate action is taken. 6.6 Monitoring Monitoring should take place following deployment of patches. It should also take account of any failed deployments which should be addressed as necessary. In certain instances the installation of components (software, hardware or other) can return devices to an un-patched state which should be monitored for and dealt with accordingly. It could also be useful within large organisations to develop metrics in relation to patching activities. These could be measured against business units or functions, to allow trends or patterns to be identified. It may also allow any gaps or failings to be more visible and remediation work can taken place to prevent this from reoccurring. This can be a time consuming exercise and commercial products can assist with these types of tasks such as Customer Relationship Management (CRM) systems or Vulnerability Management Systems. 21

22 7 Other Considerations This section contains a few additional considerations, which are relevant but do not directly apply to the previous body of this good practice guide. 7.1 Mitigations In certain situations like a zero day attack or for critical live systems, it may not be possible to apply a patch immediately in which case there may be mitigations that could be used. Sometimes when a vendor releases a patch there is an alternative stated as a workaround this many involve reconfiguring a device in a manner rendering the vulnerability either unlikely or no longer possible. There are also solutions that provide screening capabilities, for example Intrusion Prevention System providers, or devices can be placed in higher security areas such as DMZ s which can make certain vulnerability exploitation unlikely. See Good Practice Guides on IDS and IPS Technologies and Firewall Technologies Hardening Systems It is always advisable to limit exposure to potential vulnerabilities (particularly on critical systems) by removing unnecessary services or features Prevention is better than cure. For further information see System Hardening GPG 23. Additionally it is also good practice to prevent users installing unauthorised software which may come with its own vulnerabilities that are not picked up by the organisations ICT staff. Techniques including avoiding administrator access to systems or locking down USB ports may be appropriate in efforts to achieve this. 7.3 Patching Schedules It is good practice to embed patch management with the organisation as a Business as Usual (BAU) activity, Patching Schedules may go some way towards achieving this. It is worth considering that vendors may have differing approaches with regard to release of patches. While most will make critical patches available as soon as possible, other have chosen phased approaches for more routine patches, which include lower severity security patches. Microsoft for example, has a concept known as Patch Tuesday and releases the majority of its patches on the 2 nd Tuesday of each month. It is therefore advisable to correlate patching schedules around the release times to avoid exposure for longer periods of time

23 7.4 Unsupported Systems It is commonplace for a vendor to provide limited support and therefore patches to a product, often systems in use beyond this timeframe are referred to as end of life, although it may be possible in some circumstances to purchase extended support packages. This however does not mean that products reaching these phases cease to have vulnerabilities. More to the point it is unlikely a patch will be provided and this could have serious consequences. An organisation continuing to run unsupported systems does so at risk and should have a significant business reason for doing this, In addition, the organisation should have appropriate mitigations in place to reduce any risks to acceptable levels. 7.5 Security Incident Management The vast majority of this good practice guide has referred to patch management as a means to prevent potential vulnerabilities being exploited and thus impacting an organisations business functions. If for some reason a failing occurs in relation to patch management good Security Incident Management practices may be required. This should detail the measures necessary to deal with a security incident and return to a state of normality. 23

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

Patch Management Policy

Patch Management Policy Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:

More information

Proxy Services: Good Practice Guidelines

Proxy Services: Good Practice Guidelines Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:

More information

Northwestern University Dell Kace Patch Management

Northwestern University Dell Kace Patch Management Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.

