Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Time To Rethink Patching Strategies
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
User Rank: Author
12/19/2014 | 1:34:47 PM
Re: Rethinking Patching Strategies
@ODA155 ---Thanks for your comments and response. You make some valid and interesting points. Consider this... what if liability could be assign to software vendors who write bad code. I think companies who acquire software through the software supply chain should care about the software they purchase. Why bring in bad software into your environment? I think it's prudent and imperative to work with software vendors to ensure they are taking the necessary steps to build and design secure systems. With the adoption of open-source, the notion of proprietary software is becoming obsolete because all products have some open-source library, component, or module some where in the code base. Thanks again.. good points!!!
User Rank: Author
12/19/2014 | 1:29:15 PM
Re: I wonder
@Whoopty ... Thanks, I appreciate your comments. I tend to look at software development as software development, whether it's mobile, web, or gaming for that matter. I definitely believe there should be a more assertive focus on secure coding practices, given that perimeter security disappearing right before our eyes with wearable devices and IoT. There is no silver bullet to security, however, reducing the attack surface and ways in which a system can be compromised starts with secure coding and development. Thanks again KevEG
User Rank: Ninja
12/19/2014 | 1:13:16 PM
I wonder
I wonder if this sort of strategy, if implemented, will trickle down into game development? There's a real issue in game making at the moment with horrendously buggy products, vulnerabilities, flaws and problems that are coming along with the increase in game complexity and size. Despite years of work, they're releasing as broken messes. 

Do you think a more robust focus on secure practices in the original development would help alleciate problems there like it would with less fun software? 
User Rank: Ninja
12/19/2014 | 11:40:40 AM
Rethinking Patching Strategies
@Kevin E. Greene...

"It becomes nearly impossible for organizations to patch anywhere near 100% when you take into account zero-day vulnerabilities, manual patching, ineffective patch management solutions, the inability to patch critical systems that can't be taken offline, and other factors that impact the operations of IT system environments from heterogeneous environments "
I know that everyone has different challanges, but in my very humble opinion, that statement is the exact reason(s) that patching is not taken as seriously as it should be.

First a comment about CVE that security admins need to know. In January the MITRE is changing the Syntax, or format of the CVE listings to be able to handle the more than 10,000 vulnerabilities expected to come in a single year, as your opening statement pointed out. So I would deficiently recommend looking into that I would add a link but I don't think that's allowed.

So, I want to comment on your statement one point at a time.
  • It becomes nearly impossible for organizations to patch anywhere near 100%

I've been in IT since 1998 and Information Security since 2003 and from my experience nobody expects to get 100% coverage, most do not even try.

  • when you take into account zero-day vulnerabilities

Zero-Day... this is the unknown, and if you're going to patch anything you most likely should consider patching this, wouldn't you agree?

  • manual patching, ineffective patch management solutions

Still, none of these are an excuse or a reason for not patching. If you're doing manual patching on more than 500 systems (and that's way too many) I recommend looking for a new job because you're setting yourself up for failure and use as a scape goat. As for ineffective solutions, I would recommend a solution where the prime and proven focus is patching and not the 10 other functions that come as bundled "features".

  • the inability to patch critical systems that can't be taken offline

Why can't a system be taken offline? If a system is really that critical then most likely you'll have another as backup because if it's contiunally running and never getting ANY maintenance then it will soon decide on its own to stop working, nothing runs forever. And "can't be taken offline" only means that who ever makes the decisions has decided that the business is more important than what makes the business run and really has not considered what will inevitably will happen.
  • and other factors that impact the operations of IT system environments

Other factors, my favorite subject. Senior IT and management folks who do not want to hear about system downtime, how certain users complain because an update may require a reboot, how AV does not catch all of the malware that they allow onto their machines. Are those the "other factors" you speak of?

Again, in my opinion, there should be no reason why an organization should not be able to patch over 90% of laptops or desktop computers and at least 75% of servers. And that takes into account that on a server you mostly are only patching the OS and maybe an application because I do understand that patching a web server or some DB does require more coordination and support from multiple sources, but it can be done... it has to be.

At the organization level where I sit, I can't be concerned with why large software vendors release bad code... I have enough problems trying to get people to understand that we have to protect our systems and our data and a part of that is patching.

"It should be noted that I'm not advocating abandoning patching strategies. However, I am encouraging organizations to put a greater emphasis on developing better quality software."

For companies that develop their own specialized applications I would definitely agree, and hopefully they'll get the right people to do that and respect the results of an audit or QA assessment before rushing to put something into production.

Nice article!
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-10-03
pfSense v2.5.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the browser.php component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a file name.
PUBLISHED: 2022-10-03
phpipam v1.5.0 was discovered to contain a header injection vulnerability via the component /admin/subnets/ripe-query.php.
PUBLISHED: 2022-10-03
Under certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage this vulnerability to escalate privileges and execute arbitrary code.
PUBLISHED: 2022-10-03
An issue was discovered in Veritas NetBackup through 8.2 and related Veritas products. An attacker with local access can send a crafted packet to pbx_exchange during registration and cause a NULL pointer exception, effectively crashing the pbx_exchange process.
PUBLISHED: 2022-10-03
An issue was discovered in Veritas NetBackup through and related Veritas products. The NetBackup Primary server is vulnerable to an XML External Entity (XXE) Injection attack through the DiscoveryService service.