Five ways to simplify the vulnerability management lifecycle. Scott Sidel, CISSP, CEH, ETC May 2005



Similar documents
Virtual Patching: a Proven Cost Savings Strategy

Patch Management Policy

Virtual Patching: a Compelling Cost Savings Strategy

Patch Management Marvin Christensen /CIAC

IBM Tivoli Endpoint Manager for Security and Compliance

Complete Patch Management

Lumension Endpoint Management and Security Suite

Closing the Vulnerability Gap of Third- Party Patching

IBM Tivoli Endpoint Manager for Lifecycle Management

NUS InfoComm Security Landscape

Reducing the cost and complexity of endpoint management

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

SANS Top 20 Critical Controls for Effective Cyber Defense

Complete Patch Management

Northwestern University Dell Kace Patch Management

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

IBM Tivoli Endpoint Manager for Lifecycle Management

Patch and Vulnerability Management Program

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

IBM Tivoli Endpoint Manager for Security and Compliance

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Intro to Patching. Thomas Cameron, Chief Architect, Western US, Red Hat twitter: thomasdcameron IRC: choirboy on Freenode

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Introduction to OVAL: A new language to determine the presence of software vulnerabilities

Why Free Patch Management Tools Could Cost You More

IBM Endpoint Manager for Lifecycle Management

Deep Security Vulnerability Protection Summary

Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide

Streamlining Patch Testing and Deployment

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

Complete Patch Management

HP Server Automation Enterprise Edition

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Vulnerability Scanning and Patch Management

Resolving the Top Three Patch Management Challenges

Security Vulnerability Management. Mark J Cox

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.

Vulnerability Intelligence & 3 rd party patch management

Red Hat Enterprise Linux and management bundle for HP BladeSystem TM

Information Security Attack Tree Modeling for Enhancing Student Learning

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

How To Manage A System Vulnerability Management Program

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Proactively Managing Servers with Dell KACE and Open Manage Essentials

HEAT DSM Release Overview. Andreas Fuchs Product Management November 16th, 2015

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Configuration Audit & Control

Cyber Security RFP Template

QRadar SIEM 6.3 Datasheet

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Information and Communication Technology. Patch Management Policy

Dynamic Service Desk. Unified IT Management. Solution Overview

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

SapphireIMS 4.0 Asset Management Feature Specification

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Our Systems Experience, Specifically:

Lumension Security Vulnerability Management Solution. Automating the Vulnerability Management Lifecycle

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Symantec Server Management Suite 7.6 powered by Altiris technology

Best Practices in Lifecycle Management: Comparing Suites from Dell KACE, Symantec, LANDesk, and Microsoft

Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SCCM

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

What is Penetration Testing?

Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate

Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

PATCH MANAGEMENT POLICY IT-P-016

IBM Internet Security Systems

Vulnerability management lifecycle: defining vulnerability management

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

How To Test A Control System With A Network Security Tool Like Nesus

Endpoint Security Management

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC

How To Manage A Patch Management Program

Best Practices in Lifecycle Management: Comparing Suites from Dell, LANDesk, Microsoft, and Symantec

12 Security Camera System Best Practices - Cyber Safe

Review: McAfee Vulnerability Manager

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Modular Network Security. Tyler Carter, McAfee Network Security

Novell. ZENworks Patch Management Design, Deployment and Best Practices. Allen McCurdy Sr. Technical Specialist

Transcription:

Five ways to simplify the vulnerability management lifecycle Scott Sidel, CISSP, CEH, ETC May 2005

Why do we patch? No system is perfect. Vulnerabilities ship out-of-the-box Threats on the wire Even while a system is being built it is a target. The need for a Build VLAN

What gets patched? OS Applications Network Appliances

What gets patched? OS Out of the box, operating systems must be brought up to date Even Unix and Linux must be patched Up-To-Date [Red Hat] apt-get (Advanced Packaging Tool) [Debian] YUM (Yellow-dog Updater Modified) [Fedora] Rolling in *NIX updates during the build Jump Start [Solaris] Kick Start [Linux]

What gets patched? OS Windows Windows Update Windows Software Update Services (SUS) Windows Update Services* (WUS) System Management Server (SMS)

What gets patched? Applications A patching method for every application? Office Update Adobe Updater Real Audio / Windows Media Player Norton Live Update AdAware Reference Files Firefox Software Update

What gets patched? Appliances Cisco Routers 11.3AA Check Point Firewalls NG FP3 HF2 Juniper NetScreen Firewall R3 McAfee IDS/IPS 2.1

How do I know there is a patch? Vendor Alerts Vulnerability Alert Lists SearchSecurity www.searchsecurity.com US-CERT www.us-cert.gov CERT www.cert.org SANS www.sans.org Insecure www.insecure.org BugTraq www.securityfocus.com Visit the sites Sign up for the mailing lists Subscribe to RSS news feeds

When do I patch? Whenever I get around to it? Ad-Hoc As patches come out After Hours Maintenance Window Third Tuesday of Every Month at 2 AM Microsoft s Patch Tuesday

Do I know what to patch? Vulnerability Scanning Find vulnerabilities Follow-up to validate that vulnerabilities were patched CVE (Don t) Trust but verify Common Vulnerabilities and Exposure list Standardized names for vulnerabilities www.cve.mitre.org

Can you afford to patch? (Hours x Rate x Systems) = Cost to Patch If you have four techs ($80 billing rate/hour) patching 300 systems, one hour per system, you would spend $96,000. If you have four techs ($80 billing rate/hour) patching 1000 systems, one hour per system, you would spend $320,000.

Can you afford not to patch? Elements of loss: Lost productivity Loss of revenue Intellectual property losses Loss of assets Legal/regulatory costs Embarrassment (do not underestimate) Now the labor looks like a better value.

What to look for Platform (or cross-platform) Coverage Windows Solaris Linux Ease of Deployment What good is a system that never gets used?

What to look for (cont.) Multi-Site Rollout Different divisions Different geographic locations Patch Rollout Control Flood or throttle Retries, load on next boot, load on next connect (mobile users) Rollback Ability to remove patches if it breaks something

What to look for (cont.) Validation Verify patch with multiple scanners Isolate noncompliant devices Schedule remediation for off-peak times Reporting Technical Management

Five Ways to Simplify Vulnerability Management

Five final points on patching 1. Establish Repeatable Processes Don t let every patch be a fire drill Create patching policies and guidelines Know when to patch; assess patches Establishing testing and release processes Create communication channels to staff Set SLAs/cooperative agreements with business departments

Five final points on patching 2. Maintain Accurate Inventory Operating Systems Applications Network Devices Locations Connection Types Assign Values to Devices/Resources/Assets

Five final points on patching 3. Assign Roles and Duties to Staff Admins should have pre-assigned devices, applications or machines to patch Train staff to react when patches are released and made available for deployment Establish goals and standards for patch management (time to deploy, quality testing) Monitor staff s work

Five final points on patching 4. Verify, Verify, Verify Don t trust your patch management system Use multiple scanners to verify patch deployments Practice 80/20 rule until you reduce the number of unpatched machines Use endpoint security solution/quarantine zones to isolate noncompliant systems

Five final points on patching 5. Start Over Establish metrics to measure effectiveness of patching Time to patch vs. SLAs Number of machines patch/time Identify soft spots, make adjustments Update asset and valuation inventory Training staff on changes

Questions What is the meaning of life?