More information

Information and Communication Technology. Patch Management Policy

Information and Communication Technology. Patch Management Policy BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL

More information

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e B e s t P r a c t i c e s G u i d e It s a fact of business today: because of the economy, most organizations are asking everyone, including the IT staff, to do more with less. But tight budgets and the

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Implementing Security Update Management

Implementing Security Update Management Implementing Security Update Management Wayne Harris MCSE Senior Consultant Certified Security Solutions Business Case for Update Management When determining the potential financial impact of poor update

More information

Information Security Incident Management Policy and Procedure

Information Security Incident Management Policy and Procedure Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure

More information

Change & configuration management

Change & configuration management 2008-01-18 12:42:00 G007_CHANGE_AND_CONFIGURATION_MANAGEMENT Change & configuration management Guidelines Page 1 of 11 1. Preliminary 1.1 Authority This document is issued by the (the Commission) pursuant

More information

Patch Management Procedure. Andrew Marriott andrew.marriott@fylde.gov.uk 01253 658578 PATCH MANAGEMENT PROCEDURE.DOCX Version: 1.1

Patch Management Procedure. Andrew Marriott andrew.marriott@fylde.gov.uk 01253 658578 PATCH MANAGEMENT PROCEDURE.DOCX Version: 1.1 Title: Patch Management Andrew Marriott andrew.marriott@fylde.gov.uk 01253 658578 PATCH MANAGEMENT PROCEDURE.DOCX Version: 1.1 Contents 1. Introduction... 4 2. Objectives... 4 3. Context... 4 4. Responsibility...

More information

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information

More information

MANAGE THIRD PARTY RISKS

MANAGE THIRD PARTY RISKS SECURITY FOR INDUSTRIAL CONTROL SYSTEMS MANAGE THIRD PARTY RISKS A GOOD PRACTICE GUIDE Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer,

More information

Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada

Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

CuTTIng ComplexITy simplifying security

CuTTIng ComplexITy simplifying security CuTTIng ComplexITy simplifying security With corporate IT becoming increasingly complex, how can you boost efficiency while improving corporate security? with kaspersky, now you can. kaspersky.com/business

More information

Novell. ZENworks Patch Management Design, Deployment and Best Practices. Allen McCurdy Sr. Technical Specialist amccurdy@novell.

Novell. ZENworks Patch Management Design, Deployment and Best Practices. Allen McCurdy Sr. Technical Specialist amccurdy@novell. Novell ZENworks Patch Management Design, Deployment and Best Practices Steve Broadwell Sr. Solutions Architect sbroadwell@novell.com Allen McCurdy Sr. Technical Specialist amccurdy@novell.com Agenda General

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Presented by Brian Woodward

Presented by Brian Woodward Presented by Brian Woodward Log in with least amount of privileges Always use Firewall and AV Monitor channels for security advisories and alerts Know your system(s) Unpatched Systems are the lowest of

More information

TECHNICAL VULNERABILITY & PATCH MANAGEMENT

TECHNICAL VULNERABILITY & PATCH MANAGEMENT INFORMATION SECURITY POLICY TECHNICAL VULNERABILITY & PATCH MANAGEMENT ISO 27002 12.6.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-12.6.1 Version No: 1.1 Date: 1 st

More information

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Ixonos Cloud Solutions - A Review

Ixonos Cloud Solutions - A Review Capacity Services Ixonos Plc 2015 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1 Service description... 3 1.1 Environment... 3 1.2 Security services... 4 1.3 Data Center facilities... 5 2 Service levels...

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

BEST PRACTICES. Systems Management. www.kaspersky.com

BEST PRACTICES. Systems Management. www.kaspersky.com BEST PRACTICES www.kaspersky.com 2 YOUR GUIDE TO SYSTEMS MANAGEMENT BEST PRACTICES. Enhance security and manage complexity using centralized IT management tools. Unpatched vulnerabilities in popular applications

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 20/04/2016 HSCIC Audit of Data Sharing

More information

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY DISTRIBUTION LIST Audit Team Prakash Gohil, Audit Manager Steven Snaith, Risk

More information

Lumension Guide to Patch Management Best Practices

Lumension Guide to Patch Management Best Practices Lumension Guide to Patch Management Best Practices With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security

More information

BT Assure DoS Mitigation UK

BT Assure DoS Mitigation UK BT Assure DoS Mitigation UK Annex to the Internet Connect UK Schedule Contents A note on we and you... 2 1. Service Summary... 2 2. Service Standard Components... 2 3. Service Options... 2 4. Service Management

More information

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access

More information

PROCEDURES FOR ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING OF INVESTMENT PROJECTS

PROCEDURES FOR ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING OF INVESTMENT PROJECTS PROCEDURES FOR ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING OF INVESTMENT PROJECTS Approved 10 July 2015 CONTENTS 1. INTRODUCTION 1 2. OVERVIEW OF THE ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING

More information

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please

More information

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Virtual Local Area Networks (VLANs) Good Practice Guideline

Virtual Local Area Networks (VLANs) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0006.05 Prog. Director Mark Ferrar Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

System Center Configuration Manager

System Center Configuration Manager System Center Configuration Manager Software Update Management Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has

More information

Baker Tilly simplifies Windows 7 deployment with CA Technologies solutions

Baker Tilly simplifies Windows 7 deployment with CA Technologies solutions Customer success story Baker Tilly simplifies Windows 7 deployment with CA Technologies solutions Customer profile Industry: Professional services Company: Baker Tilly Employees: 2,400 Revenue: 204 million

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Ensuring security the last barrier to Cloud adoption

Ensuring security the last barrier to Cloud adoption Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS

TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS 19 NOVEMBER 2003 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor

More information

Lumension Endpoint Management and Security Suite

Lumension Endpoint Management and Security Suite Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

E-Mail, Calendar and Messaging Services Good Practice Guideline

E-Mail, Calendar and Messaging Services Good Practice Guideline E-Mail, Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0017.01 Prog. Director Mark Ferrar Status

More information

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with

More information

Auxilion Service Desk as a Service. Service Desk as a Service. Date January 2015. www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1

Auxilion Service Desk as a Service. Service Desk as a Service. Date January 2015. www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1 Title Service Desk as a Service Date January 2015 www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1 1. Disclaimer All information contained in this document is provided in confidence to the

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

Virtual Patching: a Proven Cost Savings Strategy

Virtual Patching: a Proven Cost Savings Strategy Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes

More information

IMS-ISA Incident Response Guideline

IMS-ISA Incident Response Guideline THE UNIVERSITY OF TEXAS HEALTH SCIENCE CENTER AT SAN ANTONIO IMS-ISA Incident Response Guideline Incident Response Information Security and Assurance 12/31/2009 This document serves as a guideline for

More information

Security Patch Management

Security Patch Management The knowledge behind the network. Security Patch Management By Felicia M. Nicastro Senior Network Systems Consultant International Network Services Security Patch Management March 2003 INS Whitepaper 1

More information

Patch Management. A newsletter for IT Professionals. Issue 6. I. Background of Patch Management. Education Sector Updates

Patch Management. A newsletter for IT Professionals. Issue 6. I. Background of Patch Management. Education Sector Updates Patch Management A newsletter for IT Professionals Education Sector Updates Issue 6 I. Background of Patch Management A software patch is an additional piece of program codes or executable designed to

More information

Oracle Security Patches - Requirements and Success Stories

Oracle Security Patches - Requirements and Success Stories An Oracle White Paper November 2010 Recommendations for Leveraging the Critical Patch Update and Maintaining a Proper Security Posture Disclaimer The following is intended to outline our general product

More information

PCI Data Security Standards (DSS)

PCI Data Security Standards (DSS) ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants

More information

Technology and Cyber Resilience Benchmarking Report 2012. December 2013

Technology and Cyber Resilience Benchmarking Report 2012. December 2013 Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities

More information

SOFTWARE UPDATER A unique tool to protect your business against known threats

SOFTWARE UPDATER A unique tool to protect your business against known threats SOFTWARE UPDATER A unique tool to protect your business against known threats OVERVIEW This document explains the functionality of Software Updater. What it is, what it does, how it works, what gets patched

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

Unifying IT How Dell Is Using BMC

Unifying IT How Dell Is Using BMC Unifying IT Management: How Dell Is Using BMC Software to Implement ITIL ABSTRACT Companies are looking for ways to maximize the efficiency with which they plan, deliver, and manage technology services.

More information

Cisco Unified Computing Remote Management Services

Cisco Unified Computing Remote Management Services Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

AN OVERVIEW OF VULNERABILITY SCANNERS

AN OVERVIEW OF VULNERABILITY SCANNERS AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole

More information

MWR InfoSecurity Security Advisory. Symantec s Altiris Deployment Solution File Transfer Race Condition. 7 th January 2010

MWR InfoSecurity Security Advisory. Symantec s Altiris Deployment Solution File Transfer Race Condition. 7 th January 2010 al al MWR InfoSecurity Security Advisory Symantec s Altiris Deployment Solution File Transfer Race Condition 7 th January 2010 20010-01-07 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description...4

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information

More information

Customer Support Policy

Customer Support Policy Customer Support Policy This Customer Support Policy ( Policy ) describes the Support that Invenias provides to Customers that have paid all applicable fees and that are using Licensed Software in a Supported

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

Vulnerability Scanning and Patch Management

Vulnerability Scanning and Patch Management Vulnerability Scanning and Patch Management Vulnerability Scanning and Patch Management Security vulnerabilities remain amongst the most disruptive and damaging types of problem experienced in real-world

More information

Security Incident Management Policy

Security Incident Management Policy Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015

More information

Standard: Vulnerability Management and Assessment

Standard: Vulnerability Management and Assessment Standard: Vulnerability Management and Assessment Page 1 Executive Summary San Jose State University (SJSU) is highly diversified in the information that it collects and maintains on its community members.

More information

Red ALERT Notification of Patches for Shoplift Bug. Making the UK more resilient against Cybercrime OFFICIAL. Date: June 2016. Reference: 0309-CYB

Red ALERT Notification of Patches for Shoplift Bug. Making the UK more resilient against Cybercrime OFFICIAL. Date: June 2016. Reference: 0309-CYB Red ALERT Notification of Patches for Shoplift Bug Making the UK more resilient against Cybercrime Date: June 2016 Reference: 0309-CYB This Red Alert is issued by the United Kingdom s National Crime Agency

More information

ITP01 - Patch Management Policy

ITP01 - Patch Management Policy IT Services Policy ITP01 - Patch Management Policy Prepared by: < Shelim Miah> Version: V1.0 Page 1 of 8 Description & Target Audience: Policy to outline the requirement of all systems and software applications

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Check Point and Security Best Practices. December 2013 Presented by David Rawle Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs

More information

INSIDE. Management Process. Symantec Corporation TM. Best Practices Roles & Responsibilities. Vulnerabilities versus Exposures.

INSIDE. Management Process. Symantec Corporation TM. Best Practices Roles & Responsibilities. Vulnerabilities versus Exposures. Symantec Corporation TM Symantec Product Vulnerability Management Process Best Practices Roles & Responsibilities INSIDE Vulnerabilities versus Exposures Roles Contact and Process Information Threat Evaluation

More information

Internal Audit Report ITS CHANGE MANAGEMENT PROCESS. Report No. SC-11-11

Internal Audit Report ITS CHANGE MANAGEMENT PROCESS. Report No. SC-11-11 Internal Audit Report ITS CHANGE MANAGEMENT PROCESS Report No. SC-11-11 March 2011 SANTA CRUZ: INTERNAL AUDIT March 31, 2011 MARY DOYLE Vice Chancellor Information Technology Re: Internal Audit Report

More information

Information Security Policy. Chapter 10. Information Security Incident Management Policy

Information Security Policy. Chapter 10. Information Security Incident Management Policy Information Security Policy Chapter 10 Information Security Incident Management Policy Author: Policy & Strategy Team Version: 0.4 Date: December 2007 Version 0.4 Page 1 of 6 Document Control Information

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance

Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Partner Capability Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Company overview About us CCE is one of the UK s largest independent IT

More information